SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the IEEE standard for STP?
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
802.1D
0-255
2. What does the RP do?
Receives the first packet of a traffic flow and routes it
No because they only participate if asked
Globally
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
3. What does Root Guard do?
They should be an unconditional Etherchannel because the WLC can't negotiate a channel.
Time between BDPUs sent by root bridge. Default of 2 seconds
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
Controls where candidate root bridges can be connected and found on a network
4. What is the default 10mbps Enet duplex?
Half-duplex
All ports where root isn't expected
Access
1-1005 (1 and 1002-1005 are reserved)
5. How many potential links can LACP define?
On (all ports channel) - auto (channels when asked) - and desirable(actively asks to form a channel)
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
16 - of which up to 8 are active. The others are in standby
Port with best root path cost
6. What data does DHCP snooping track?
Completed dhcp bindings - mac addresses - IP addresses - etc.
Via an 802.1Q trunk or a single VLAN access port
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Yes
7. One vlan should =
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
A single broadcast domain
Any ports associated with an isolated vlan can reach the primary - but not any other secondary. Hosts withn an isolated vlan can't reach each other
1 IP subnet
8. How are errdisable triggers tuned?
Only a single host connects . If one BDPU is received - it is no longer an edge port
Globally
All fiber-optic links between switches (must be enabled on both ends)
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
9. What happens when an ARP reply is received on an untrusted port?
10. What does the static keyword do when applying an arp ACL?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
2-8 FE - GE - or 10GE are bundled.
Prevents the dhcp binding DB from being checked.
By using a trunk link
11. What is DAI?
Controls where candidate root bridges can be connected and found on a network
Dynamic arp inspection
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
By brining up a tunnel between them to carry 802.11 related messages and client data.
12. What does IP source guard do?
Multicast to 01-80-c2-00-00-00
By using a trunk link
Switch(config-if)# standby xx where x= group number
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
13. If a wireless station needs to transmit and no other device is transmitting - what happens?
CEF is distributed completely among multiple L3 forwarding engines.
The station can transmit immediately and wait for an ack
134 bits
Each network device handles packets individually with no advance reservations
14. What are the steps to configure MST?
The number of times the CEF table has bee flushed and regenerated as a whole
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
Arp for local subnet - if on different subnet - will arp for dgw
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
15. What is a discard adjacency?
Switching Database Manager - configures and prunes TCAM partitions
Packets are discarded due to an ACL or policy action
The priority is a 2 byte value followed by the MAC that decides which ports are actively participating in Etherchannel (lower=higher priority)
By default weight is 100. Can be made dynamic per interface
16. What are the characteristics of the core layer
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
L2
17. What does a LAP do if it loses communication with it's WLC?
By an ARP access list that defines the permitted bindings
Reboots and searches for a new WLC
Disabled - blocking - listening - learning - forwarding
By default weight is 100. Can be made dynamic per interface
18. What is UDLD normal mode?
If a unidirectional link is detected - the port continues normally - but the port is marked as undetermined and a syslog is generated
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
When a specific interface is tracked - HSRP reduces it's priority after a specified interval.
Differentiated services code point
19. What scope is 802.1x enabled?
On all switches in network to enable RLQ request and reply
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Gets assistance from other NSF-aware neighbors. NSF features need to be built into the routing protocols on router needing and providing assistance
Globally
20. How can you tell if a switch block is too large?
Port stays up - packets from violating MACs dropped - no logging
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Incoming frames dropped - but MACs learned
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
21. What can the Etherchannel hash use?
It can't
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
5 classes with 3 drop precedences
The station can transmit immediately and wait for an ack
22. How do you configure DAI for statically configured IP addresses?
By an ARP access list that defines the permitted bindings
If the switch or the powered device doesn't suport power class discovery
1-65535 (def 32768) lower priority - higher probability
Two distribution switches that aggregate one or more access switches
23. Define VRRP
Global config (vlan - vtp mode - and vtp domain) and VLAN DB mode commands. Global config is preferred because VLAN DB mode commands are legacy
Only a single host connects . If one BDPU is received - it is no longer an edge port
Virtual Router Redundancy Protocol - pretty much the same as HSRP
The time interval that a switch stores a DBPU before discarding it. Default 20 seconds
24. What is the STP disabled state?
Admin down
Needs hardware upgrade over WEP - uses AES encryption
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Reboots and searches for a new WLC
25. What is a wireless mobility group?
To a VLAN and not to a VLAN interface (SVI)
Flash override (class 4)
