SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does dot1q do trunking?
Embeds the tag within the frame
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Limits the number if dhcp requests on a port
2. What is RPR?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
134 bits
By an ARP access list that defines the permitted bindings
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
3. What is the standard for WLANs?
Yes
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
802.11
Multicast to 01-80-c2-00-00-00
4. How often are CAM table entries aged?
300 sec
Between interfaces that are assigned to L2 VLANs or L2 trunks
80% of the user traffic should stay in the VLAN
To a VLAN and not to a VLAN interface (SVI)
5. RSTP uses which standard?
Full duplex
Used to switch packets destined for the null interface
802.1w
Routers are assigned to common GLBP group. All routers can be active and can load balance
6. Automatically configure STP timers
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
10-15%
Use the spanning-tree root macro
Switch(config-if)# glbp xx where xx = group number
7. where does L2 switching occur?
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
Between interfaces that are assigned to L2 VLANs or L2 trunks
1 IP subnet
Connects with SONET or SDH
8. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Turn on port security
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Plain text or md5
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
9. How does HSRP election work?
Access or trunk
Configuration and TCN
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Admin down
10. What is the size of a TCAM value?
Via an 802.1Q trunk or a single VLAN access port
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
The master router can share the VIP
11. How are VACLs applied
Trunk - dynamic auto - dynamic desireable (default)
To a VLAN and not to a VLAN interface (SVI)
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
12. What is a VRRP group?
The same as a standby group in HSRP
16 bits (8b port priority - 8b port number)
Embeds the tag within the frame
Only a single host connects . If one BDPU is received - it is no longer an edge port
13. What cabling do GBICs use?
SC fiber or RJ-45
Group (0-255) - priority (1-254 254 is highest - 100 default)
The distribution layer should have only L3 links
By using an Ether-IP tunnel
14. What is the default mode of load balancing?
When a wireless station transmits a frame - the receiving one must send an ack
Src-dst-ip
Route once - switch many
Immediate (class 2)
15. What is a discard adjacency?
Packets are discarded due to an ACL or policy action
Incoming frames are dropped (combination of disabled - blocking - and listening)
Will trunk if asked
L2
16. What are the 5 steps a LAP uses to establish communication with a WLC?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
1-1005 (1 and 1002-1005 are reserved)
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
17. What are dynamic VLANs based on?
MAC of the end device
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
A MAC is seen on a different port
With portfast
18. How should the switch port to which an autonomous AP be configured?
Trunk
Local only
Both layer 2 switching and IVR
Data and voice over native vlan - no QOS but still uses 802.1p trunk
19. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. What is an untrusted port under dhcp snooping?
Distributed coordinion function - the use of timers to prevent wireless collisions
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
22. What is best effort delivery QOS?
Switches make an effort to move packets as quickly as possible
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
When a client roams between Aps in different subnets
Completed dhcp bindings - mac addresses - IP addresses - etc.
23. How should UDLD be configured?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
A host port goes up or down
The configureable UDLD interval must be less than max age plus two intervals of forward delay
The TOS field in the header is used. 2 methods 3 bits or 6 bits
24. What functions does a LAP perform?
Weak key rotation
Root - designated - blocking - alternate - forwarding (host)
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Dynamic arp inspection
25. What happens if both 802.1D and RSTP BDPUs are received?
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Port with alternative path to root less desirable than root
Trusted or untrusted
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
26. What does port-security protect do?
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
When a port moves into forwarding or from fowarding or learning to blocking.
Port stays up - packets from violating MACs dropped - no logging
A key string of up to 8 characters is sent. Default is cisco.
27. What is a null adjacency?
Only for the offending VLAN on the port
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
The ASIC
Used to switch packets destined for the null interface
28. What must be supported for port-based security to occur?
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
802.1x with EAP over LAN (EAPOL)
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
29. What does a LAP do if it loses communication with it's WLC?
By configuring every switch port to have an expected and controlled behavior
Reboots and searches for a new WLC
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
30. What are the 6 steps to configure 802.1x for port security?
Flash override (class 4)
Frames are forwarded
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
31. What is the STP blocking state?
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
Can hear only BDPUs
When a client roams between Aps in different subnets
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
32. What is unique about HSRP group numbers?
Connects to a router - firewall - or gateway. Can communicate with anything else connected to the primary or any secondary. Ignores pvlan config
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Bridge priority and MAC
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
33. How does VRRP do tracking?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. What is an MST instance?
Switch(config-if)# glbp xx where xx = group number
By short-circuiting the max age timer
Another router must have a higher HSRP priority and have preemt set up
The MST instance (MSTI) runs alongside the IST and represents an STP instance
35. Can ARP replies be checked
Discarding - learning - forwarding
Normal and aggressive
Yes
Cisco ILP and 802.3af
36. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Needs hardware upgrade over WEP - uses AES encryption
Either desirable or auto mode
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
1-lowest root bridge ID - 2-lowest root path cost - 3-lowest bridgeID - 4-lowest port ID
38. What is differentiated services model QOS?
A single broadcast domain
Each network device handles packets individually with no advance reservations
The active router. All other routers are in backup state
The total delay from start to finish
39. 802.11a
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
Will trunk if asked
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Distributed coordinion function - the use of timers to prevent wireless collisions
40. What is the default network diameter?
1 per segment
Lowest cumulative cost to root
7 switches from root bridge
On the left as you face the connector
41. How does 802.1q handle COS?
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Port
Configure non-silent submode
Promiscuous and host
42. What are spoofed addresses?
Yes to both
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
They disguise the origin of an attack
0-255
43. CAM table entries are purged when....
A MAC is seen on a different port
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Src-dst-ip
44. How is RSTP synchronization accomplished?
Full duplex
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
BGP - EIGRP - OSPF - and IS-IS.
Roughly 50%
45. What is layer 2 roaming?
No because they only participate if asked
Isolated and community
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
46. What is an isolated secondary VLAN?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. What is the DIFS?
Roughly 2000
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
The DCF interframe space- the random backoff time before a wireless set can transmit
1 second. Backup routers can learn the interval from the master
48. What are the VRRP group and priority numbers?
900 MHz - 2.4Ghz - and 5-6GHz
Group (0-255) - priority (1-254 254 is highest - 100 default)
802.1D
Roughly 50%
49. Which fiber is the receive?
When the size of a cell is intentionally reduced
On the left as you face the connector
BGP - EIGRP - OSPF - and IS-IS.
Used when there are 1 or more VLANs mapped to a single STP instance
50. How many tunnels exist between the LAP and WLC?
Controls where candidate root bridges can be connected and found on a network
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
2 - one for control messages and one for data