SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does the standby handle ARP issues after it becomes active?
The campus network's backbone
26-byte header - 4-byte trailer with CRC
By sending a gratuitous ARP
Real-time Transport Protocol
2. what must be done on an SVI before it is activated?
By using an Ether-IP tunnel
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Trunk
No shut
3. What does a LAP do if it loses communication with it's WLC?
2-8 FE - GE - or 10GE are bundled.
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
As a VLAN access map
Reboots and searches for a new WLC
4. What is the default MTU?
1500B
16 - of which up to 8 are active. The others are in standby
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Multicasts to 224.0.0.18 (VRRP)
5. What is backbonefast?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Source IP and MAC must match those addresses learned by DHCP snooping or a static entry
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
0000.5e00.01xx
6. What is the default 10mbps Enet duplex?
No shut
Half-duplex
By configuring every switch port to have an expected and controlled behavior
1-65535 (def 32768) lower priority - higher probability
7. What do you need to determine to use MSTP?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Should be used on access switches - can't be used on root - keeps enabled switch from becoming root by raising priority of switch and all ports - making them undesirable
The RP listens to a flow's 1st packet for the dest. The SE listens to the packet and dest and puts a shortcut in the MSL cache. Netflow switching - route once - switch many
Multicasts to 224.0.0.18 (VRRP)
8. What is a QoS trust boundary?
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
802.1D
L2
Hashing algorithm
9. What is the traditional MLS view of switching?
Manually
802.1D
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Route once - switch many
10. How are errdisable triggers tuned?
Switch(config-if)# vrrp xx where xx= group number
Globally
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
1-1005 (1 and 1002-1005 are reserved)
11. Whan is a 10GE WAN PHY?
Globally
Connects with SONET or SDH
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
By using a trunk link
12. What does IP source guard do?
Immediate (class 2)
The redundant SUP is booted and sup and route engine is init'd. No L2 or L3 functions are started. Allows switchports to retain state
Yes to both
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
13. How does an L2 switch do QOS?
Variation in delay
An L2 switch can only forward frames best effort unless going across a trunk
Using a mobility exchange message
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
14. Where is root guard enabled?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. How should UDLD be configured?
1 IP subnet
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Frames are forwarded
A packet can't be switched in hardware with the FIB and must go to the L3 engine
16. What are the 5 steps a LAP uses to establish communication with a WLC?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
900 MHz - 2.4Ghz - and 5-6GHz
17. Does GLBP allow preemption?
10-15%
Only for the offending VLAN on the port
Yes
On root - because the root bridge propagates timers with config BDPU
18. What types of links can be trunked?
1- inferior BDPU on blocked-considered alternative - 2-inferior on root-all blocked ports considered alternate - 3-if inferior arrives on root and no blocked ports - assumes loss of connectivity to root
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Both layer 2 switching and IVR
FE - GE - and aggregated FE/GE Etherchannels
19. What does port-security protect do?
They disguise the origin of an attack
Port stays up - packets from violating MACs dropped - no logging
By configuring every switch port to have an expected and controlled behavior
Between interfaces that are assigned to L2 VLANs or L2 trunks
20. Define HSRP
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Data and voice over native vlan - no QOS but still uses 802.1p trunk
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
900 MHz - 2.4Ghz - and 5-6GHz
21. RSTP point to point port
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
Port that connects to another switch and becomes a designated port
22. What is the default mode of load balancing?
Src-dst-ip
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Critical...used most often for IPT
Both layer 2 switching and IVR
23. Where does VRRP send advertisements?
Multicasts to 224.0.0.18 (VRRP)
Used when there are 1 or more VLANs mapped to a single STP instance
The station can transmit immediately and wait for an ack
Group (0-1023) priority (1-255 higher better def 100)
24. Which 4 things must be agreeable to trunk?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
Used to switch packets destined for the null interface
On by default
25. What is an IBSS?
A point to point port type
Checks the source MAC in the header against the sender MAC in the ARP reply
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
The wireless clients communicate directly with no other means of connectivity such as a WAP
26. How do you configure IP source guard for hosts that don't use DHCP?
By creating a static IP binding
Used when ACLs specify port ranges...used by TCAM
Completed dhcp bindings - mac addresses - IP addresses - etc.