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
A client can roam to any WLC as long as it stays in a mobility group
26. What are the 5 steps a LAP uses to establish communication with a WLC?
Virtual Router Redundancy Protocol - pretty much the same as HSRP
The same as a standby group in HSRP
1-LAP gets a DHCP address - 2-LAP learns IP of available WLC - 3-LAP sends a join request to WLC and receives join reply - 4-WLC sends code image - if necessary - 5-Tunnels are created
Bridge priority and MAC
27. EAP encryption
Virtual Router Redundancy Protocol - pretty much the same as HSRP
Flash override (class 4)
Dynamic WEP keys that change periodically
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
28. What are the 6 HSRP states?
Low cost - high density ports - multiple scalable uplinks - vlans - traffic and protocol filtering and QoS
Disabled - init - listen - speak - standby - active
The DCF interframe space- the random backoff time before a wireless set can transmit
Effectively stops STP on filtered ports
29. What are the two private vlan association modes?
Promiscuous and host
Incoming frames dropped - but MACs learned
Yes
On by default
30. What is the cost of a 10Gbps link?
Can hear only BDPUs
2
134 bits
An AP's coverage area
31. unknown unicast flooding
Yes
2-8 FE - GE - or 10GE are bundled.
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
No
32. How does uplinkfast handle changes in topology?
16 - of which up to 8 are active. The others are in standby
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
Notifies upstream neighbors by sending multicasts on behalf of hosts at the interval of the max update rate parameter.
L2
33. How does RSTP converge?
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
1-65535 (def 32768) lower priority - higher probability
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Manually
34. What is arp throttling?
During the time that the FIB entry is in CEF glean waiting for ARP entries - subsequent packet to that host are dropped to keep input queues from filling
Transmits keystrokes from phone and commands from CCM
Yes
Only on ports that have same static VLANs or trunking. It also modifies parameters of the channel if one of the ports is modified
35. What are the 6 steps to configure 802.1x for port security?
When the size of a cell is intentionally reduced
No
Variation in delay
1-enable AAA on switch - 2-define RADIUS servers - 3-define authentication method - 4-enable 802.1x on switch - 5-conf. 802.1x ports - 6-allow hosts
36. What categories can ports be in with dhcp snooping enabled?
Switch(config-if)# glbp xx where xx = group number
Cisco ILP and 802.3af
Trusted or untrusted
300 sec by default
37. What is integrated services model QOS?
Group (0-255) - priority (1-254 254 is highest - 100 default)
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
900 MHz - 2.4Ghz - and 5-6GHz
No
38. What is the range of HSRP group numbers?
The number of STP instances needed ot support the desired topologies and whether to map a set of VLANs to each instance
Those that connect to other switches
0-255
Port is forced to never authorize any connected client
39. Which ports should you consider trusted for DAI?
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Distribution layer
Yes to both
Those that connect to other switches
40. What is a QoS trust boundary?
1- root bridge is elected - 2-the state of eery switch port in the STP domain must be brought from blocking state to the appropriate state
A MAC is seen on a different port
The point at which a switch decides to trust incoming Qos. Usually at boundary with ISP
Real-time Transport Protocol
41. What is dynamic desireable?
Both ends should be on because on modes doesn't send PAgP or LACP packets
The port asks the other end to trunk
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Switches make an effort to move packets as quickly as possible
42. What must be in common for a BSS to form?
By using an Ether-IP tunnel
Matching SSID - compatible data rate - authentication credentials
RPR - RPR+ - and SSO
With portfast
43. At what layer does EAPOL run?
Hosts within a secondary can communicate with each other and with the primary - but not with another secondary vlan
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
Full duplex
L2
44. How does ILP do power discovery?
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
Real-time functions such as beacons and probes - encryption and interactions with the client at L2
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
The number of times the entry has been updated since the table was generated
45. How does IPT behave when the voice VLAN is in vlan-id mode?
By using a trunk link
Almost eliminates listening and learning states for single hosts on an access link
The wireless clients communicate directly with no other means of connectivity such as a WAP
Data goes over native vlan - voice goes over specified VLAN - voice QOS is 802.1p
46. What is a punt adjacency?
It updates the L2 headers with the proper src and dst MAC - L3 TTL - L3 checksum - and L2 checksum information
1500B
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
Packets must be sent to the L3 engine for further processing
47. What can cause a wireless client to switch between Aps?
Missed beacons - dropped packets (max retry) - weak signal (data rate switches down) - an AP periodicallytries to find a stronger signal
Port
802.1D
Determines when the AVG will stop using the old VMAC in ARP replies
48. Which 4 things must be agreeable to trunk?
As a VLAN access map
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Both layer 2 switching and IVR
Virtual Router Redundancy Protocol - pretty much the same as HSRP
49. What is differentiated services model QOS?
Flash override (class 4)
Isl - dot1q - negotiate (default)
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
Each network device handles packets individually with no advance reservations
50. How does DSCP handle IP precedence?
Auto mode
5 classes with 3 drop precedences
16 - of which up to 8 are active. The others are in standby
Untrusted