SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is Per VLAN STP (PVST)?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Port with best root path cost
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
2. What does the static keyword do when applying an arp ACL?
Switch(config-if)# standby xx where x= group number
Prevents the dhcp binding DB from being checked.
From the DHCP snooping database or from static entries
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
3. What happens when switches receive a configuration BDPU?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
If the switch or the powered device doesn't suport power class discovery
Root
Etherchannel ports have inconsistent config
4. What are the 2 types of BDPU?
Switch(config-if)# standby xx where x= group number
Configuration and TCN
On the left as you face the connector
Plain text or md5
5. What scope is 802.1x enabled?
L2
Globally
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
6. can root guard and udld be used together?
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
Yes
Connects with SONET or SDH
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
7. if the switchport is part of an etherchannel - Where is the network assigned
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Checks the destination MAC in the header against the target MAC in the ARP reply
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
To the virtual port-channel interface
8. What is layer 2 roaming?
Those that connect to other switches
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
9. What are the 2 UDLD modes?
Normal and aggressive
Src-dst-ip
Port with alternative path to root less desirable than root
Up to 54Mbps - not cross-compatible - 12 to 23 clean channels - 5.8 Ghz
10. What is an autonomous mode AP?
Auto mode
When each AP stands alone within the larger network.
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
PAgP (Cisco proprietary) and LACP (standards-based)
11. How does HSRP plain text authentication work?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
A key string of up to 8 characters is sent. Default is cisco.
VTP server for domain null with no password or secure mode
Full duplex
12. What is the 80/20 rule?
Immediate (class 2)
80% of the user traffic should stay in the VLAN
Prevents the dhcp binding DB from being checked.
By encapsulating each frame in a header and trailer
13. When DHCP snooping is turned on - by default - it considers all ports ______
By name - config revision - and instance to vlan mapping table
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Untrusted
CEF is distributed completely among multiple L3 forwarding engines.
14. Where does VRRP send advertisements?
Multicasts to 224.0.0.18 (VRRP)
Real-time Transport Protocol
Flash override (class 4)
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
15. RSTP uses which standard?
No
802.1w
Distribution layer
If the client maintains the same IP address as it roams between Aps. All must have same VLAN - SSID - and subnet
16. What is the duration time in a wireless frame?
TCAM
Each frame transmits its expected duration time
On all switches in network to enable RLQ request and reply
Virtual Router Redundancy Protocol - pretty much the same as HSRP
17. What are the 2 types of secondary VLAN?
Isolated and community
Root
Automatically using DTP and CDP
Critical...used most often for IPT
18. What is the STP blocking state?
Port stays up - packets from violating MACs dropped - no logging
From the DHCP snooping database or from static entries
Can hear only BDPUs
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
19. What is dynamic auto?
Matching SSID - compatible data rate - authentication credentials
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
The wireless clients communicate directly with no other means of connectivity such as a WAP
Will trunk if asked
20. Can MSTP interoperate with 802.1q and/or PVST+?
Can hear only BDPUs
Yes to both
When the AP uplinks to an Ethernet network.
When a port moves into forwarding or from fowarding or learning to blocking.
21. What is 802.1x force-unauthorized?
Immediate (class 2)
Gateway load balancing protocol - cisco proprietary
Port is forced to never authorize any connected client
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
22. How should backbonefast be configured?
By configuring every switch port to have an expected and controlled behavior
Packets are discarded due to an ACL or policy action
On all switches in network to enable RLQ request and reply
No shut
23. can root guard and loop guard be used together
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
No
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Dynamic WEP keys that change periodically
24. How do you configure DAI for statically configured IP addresses?
When the size of a cell is intentionally reduced
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
By an ARP access list that defines the permitted bindings
By default weight is 100. Can be made dynamic per interface
25. What are the gotchas for uplinkfast?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What are LOU register pairs?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
Used when ACLs specify port ranges...used by TCAM
Differentiated services code point
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
27. How does every GLBP command begin
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Switch(config-if)# glbp xx where xx = group number
