SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does the switchport host macro do?
Sets the switchport mode to access - enables portfast - and turns off channel grouping for the port
Between interfaces that are assigned to L2 VLANs or L2 trunks
224.0.0.2 (all routers)
One that can be detected on a switch interface (ie. Up/down)
2. How is a QoS trust bondary configured?
Round robin - weighted - or host-dependent
5 classes with 3 drop precedences
Every switch and router in a network must be configured with appropriate QoS features and policies
Stateful switchover - redundant sup is fully booted and init'd. Both start and run config are synched as is L2 information - and switchinterfaces.
3. How do you configure LACP standby links?
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
LACP port priority
Backbonefast uses RLQ to determine if upstream switches have stable connections to root bridge
Based on priority (0-255). Default is 100. Highest IP is tie breaker
4. How does RSTP converge?
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Yes
Normal and aggressive
5. Where is loop guard enabled?
The port uses 802.1x exchange to move from unauthorized to authorized. Requires app on client
2 seconds
All nondesignated ports - but ok for all ports
The port is forced to always authorize any connected client with no authentication necessary (default)
6. If the WLC connects to an Etherchannel - how should the channel be configured and why?
7. How does HSRP plain text authentication work?
All non-edge ports are discarding. After the root bridge is identified - the port with superior BDPU becomes root
That they aren't using the same frequencies.
A key string of up to 8 characters is sent. Default is cisco.
Immediate (class 2)
8. What is the FM?
One router is the active virtual gateway - has highest priority or IP in group - answers all ARP requests and gives MAC based on load balancing
Auto mode
Used to switch packets that can't be forwarded normallly due to an encapsulation failure - unresolved address - unsupported protocol - etc.
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
9. What are the characteristics of the core layer
The port asks the other end to trunk
Very high L3 throughput - no access lists or port filtering - redundancy and resilience - advanced QoS
Silent
1 per segment
10. What is the size of ISL encapsulation?
By creating a static IP binding
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
MAC of the end device
26-byte header - 4-byte trailer with CRC
11. What is a CEF punt?
12. How many designated ports are there?
Feature Manager - after the ACL is created - the FM compiles the ACEs into the table
1 per segment
0-255
Immediate (class 2)
13. What is an indirect topology change?
The link status stays up - but something between them has failed or is filtering traffic
L2
Round robin - weighted - or host-dependent
Based on priority (0-255). Default is 100. Highest IP is tie breaker
14. What does IP source guard do?
2 seconds (def)
Makes use of the DHCP snooping database and static ip source binding entries. If enabled - switch will test addresses
Yes
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
15. What is the default 802.3af power class and its use?
16. RSTP edge port
Distribution layer
Bridge priority and MAC
Round robin - weighted - or host-dependent
Only a single host connects . If one BDPU is received - it is no longer an edge port
17. What are the gotchas for uplinkfast?
18. How do you configure a DHCP gateway?
Receives the first packet of a traffic flow and routes it
Sends a test tone on the transmit pair. If a device is detected - CDP is used to narrow down the power class.
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
Can hear only BDPUs
19. What are the RSTP port roles?
Src-dst-ip
One that can be detected on a switch interface (ie. Up/down)
Route once - switch many
Root - designated - alternate - and backup
20. How many 802.3af power classes are there?
5 (0-4 with 4 being the highest)
Those that connect to other switches
Flash override (class 4)
Controls where candidate root bridges can be connected and found on a network
21. WPA encryption
Interim solution - uses same hardware as WEP - but uses TKIP encryption
Each network device handles packets individually with no advance reservations
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
0-65535 (def 32768) lower=better
22. What is a PVLAN?
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Dynamic WEP keys that change periodically
802.11
A private VLAN can be logically associated with a special secondary vlan
23. When DHCP snooping is turned on - by default - it considers all ports ______
12 kbps with headers and compression
If three are missed in a row - the neighbor is considered down and the data for that neighbor is aged