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
27. where does L2 switching occur?
Round robin - weighted - or host-dependent
An AP's coverage area
Between interfaces that are assigned to L2 VLANs or L2 trunks
On ports where you never expect to find a root bridge for a VLAN
28. What is UDLD normal mode?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Used to switch packets destined for the null interface
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
29. What are the steps to configure a PAgP port channel?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Used to switch packets destined for the null interface
All user ports that have portfast enabled
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
30. What is step 1 of enabling IP source guard?
Plain text or md5
Port that connects to another switch and becomes a designated port
Configure and enable DHCP snooping
Change in trunk encap
31. What is a BSS?
Using a single WAP to centralize access and control over a group of wireless devices.
L2
63 kbps
An L2 switch can only forward frames best effort unless going across a trunk
32. What is an insignificant topology change?
When a port moves into forwarding or from fowarding or learning to blocking.
A host port goes up or down
Configure non-silent submode
The L3 forwarding engine can't forward the packet in hardware because there is no L2 next-hop address - so the packet is sent to the L3 engine to generate the ARP response
33. What must the other end be set to if PAgP desirable or LACP active mode is selected?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
L2
1-1005 (1 and 1002-1005 are reserved)
Either desirable or auto mode
34. How is 802.1x configured for port security?
RADIUS
5 classes with 3 drop precedences
Trunk - dynamic auto - dynamic desireable (default)
Port that connects to another switch and becomes a designated port
35. What is a LACP priority?
Trunk
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
1 per segment
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
36. Where should you change the network diameter value?
Cisco recommends only on the root bridge
Only when a nonedge port transitions to forwarding
Best effort delivery - integrated services model - and differentiated services model
The time that a port spends in both listening and learning states . Default 15 seconds
37. What contains the next-hop entries?
Can send and receive BDPUs
2 - one for control messages and one for data
By configuring every switch port to have an expected and controlled behavior
FIB
38. RSTP designated port
3 seconds. Holdtime =3 hellos + 1
802.1x with EAP over LAN (EAPOL)
Port with best root path cost on segment
2 seconds (def)
39. What is a CEF glean?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What is the cost of a 1Gbps link?
4
Roughly 50%
Distributed coordinion function - the use of timers to prevent wireless collisions
The total delay from start to finish
41. What are the steps to configuring HSRP MD5 authentication?
Arp for local subnet - if on different subnet - will arp for dgw
Globally
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
When a wireless station transmits a frame - the receiving one must send an ack
42. What is 802.1x force-unauthorized?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
Port is forced to never authorize any connected client
7 switches from root bridge
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
43. What are spoofed addresses?
Those that connect to other switches
Configuration and TCN
They disguise the origin of an attack
Both ends should be on because on modes doesn't send PAgP or LACP packets
44. Can MSTP interoperate with 802.1q and/or PVST+?
Port with best root path cost
Yes to both
2 strand MMF with MT-RJ or SC connectors
MAC of the end device
45. How does UDLD work?
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
The link status stays up - but something between them has failed or is filtering traffic
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
802.1w
46. What is the cost of a 100Mbps link?
19
802.1D
Globally
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
47. What does the RP do?
Receives the first packet of a traffic flow and routes it
An L2 switch can only forward frames best effort unless going across a trunk
Group (0-255) - priority (1-254 254 is highest - 100 default)
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
48. How long are TCAM masks?
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
A router keeps a routing table and an ARP table. The FIB combines them for every next-hop entry
3 seconds. Holdtime =3 hellos + 1
134 bits
49. How does the CEF L3 engine operate?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. What is the default VTP state?
VTP server for domain null with no password or secure mode
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
No
0-255 (lower is better)