1/2 and 3/6
Auto mode
28. How is root port decided upon?
Configure and enable DHCP snooping
Only for the offending VLAN on the port
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Lowest cumulative cost to root
29. If you want IP source guard to detect spoofed MAC addresses - what must you do?
Connects with SONET or SDH
Switch(config-if)# glbp xx where xx = group number
Turn on port security
A MAC is seen on a different port
30. How are BDPUs spread?
They disguise the origin of an attack
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Isl - dot1q - negotiate (default)
Multicast to 01-80-c2-00-00-00
31. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. How many tunnels exist between the LAP and WLC?
A host port goes up or down
2 - one for control messages and one for data
Regions and instances
Switch(config-if)# glbp xx where xx = group number
33. What does the SP do?
Listens to the first packet going to router and away from the router. If it can switch in both directions - it learns a shortcut path so subsequent packets can be switched without the RP
Distributed coordinion function - the use of timers to prevent wireless collisions
When each AP stands alone within the larger network.
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
34. What must the other end be set to if PAgP desirable or LACP active mode is selected?
Either desirable or auto mode
Effectively stops STP on filtered ports
26-byte header - 4-byte trailer with CRC
To a VLAN and not to a VLAN interface (SVI)
35. RSTP discarding state
Incoming frames are dropped (combination of disabled - blocking - and listening)
Enables portfast - sets the port to access and disables PAgP
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
Reboots and searches for a new WLC
36. Where should you change the network diameter value?
Cisco recommends only on the root bridge
On ports where you never expect to find a root bridge for a VLAN
Once the CCM gives them the parameters - they use RTP
Port stays up - packets from violating MACs dropped - no logging
37. What is the default 802.3af power class and its use?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. What is integrated services model QOS?
When a port moves into forwarding or from fowarding or learning to blocking.
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
It's a router that maintains routes (static or dynamic) - and populates the FIB
When each AP stands alone within the larger network.
39. How does HSRP do MD5 authentication?
Group (0-1023) priority (1-255 higher better def 100)
By using a hash of a key string
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Using a mobility exchange message
40. What does the rewrite engine do?
On ports where you never expect to find a root bridge for a VLAN
Yes
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
Cisco ILP and 802.3af
41. What are the 6 steps to configure 802.1x for port security?
0-255
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
The port is forced to always authorize any connected client with no authentication necessary (default)
LACP port priority
42. WPA2 encryption
1500B
Needs hardware upgrade over WEP - uses AES encryption
900 MHz - 2.4Ghz - and 5-6GHz
Via an 802.1Q trunk or a single VLAN access port
43. What is UDLD aggressive mode?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What is the distribution layer best practice?
Change in trunk encap
The distribution layer should have only L3 links
Using digital certificates
Hashing algorithm
45. What is NSF?
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Incoming frames are dropped (combination of disabled - blocking - and listening)
Port stays up - packets from violating MACs dropped - no logging
46. What is a baby giant frame?
Frames that barely exceed 1518B or 1622B due to headers
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Flash override (class 4)
Yes to both
47. What does uplinkfast do?
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Between interfaces that are assigned to L2 VLANs or L2 trunks
1-1005 (1 and 1002-1005 are reserved)
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
48. What does Loop Guard do?
Immediate (class 2)
Tracks of BDPUs on nondesignated ports. When those BDPUs stop coming - the port is put into loop-inconsistent state and blocks
A port can only forward or relay BDPUs - but can't receive them - disabled by default - enabled per-port - blocks port when superior BDPUs are received
A point to point port type but the neighboring device runs traditional 802.1D STP
49. How many virtual MACs can GLBP have?
Up to 4 can be used in a group. Called active virtual forwarders (AVF)
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
Plain text or md5
Using digital certificates
50. What is an SVI?
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
802.1w