SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNP Switch Deck
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccnp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What routing protocols support NSF?
Switching Database Manager - configures and prunes TCAM partitions
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
BGP - EIGRP - OSPF - and IS-IS.
Routers are assigned to common GLBP group. All routers can be active and can load balance
2. If the WLC connects to an Etherchannel - how should the channel be configured and why?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. What are the two private vlan association modes?
Promiscuous and host
134 bits
Flash override (class 4)
Used when ACLs specify port ranges...used by TCAM
4. What is the STP forwarding state?
Edge - root - and point to point
1-(opt) set system priority - 2-select interface(s) - 3-assign the protocol - 4-set the mode - 5-(opt) set the port priority
Each peer sends and receives hellos. Def hello is 3 sec - def hold is 10 sec
After another forwarding delay - the port can send and receive data frames - collect MAC addresses - and send and receove BDPUs
5. How is a QoS trust bondary configured?
Will trunk if asked
Every switch and router in a network must be configured with appropriate QoS features and policies
Source IP - dest IP - combination of source and dest IP - source and dest MAC - or TCP/UDP port numbers
Automatically using DTP and CDP
6. What are the RSTP port states?
Real-time Transport Protocol
Discarding - learning - forwarding
Edge - root - and point to point
Differentiated services code point
7. What is RTP?
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
On root - because the root bridge propagates timers with config BDPU
A TCN BDPU is sent out of the switch's root port. The switch will continue sending TCN's every hello interval until ack'd by upstream neighbor. The root bridge will send a Config BDPU to all switches
Real-time Transport Protocol
8. What is common spanning tree (CST)?
Flash override (class 4)
The configureable UDLD interval must be less than max age plus two intervals of forward delay
Distribution layer
Single instance of STP for all VLANs. BDPUs are sent over trunks using the native VLAN with untagged frames. Dot1q based
9. How does Root Guard work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. If one end of an Etherchannel (either type) is set to on and the channel doesn't form - what should you check?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. What happens during HSRP failover?
The standby becomes active and stays active by default. Preemption can be configured
26-byte header - 4-byte trailer with CRC
16 bits (8b port priority - 8b port number)
Compatible with 802.11b - up to 54Mbps in 12 data rates - 3 channels - 2.4Ghz
12. What is BDPU Guard?
If any BDUP is received on a port - it puts the port into the errdisable state
Regions and instances
By using an Ether-IP tunnel
802.1x with EAP over LAN (EAPOL)
13. How does ISL do trunking?
From the DHCP snooping database or from static entries
Isolated and community
By encapsulating each frame in a header and trailer
The same as a standby group in HSRP
14. What are the characteristics of the distribution layer?
A VLAN that spans the entire fabric
Aggregation - high L3 throughput - security and policy based connectivity functions through access lists and packet filters - QoS - scalable high-speed links
Control functions
Group (0-1023) priority (1-255 higher better def 100)
15. What is accelerated CEF (aCEF)?
Port stays up - but packets from violating MACs are dropped. Switch logs violating packets
CEF is distributed across multiple L3 forwarding engines - typically on Catalyst 6500 line cards each having only a subset
Switch(config-if)# standby xx where x= group number
2 seconds (def)
16. What is a CEF punt?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. What is DSCP codepoint EF(46)?
SC fiber or RJ-45
When the size of a cell is intentionally reduced
3 seconds. Holdtime =3 hellos + 1
Critical...used most often for IPT
18. Which 4 things must be agreeable to trunk?
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
First configure a L3 interface in same VLAN as clients - then use the ip helper-address command to ID the DHCP server
4
Time between BDPUs sent by root bridge. Default of 2 seconds
19. What is NSF?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Only the standby monitors the hello messages from the active router
1-client sends DHCP discover as broadcast - 2-DHCP server sends DHCP offer - client sends DHCP Request - DHCP server sends DHCP ack
Nonstop forwarding is an interactive method focusing on rebuilding the RIB after SUP switchover
20. What are the RSTP port roles?
Between any type of interface as long as the interface can have an L3 address assigned
Root - designated - alternate - and backup
Dynamic arp inspection
The frame tag includes a 3 bit COS value from 0 (low) to 7 (high). Native vlans are untagged so no COS
21. How does a LAP and a WLC authenticate between each other?
Using digital certificates
The station can transmit immediately and wait for an ack
Causes switch to actively determine whether alternative paths exist to root bridge in case ther eis an indirect failure
Yes to both
22. what if a secondary VLAN?
Globally or per-port
Hosts associated with a secondary VLAN can communicate with ports on the primary but not with another secondary VLAN
Set the native VLAN of a trunk to a bogus or unused VLAN ID then prune the native VLAN off both ends of the trunk
Port is forced to never authorize any connected client
23. What is the STP disabled state?
Admin down
A packet can't be switched in hardware with the FIB and must go to the L3 engine
The switch adds its MAC to the option 82 field so that the DHCP reply echoes back the switch's own information
BGP - EIGRP - OSPF - and IS-IS.
24. How does IPT behave when the voice VLAN is in untagged mode?
1500B
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
Data and voice over native vlan - no QOS but still uses 802.1p trunk
Show standby
25. If you want IP source guard to detect spoofed MAC addresses - what must you do?
The frame tag contains a 3 but portion tagged from 0 (low) to 7 (high)
Allows devices to interoperate with PVST and CST. Can use both dot1q and ISL
Turn on port security
Configure non-silent submode
26. What is a PVLAN?
A private VLAN can be logically associated with a special secondary vlan
The port will operate under 802.1D rules. If they are received on the same port - it will run 802.1D until the migration delay expires
Bridge priority and MAC
Host Standby Router protocol. Cisco proprietary. Switch is either active - standby - or listen
27. What format does the GLBP MAC use?
0007.b4xx.xxyy where xx.xx is six 0 bits followed by a 10-bit GLBP group numberr. Yyyy is the virtual forwarder number
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
Prevents the dhcp binding DB from being checked.
