SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What happens when switches receive a configuration BDPU?
The switch checks the MAC and IP reported in the reply against trusted values. If they don't match - it is dropped and logged
Forces the router to wait for a period of time before attempting overthrow
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
When each AP stands alone within the larger network.
2. How are RSTP point to point ports determined?
802.1D
Automatically by duplex mode in use. Full duplex are point ot point. Half duplex ports use traditional 802.1D convergence is used.
All fiber-optic links between switches (must be enabled on both ends)
63 kbps
3. RSTP backup port
From the DHCP snooping database or from static entries
Port with redundant - but less deisrable connection to a segment. Possibly root candidate
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
The link status stays up - but something between them has failed or is filtering traffic
4. How many 802.3af power classes are there?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
5 (0-4 with 4 being the highest)
On by default
Half because transmitting and receiving stations use the same frequency
5. Whan is a 10GE WAN PHY?
Connects with SONET or SDH
That they aren't using the same frequencies.
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Port with alternative path to root less desirable than root
6. What is the SDM?
By using a hash of a key string
10-15%
Switching Database Manager - configures and prunes TCAM partitions
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
7. What is SSO?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. what should you do if you expect a PAgP capable switch at the other end vs. a server or host?
When the size of a cell is intentionally reduced
Configure non-silent submode
The active router. All other routers are in backup state
Distributed coordinion function - the use of timers to prevent wireless collisions
9. What does the minimum keyword do in HSRP?
Forces the router to wait for a period of time before attempting overthrow
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
A point to point port type
Critical...used most often for IPT
10. How does a Cisco IP phone connect upstream?
Via an 802.1Q trunk or a single VLAN access port
Yes
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
No
11. What is a baby giant frame?
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Frames that barely exceed 1518B or 1622B due to headers
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
Disabled - init - listen - speak - standby - active
12. How many MST instances can be in a region?
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
Time between BDPUs sent by root bridge. Default of 2 seconds
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Roughly 2000
13. where does L2 switching occur?
Between interfaces that are assigned to L2 VLANs or L2 trunks
Globally or per-port
Arp for local subnet - if on different subnet - will arp for dgw
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
14. What categories can ports be in with dhcp snooping enabled?
Trusted or untrusted
FIB
Both layer 2 switching and IVR
Src-dst-ip
15. In a converged fabric - which switch(es) send config BDPUs?
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Root
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
16. What functions does a WLC perform?
300 sec
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Control functions
17. What is the IEEE standard for STP?
Will trunk if asked
802.1D
Needs hardware upgrade over WEP - uses AES encryption
SC fiber or RJ-45
18. Where should you change the network diameter value?
802.1w
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
80% of the user traffic should stay in the VLAN
Cisco recommends only on the root bridge
19. How does packet forwarding work
Weak key rotation
0-255 (lower is better)
Arp for local subnet - if on different subnet - will arp for dgw
Time between BDPUs sent by root bridge. Default of 2 seconds
20. How does uplinkfast handle changes in topology?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
5 classes with 3 drop precedences
Control functions
21. How are frames forwarded across a specific link?
Hashing algorithm
Virtual Router Redundancy Protocol - pretty much the same as HSRP
No because they only participate if asked
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
22. How does ILP do power discovery?
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
802.1w
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Transmits keystrokes from phone and commands from CCM
23. When looking at the sh spanning tree output - What does P2P peer(STP) denote?
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
A point to point port type but the neighboring device runs traditional 802.1D STP
When a port moves into forwarding or from fowarding or learning to blocking.
24. What is the default MTU?
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
1500B
If any BDUP is received on a port - it puts the port into the errdisable state
25. What is unique about HSRP group numbers?
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
LACP port priority
They are locally significant on an interface. HSRP1 on one VLAN is different from HSRP1 on another
Connects with SONET or SDH
26. What is the switch block?
FE and GE
Two distribution switches that aggregate one or more access switches
Isl - dot1q - negotiate (default)
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
27. How do IP phones communicate with each other?
2-8 FE - GE - or 10GE are bundled.
Once the CCM gives them the parameters - they use RTP
An L2 switch can only forward frames best effort unless going across a trunk
1 per segment
28. How often are CAM table entries aged?
Switchpotrt nonegotiate
300 sec
By configuring every switch port to have an expected and controlled behavior
Port with best root path cost
29. How much BW does a PSTN connection use?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
63 kbps
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
A MAC is seen on a different port
30. WEP encryption
Admin down
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Weak key rotation
134 bits
31. What is the 80/20 rule?
80% of the user traffic should stay in the VLAN
Forces the router to wait for a period of time before attempting overthrow
By sending a gratuitous ARP
FIB
32. What does the version number indicate when looking at CEF entries?
The number of times the entry has been updated since the table was generated
L2
Switch(config-if)# vrrp xx where xx= group number
The wireless clients communicate directly with no other means of connectivity such as a WAP
33. What must be in common for a BSS to form?
Incoming frames are dropped (combination of disabled - blocking - and listening)
1 second. Backup routers can learn the interval from the master
Matching SSID - compatible data rate - authentication credentials
Round robin - weighted - or host-dependent
34. What does port-security restrict do?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
To the virtual port-channel interface
Plain text or md5
Disabled - blocking - listening - learning - forwarding
35. What is the cost of a 10Gbps link?
Automatically negotiates a common trunk mode between switches
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
2
Differentiated services
36. What is the format of the VRRP virtual MAC?
Untrusted
The station can transmit immediately and wait for an ack
Disabled - init - listen - speak - standby - active
0000.5e00.01xx
37. How do VRRP routers handle preemption?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
On by default
Automatically negotiates a common trunk mode between switches
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
38. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. What happens when an ARP reply is received on an untrusted port?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What are the steps of RSTP convergence?
Data and voice over native vlan - no QOS but still uses 802.1p trunk
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
When the size of a cell is intentionally reduced
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
41. What is DSCP codepoint AF41(34)?
Almost eliminates listening and learning states for single hosts on an access link
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
Flash override (class 4)
42. RSTP learning state
The wireless clients communicate directly with no other means of connectivity such as a WAP
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Port with best root path cost on segment
Incoming frames dropped - but MACs learned
43. How are VACLs applied
The station can transmit immediately and wait for an ack
To a VLAN and not to a VLAN interface (SVI)
A single broadcast domain
802.1w
44. How does HSRP gateway addressing work
Globally
SC fiber or RJ-45
Option 43
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
45. If a wireless station needs to transmit and no other device is transmitting - what happens?
The campus network's backbone
By encapsulating each frame in a header and trailer
The station can transmit immediately and wait for an ack
Yes to both
46. What is a bridge ID made up of?
Root
Bridge priority and MAC
LACP port priority
Only the standby monitors the hello messages from the active router
47. What is an autonomous mode AP?
Yes
By using a trunk link
When each AP stands alone within the larger network.
Using digital certificates
48. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. What is the STP blocking state?
1-1005 (1 and 1002-1005 are reserved)
Can hear only BDPUs
A host port goes up or down
Between any type of interface as long as the interface can have an L3 address assigned
50. What is the STP forward delay timer?
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
The time that a port spends in both listening and learning states . Default 15 seconds
Using a single WAP to centralize access and control over a group of wireless devices.