SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the STP blocking state?
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Can hear only BDPUs
Hashing algorithm
Half-duplex
2. At what layer does EAPOL run?
L2
By default weight is 100. Can be made dynamic per interface
Local only
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
3. What is errdisable dtp-flap?
When the size of a cell is intentionally reduced
The time that a port spends in both listening and learning states . Default 15 seconds
Change in trunk encap
The wireless clients communicate directly with no other means of connectivity such as a WAP
4. What happens during HSRP failover?
Disabled - blocking - listening - learning - forwarding
The number of times the CEF table has bee flushed and regenerated as a whole
Root - designated - blocking - alternate - forwarding (host)
The standby becomes active and stays active by default. Preemption can be configured
5. When DHCP snooping is turned on - by default - it considers all ports ______
Untrusted
Only a single host connects . If one BDPU is received - it is no longer an edge port
2
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
6. How many 802.3af power classes are there?
Cisco ILP and 802.3af
5 (0-4 with 4 being the highest)
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
7. What is an untrusted port under dhcp snooping?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
A private VLAN can be logically associated with a special secondary vlan
Used when ACLs specify port ranges...used by TCAM
0-255
8. What are the 5 STP states?
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
No shut
Disabled - blocking - listening - learning - forwarding
As a VLAN access map
9. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Configure non-silent submode
MAC of the end device
A key string of up to 8 characters is sent. Default is cisco.
10. Where should STP timers be configured and why?
Routers are assigned to common GLBP group. All routers can be active and can load balance
On root - because the root bridge propagates timers with config BDPU
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
When a client roams between Aps in different subnets
11. What is common spanning tree (CST)?
The number of times the entry has been updated since the table was generated
Dynamic arp inspection
Every switch and router in a network must be configured with appropriate QoS features and policies
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
12. static vlans offer ____ based membership
Port
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Roughly 2000
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
13. How do you configure a DHCP gateway?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
All L2 connectivity should be contained within the access layer.
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
14. How is RSTP synchronization accomplished?
Configure and enable DHCP snooping
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Switch(config-if)# glbp xx where xx = group number
15. How is a QoS trust bondary configured?
By brining up a tunnel between them to carry 802.11 related messages and client data.
Every switch and router in a network must be configured with appropriate QoS features and policies
The campus network's backbone
Differentiated services code point
16. What are the 3 trunk encap modes?
A key string of up to 8 characters is sent. Default is cisco.
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Isl - dot1q - negotiate (default)
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
17. What are dynamic VLANs based on?
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
Used to switch packets destined for the null interface
MAC of the end device
Prevents the dhcp binding DB from being checked.
18. What cabling do GBICs use?
Prevents the dhcp binding DB from being checked.
A VLAN that spans the entire fabric
A point to point port type but the neighboring device runs traditional 802.1D STP
SC fiber or RJ-45
19. Of what significance are private VLANs
63 kbps
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Local only
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
20. What is the default FE duplex?
Full duplex
Interim solution - uses same hardware as WEP - but uses TKIP encryption
By default weight is 100. Can be made dynamic per interface
By encapsulating each frame in a header and trailer
21. What are the 2 types of secondary VLAN?
Yes
That they aren't using the same frequencies.
FIB
Isolated and community
22. What contains the next-hop entries?
Only for trusted Cisco gear - especially phones
FIB
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Trunk
23. What does the switchport host macro do?
Enables portfast - sets the port to access and disables PAgP
The campus network's backbone
By brining up a tunnel between them to carry 802.11 related messages and client data.
802.11
24. FE connectors use...
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
Virtual Router Redundancy Protocol - pretty much the same as HSRP
2 strand MMF with MT-RJ or SC connectors
When a client roams between Aps in different subnets
25. What does uplinkfast do?
By configuring every switch port to have an expected and controlled behavior
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Group (0-255) - priority (1-254 254 is highest - 100 default)
26. What is an IBSS?
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Effectively stops STP on filtered ports
The wireless clients communicate directly with no other means of connectivity such as a WAP
27. RSTP discarding state
Access or trunk
Used to switch packets destined for the null interface
Incoming frames are dropped (combination of disabled - blocking - and listening)
5 classes with 3 drop precedences
28. How are frames forwarded across a specific link?
Hashing algorithm
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
Port with best root path cost on segment
Critical...used most often for IPT
29. What is the default mode of load balancing?
Src-dst-ip
After forwarding delay - port can learn new MAC addresses
12 kbps with headers and compression
Effectively stops STP on filtered ports
30. What are the three basic types of QOS?
Show standby
Matching SSID - compatible data rate - authentication credentials
A key string of up to 8 characters is sent. Default is cisco.
Best effort delivery - integrated services model - and differentiated services model
31. What is the port number range?
Port with alternative path to root less desirable than root
0-255
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Switching Database Manager - configures and prunes TCAM partitions
32. What does IP source guard do?
10-15%
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
802.1x with EAP over LAN (EAPOL)
12 kbps with headers and compression
33. What does port-security restrict do?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
No
MAC of the end device
34. What does the switchport host macro do?
Only the standby monitors the hello messages from the active router
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Weak key rotation
35. How does a LAP and a WLC authenticate between each other?
Edge - root - and point to point
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
Using digital certificates
36. What are the steps to configuring HSRP MD5 authentication?
A private VLAN can be logically associated with a special secondary vlan
7 switches from root bridge
Multicasts to 224.0.0.18 (VRRP)
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
37. In a converged fabric - which switch(es) send config BDPUs?
One that can be detected on a switch interface (ie. Up/down)
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Switch(config-if)# standby xx where x= group number
Root
38. What is a cell?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. unknown unicast flooding
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Untrusted
An L2 switch can only forward frames best effort unless going across a trunk
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
40. What is the size of a TCAM value?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
By name - config revision - and instance to vlan mapping table
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
41. What is the GLBP redirect timer?
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Using digital certificates
Used to switch packets destined for the null interface
Determines when the AVG will stop using the old VMAC in ARP replies
42. How do you configure IP source guard for hosts that don't use DHCP?
On by default
By an ARP access list that defines the permitted bindings
By creating a static IP binding
A private VLAN can be logically associated with a special secondary vlan
43. How does HSRP election work?
12 kbps with headers and compression
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Only for trusted Cisco gear - especially phones
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
44. How is 802.1x configured for port security?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
5 classes with 3 drop precedences
RADIUS
45. What is NSF?
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Can send and receive BDPUs
Between interfaces that are assigned to L2 VLANs or L2 trunks
Edge - root - and point to point
46. What is a community secondary VLAN?
It's a router that maintains routes (static or dynamic) - and populates the FIB
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
0-65535 (def 32768) lower=better
Routers are assigned to common GLBP group. All routers can be active and can load balance
47. Where shoul dmultilayer switches be implemented?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
All fiber-optic links between switches (must be enabled on both ends)
Distribution layer
By using a trunk link
48. What is integrated services model QOS?
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
By creating a static IP binding
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
49. What format does the GLBP MAC use?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
An AP's coverage area
Packets must be sent to the L3 engine for further processing
Must be same type - speed - VLAN(s) - native vlan - pass the same set of vlans -duplex - and spanning tree settings
50. What is RPR?
Port is forced to never authorize any connected client
Connects with SONET or SDH
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
RADIUS