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
28. What are dynamic VLANs based on?
1-1005 (1 and 1002-1005 are reserved)
MAC of the end device
Configure non-silent submode
Any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable
29. What is Per VLAN STP (PVST)?
Globally
Disabled - init - listen - speak - standby - active
Distribution
Cisco proprietary. 1 instance of STP/VLAN. Requires ISL instead of dot1q
30. On what scope is DAI enabled?
Trunk
Based on priority (0-255). Default is 100. Highest IP is tie breaker
Per VLAN
1- trunking mode - 2-trunk encapsulation - 3-native VLAN - 4-allowed VLAN
31. What is the port priority range?
Create 2 hsrp groups - each with the active router being different switches - then have clients point to each
0-255 (lower is better)
The time that a port spends in both listening and learning states . Default 15 seconds
Routers at the distribution layer become the bottlenecks or broadcast or multicast traffic slows the switches in the switch block
32. What are the 2 types of secondary VLAN?
Immediate (class 2)
Enables switches at the end of the spanning tree branches to have a functioning root port while keeping 1 or more redundant potential ports in blocking mode. When the main fails - the other comes up.
Isolated and community
1- enable qos - 2-define qos parameters to be trusted - 3-make trust conditional - 4-instruct IP phone how to extnd boundary
33. what I s distributed CEF (dCEF)?
Half-duplex
Once the CCM gives them the parameters - they use RTP
CEF is distributed completely among multiple L3 forwarding engines.
By sending a gratuitous ARP
34. What pins does FE use?
1/2 and 3/6
Disabled - blocking - listening - learning - forwarding
Configuration and TCN
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
35. How does the VRRP master router handle the VIP?
Untrusted
The master router can share the VIP
As a VLAN access map
1-name the chain - 2-establish a key number - 3-create the key string - 4-apply the chain to the string
36. what do multilayer switches do?
A path is pre-arranged for priority along the complete path from source to destination using the RSVP protocol.
Both layer 2 switching and IVR
134 bits - consisting of source and destination addresses and protocol information from the packet or frame
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
37. What is the default VTP state?
Half-duplex
A client can roam to any WLC as long as it stays in a mobility group
VTP server for domain null with no password or secure mode
Flash (class 3)
38. How is UDLD configured?
For hosts that doesn't understand routing - the DGW is configured to reply with its own mac
Per-port or globally for all fiber-optic ports. Can be enabled globally - but will only affect fiber ports
When a wireless station transmits a frame - the receiving one must send an ack
1-(opt) configure load balancing - 2-select the interface(s) - 3-assign the protocol - 4-select the mode and submode
39. What is RPR+?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. What does the standby HSRP router do?
Change in trunk encap
Only the standby monitors the hello messages from the active router
No shut
Another router must have a higher HSRP priority and have preemt set up
41. What is GLBP weight?
By default weight is 100. Can be made dynamic per interface
FE and GE
It can't
Dynamic arp inspection
42. What are the 5 STP states?
LWAPP (Cisco proprietary) and CAP-WAP (standards based)
If a proposal is received - the recipient isolates - all nonedge ports blocked until proposal sent causing neighbors to synch - which propagates out in waves
Disabled - blocking - listening - learning - forwarding
L2
43. What are the 3 trunk switchport modes?
Switches make an effort to move packets as quickly as possible
Trunk - dynamic auto - dynamic desireable (default)
16 - IST gets MSTI 0 - 1-15 are available for use. MSTIs are locally significant to the MST region
The station must wait until the frame in progress has completed - then wait a random amount of time before transmitting
44. unknown unicast flooding
Each physical interface has a different IP address. All physical interfaces point to a virtual interface called the standby address or VIP
MAC addresses are learned from the source MAC of incoming frames. If the destination address is unknown - the frame is flooded out all except the receiving port.
One that can be detected on a switch interface (ie. Up/down)
Time between BDPUs sent by root bridge. Default of 2 seconds
45. At what layer does EAPOL run?
1 IP subnet
MAC of the end device
Roughly 50%
L2
46. Automatically configure STP timers
224.0.0.2 (all routers)
Use the spanning-tree root macro
PAgP (Cisco proprietary) and LACP (standards-based)
The number of times the entry has been updated since the table was generated
47. What is the access layer best practice?
All L2 connectivity should be contained within the access layer.
By brining up a tunnel between them to carry 802.11 related messages and client data.
19
Interim solution - uses same hardware as WEP - but uses TKIP encryption
48. What is the VRRP skew time?
Src-dst-ip
Only for trusted Cisco gear - especially phones
Hold time is 3xhello. A skew time of 256ms-routerpriority)/256ms is added
Using a single WAP to centralize access and control over a group of wireless devices.
49. How much BW does a PSTN connection use?
63 kbps
They must be carried over a voice VLAN (VVID) or over a regular data VLAN (ie. The native VLAN or the PVID)
Connects to a host on an isolated or community vlan. Communicates only with promiscuous port or ports on same community vlan
Sends special layer 2 UDLD frames and expects an echo. Both ends must be configured for UDLD
50. What is the default network diameter?
7 switches from root bridge
80% of the user traffic should stay in the VLAN
A private VLAN can be logically associated with a special secondary vlan
Prevents the dhcp binding DB from being checked.