Untrusted
No shut
24. Which 4 things must be agreeable to trunk?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
On root - because the root bridge propagates timers with config BDPU
Promiscuous and host
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
25. What categories can ports be in with dhcp snooping enabled?
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
Lowest cumulative cost to root
Every hello interval regardless of whether BDPUs are received from root - allowing any switch to take an active role maintaining the topology
Trusted or untrusted
26. What is RPR?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Route processor redundancy - redundant sup is partially booted and initialized and must reload module in the switch and init all sup functions
Src-ip - dst-ip - src-dst-ip - src-mac - dst-mac - src-dst-mac - src-port - dst-port - src-dst-port
If a unidirectional link is detected - the switch doesn't try to reestablish the link. ULD msgs are sent once/sec for 8 seconds - then the port is err-disabled
27. What are the characteristics of the distribution layer?
The station can transmit immediately and wait for an ack
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Either desirable or auto mode
Configure and enable DHCP snooping
28. What is an end to end vlan?
A VLAN that spans the entire fabric
1-65535 (def 32768) lower priority - higher probability
Forces the router to wait for a period of time after the switch is reloaded before attempting to overthrow
Disabled - blocking - listening - learning - forwarding
29. What is DCF?
Using digital certificates
Manually
Distributed coordinion function - the use of timers to prevent wireless collisions
Roughly 2000
30. What is the range of PAgP channel group numbers?
FE and GE
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
Configure and enable DHCP snooping
1 to 64
31. RSTP learning state
Automatically using DTP and CDP
Incoming frames dropped - but MACs learned
Switch(config-if)# glbp xx where xx = group number
A VLAN that spans the entire fabric
32. What happens when switches receive a configuration BDPU?
They shorten their bridge table aging times from default (300sec) to the fowarding delay (15 sec)
Traffic types and patterns - amount of L3 switching cap. At dist. Layer - # users at access layer - geography - size of spanning tree domains
Will trunk if asked
By default weight is 100. Can be made dynamic per interface
33. What does the minimum keyword do in HSRP?
By an ARP access list that defines the permitted bindings
Incoming frames are dropped (combination of disabled - blocking - and listening)
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
Forces the router to wait for a period of time before attempting overthrow
34. How does HSRP port tracking work?
35. WEP encryption
By configuring every switch port to have an expected and controlled behavior
RPR - RPR+ - and SSO
Weak key rotation
Distribution
36. How does a DAI enabled switch gather trusted ARP info?
From the DHCP snooping database or from static entries
Switchpotrt nonegotiate
1 per segment
Globally
37. What functions does a WLC perform?
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Control functions
Checks the destination MAC in the header against the target MAC in the ARP reply
A key string of up to 8 characters is sent. Default is cisco.
38. What does UDLD do?
Discarding - learning - forwarding
Protects STP when a physical malfunction only allows traffic in 1 direction - even though the link shows as up (cisco proprietary)
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
When each AP stands alone within the larger network.
39. What are LOU register pairs?
Local only
Globally or per-port
Used when ACLs specify port ranges...used by TCAM
Distribution
40. How long are TCAM masks?
134 bits
Checks the sender's ip in all arp requests and checks the sender's IP against target IP in all replies
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
1-65535 (def 32768) lower priority - higher probability
41. Where should you change the network diameter value?
The same as a standby group in HSRP
19
An L2 switch can only forward frames best effort unless going across a trunk
Cisco recommends only on the root bridge
42. What is the default network diameter?
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
On all switches in network to enable RLQ request and reply
7 switches from root bridge
2 seconds
43. What does the RP do?
Distribution
Receives the first packet of a traffic flow and routes it
One that can be detected on a switch interface (ie. Up/down)
Edge - root - and point to point
44. When looking at the sh spanning tree output - What does P2P denote?
A point to point port type
Value - mask - and result (VMR) combinations
Distribution layer
SC fiber or RJ-45
45. What is SSO?
46. Where is UDLD enabled?
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
All fiber-optic links between switches (must be enabled on both ends)
Matching SSID - compatible data rate - authentication credentials
By sending a gratuitous ARP
47. What is an SVI?
An ac adaptor that plugs into a wall outlet.
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
1- enable MST - 2-enter MST config mode - 3-assign region name and region configuration rev - 4-map vlans to an MSTI - 5-show pending changes - 6- commit by exiting
48. What is a vlan?
By name - config revision - and instance to vlan mapping table
Switched Virtual Interface - an L3 address can be assigned to a logical interface that represents an entire VLAN - which becomes the DGW for that VLAN
A single broadcast domain
The standby becomes active and stays active by default. Preemption can be configured
49. What is the size of a TCAM value?
When a wireless station transmits a frame - the receiving one must send an ack
By sending a gratuitous ARP
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
A private VLAN can be logically associated with a special secondary vlan
50. One vlan should =
Automatically negotiates a common trunk mode between switches
Priority (class 1)
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
1 IP subnet