SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the standby HSRP router do?
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
By creating a static IP binding
An AP's coverage area
Only the standby monitors the hello messages from the active router
2. What format does the GLBP MAC use?
On the left as you face the connector
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Those that connect to other switches
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
3. What is DAI?
Data goes over native vlan - voice goes over VLAN0 - voice QOS is 802.1p
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Disabled - blocking - listening - learning - forwarding
Dynamic arp inspection
4. What does the switchport host macro do?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Distribution layer
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
5. What is the STP listening state?
RADIUS
Can send and receive BDPUs
Receives the first packet of a traffic flow and routes it
Virtual Router Redundancy Protocol - pretty much the same as HSRP
6. What does UDLD do?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Local only
The same as a standby group in HSRP
Trunk
7. What functions does a WLC perform?
Control functions
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Round robin - weighted - or host-dependent
8. What are the VRRP group and priority numbers?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Group (0-255) - priority (1-254 254 is highest - 100 default)
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Multicast to 01-80-c2-00-00-00
9. In a converged fabric - which switch(es) send config BDPUs?
Untrusted
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Root
Port that connects to another switch and becomes a designated port
10. What is an ESS?
The port is forced to always authorize any connected client with no authentication necessary (default)
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
No shut
When the AP uplinks to an Ethernet network.
11. At what layer should the WLC be connected?
Distribution
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
No
7 switches from root bridge
12. How many designated ports are there?
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
1 per segment
2 - one for control messages and one for data
By short-circuiting the max age timer
13. RSTP alternate port
Configure non-silent submode
On the left as you face the connector
1-1005 (1 and 1002-1005 are reserved)
Port with alternative path to root less desirable than root
14. What does the skinny protocol do?
Transmits keystrokes from phone and commands from CCM
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Isolated and community
Yes
15. How do you configure IP source guard for hosts that don't use DHCP?
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
1-ID link path costs - 2-ID roodt bridge - 3-select root port (1/switch) - 4-select designated port (1/segment) - 5-ID blocking port
Time between BDPUs sent by root bridge. Default of 2 seconds
By creating a static IP binding
16. How does every HSRP config command begin?
Switch(config-if)# standby xx where x= group number
Two distribution switches that aggregate one or more access switches
Trusted or untrusted
900 MHz - 2.4Ghz - and 5-6GHz
17. What does port-security protect do?
Only a single host connects . If one BDPU is received - it is no longer an edge port
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Port stays up - packets from violating MACs dropped - no logging
No shut
18. What functions does a LAP perform?
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Manages addition - deletion and renaming VLANs across the network
1 -2 -5.5 and 11 Mbps - Channels 1/6/11 - 2.4Ghz
19. How do you configure a DHCP gateway?
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Another router must have a higher HSRP priority and have preemt set up
Cisco ILP and 802.3af
A private VLAN can be logically associated with a special secondary vlan
20. What is a proxy arp?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What is differentiated services model QOS?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Port is forced to never authorize any connected client
Each network device handles packets individually with no advance reservations
Half-duplex
22. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. What is the acceptible range of VLANS?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Dynamic arp inspection
1-1005 (1 and 1002-1005 are reserved)
Critical...used most often for IPT
24. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
PAgP (Cisco proprietary) and LACP (standards-based)
FE - GE - and aggregated FE/GE Etherchannels
224.0.0.2 (all routers)
25. What is common spanning tree (CST)?
Distribution layer
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Differentiated services code point
Data and voice over native vlan - no QOS but still uses 802.1p trunk
26. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Each network device handles packets individually with no advance reservations
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Turn on port security
Yes
27. What is jitter?
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Trunk
Variation in delay
VTP server for domain null with no password or secure mode
28. For QoS - switch uplinks should always be considered as ____ _____?
Group (0-255) - priority (1-254 254 is highest - 100 default)
By name - config revision - and instance to vlan mapping table
Trusted ports
It can't
29. Can ARP replies be checked
Limits the number if dhcp requests on a port
Switchpotrt nonegotiate
Yes
When the size of a cell is intentionally reduced
30. What does uplinkfast do?
Based on priority (0-255). Default is 100. Highest IP is tie breaker
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
On by default
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
31. What pins does FE use?
By short-circuiting the max age timer
1 IP subnet
Checks the destination MAC in the header against the target MAC in the ARP reply
1/2 and 3/6
32. How do you disable DTP when you configure both ends of the ISL manually?
Switchpotrt nonegotiate
Can hear only BDPUs
To the virtual port-channel interface
When a client roams between Aps in different subnets
33. What is the STP disabled state?
Multicast to 01-80-c2-00-00-00
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Admin down
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
34. If a wireless station needs to transmit and no other device is transmitting - what happens?
They disguise the origin of an attack
The station can transmit immediately and wait for an ack
A MAC is seen on a different port
900 MHz - 2.4Ghz - and 5-6GHz
35. What is the SDM?
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Port with alternative path to root less desirable than root
All user ports that have portfast enabled
Switching Database Manager - configures and prunes TCAM partitions
36. What is DCF?
7 switches from root bridge
Distribution layer
0-255
Distributed coordinion function - the use of timers to prevent wireless collisions
37. How is a QoS trust bondary configured?
Using a mobility exchange message
By name - config revision - and instance to vlan mapping table
Every switch and router in a network must be configured with appropriate QoS features and policies
Switchpotrt nonegotiate
38. What is the 80/20 rule?
Show standby
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
80% of the user traffic should stay in the VLAN
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
39. What are the two private vlan association modes?
Disabled - init - listen - speak - standby - active
VTP server for domain null with no password or secure mode
Promiscuous and host
1 second. Backup routers can learn the interval from the master
40. How can you tell if a switch block is too large?
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
802.1D
By using a hash of a key string
4
41. How are errdisable triggers tuned?
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Used when ACLs specify port ranges...used by TCAM
Once the CCM gives them the parameters - they use RTP
Globally
42. What is an IBSS?
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
The wireless clients communicate directly with no other means of connectivity such as a WAP
All fiber-optic links between switches (must be enabled on both ends)
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
43. How doed backbonefast work?
By short-circuiting the max age timer
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Within a single MST region - an IST instances runs to work out a loop free topology between links where CST meets the region boundary and all switches in the region. It runs at the boundary.
Can send and receive BDPUs
44. What must the other end be set to if PAgP desirable or LACP active mode is selected?
19
Either desirable or auto mode
63 kbps
A client can roam to any WLC as long as it stays in a mobility group
45. How does adding option-82 to DHCP snooping affect things?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. What are the 5 steps a LAP uses to establish communication with a WLC?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
Flash override (class 4)
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
48. What is a BSS?
Using a single WAP to centralize access and control over a group of wireless devices.
The port is forced to always authorize any connected client with no authentication necessary (default)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
It is enabled by default on all CEF capable switches
49. How do you renable an err-disable port by default?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Forces the router to wait for a period of time before attempting overthrow
Manually
A host port goes up or down
50. What is dynamic auto?
Needs hardware upgrade over WEP - uses AES encryption
Distribution layer
Will trunk if asked
The topology is pre-populated by downloading the topology DB into the FIB and dynamically updated. Called Cisco Express Forwarding