CCNP Switch 2

Tyson Mckay
Quiz by Tyson Mckay, updated more than 1 year ago More Less
Tyson Mckay
Created by Tyson Mckay over 1 year ago


50 Questions

Resource summary

Question 1

A network engineer is trying to deploy a PC on a network. The engineer observes that when the PC is connected to the network that it takes 30 to 60 seconds for the PC to see any activity on the network interface card. Which layer 2 enhancement can be used to eliminate this delay?
  • Configure port duplex and speed to auto negotiation
  • Configure port to duplex full and speed 1000
  • Configure spanning-tree portfast
  • Configure no switchport

Question 2

While working in the core network building, a technician accidently bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced the link did not recover. What solution allows the network to recover from such an issue?
  • command aliases
  • macros
  • Bidirectional Forwarding Detection
  • errdisable autorecover
  • IP Event Dampening

Question 3

What is the value of the TPID/tag protocol identifier in dot1q?
  • 0x888E
  • 0x8100
  • 0x0806
  • 0x0800

Question 4

A network engineer wants to use UDLD, what does he need to consider? Uni-Directional Link Detection
  • UDLD can aggressively disable the port after eight failed retries
  • UDLD is layer 1
  • UDLD is working with non Cisco devices
  • UDLD is a non-propriety technology

Question 5

What is the process to configure EtherChannel?
  • Shutdown the interface on one side only
  • Configure all ports up to 8 with no shut command
  • Shutdown all ports
  • Shutdown is necessary if the ports are in err-disable

Question 6

A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended VLAN segment?
  • Use VTP pruning on the trunk interfaces
  • Configure manual trunk pruning between the two locations
  • Modify the spanning-tree priorities to dictate the traffic flow
  • Create a Layer 3 transit VLAN to segment the traffic between the sites

Question 7

Which four LACP components are used to determine which hot-standby links become active after an interface failure within an EtherChannel bundle? Choose 4
  • Interface bandwidth
  • LACP system priority
  • System ID
  • Hot-Standby link ID number
  • Interface MAC address
  • LACP port priority
  • Port Number

Question 8

A network administrator configures 10 extended VLANs ranging from VLAN 3051 to 3060 in an enterprise network. Which version of VTP supports these extended VLANs?
  • Version 2
  • Version 1
  • Version 3
  • VTP does not recognize extended VLANs

Question 9

If Storm Control is enabled on a port and the traffic reaches the configured level which two actions can be configured to occur? Choose 2
  • Trap
  • Log
  • Shut down
  • Notify Admin
  • Redirect traffic

Question 10

Which statement is true about dynamic access port?
  • None until the port VLAN is determined
  • Per default the port has to participate in a VLAN election to determine which VLAN a port is assigned to
  • All VLANs are permitted in a dynamic access port link
  • VLAN 1 is the default VLAN

Question 11

Which option describes the limitations of LLDP?
  • LLDP does not support TLVs
  • LLDP can discover up to two devices per port
  • LLDP cannot provide information about VTP
  • LLDP can discover only windows server

Question 12

Which database in used to determine the validity of an ARP packet based on a valid IP-to-MAC address binding?
  • DHCP snooping database
  • Dynamic routing database
  • Static ARP database
  • Dynamic ARP database

Question 13

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure. What percentage of outgoing traffic from subnet is being forwarded through R1?
  • R1-50%, R2-50%
  • R2-100%
  • R1-100%
  • R1-0%

Question 14

Which information does the subordinate switch in a stack keep for all the VLANs that are configured on it?
  • Routing information
  • DHCP snooping database
  • Spanning-trees
  • VLAN database

Question 15

What does the following configuration tell us? switch#show standby virtual-ip address is Hello time 3 sec, hold time 10 sec Preemption disabled Active router is priority 85 Standby router is local Priority 90 Track interface f1/0 state decrement 10
  • is active because it has a higher IP address
  • The standby will take over when it has a higher priority
  • When f1/0 is down priority with be 80
  • It is using the default Hello and hold values

Question 16

Which option shows the expected result if a show vlan command is issued?

Question 17

What is the default value for the err-disable recovery interval in a Cisco switch?
  • 600 seconds
  • 30 seconds
  • 100 seconds
  • 300 seconds

Question 18

What is the command to enable EtherChannel STP misconfig
  • (config)#spanning-tree etherchannel guard misconfig
  • (config-if)#spanning-tree etherchannel guard misconfig
  • (config-if)#spanning-tree etherchannel misconfig guard
  • (config)#spanning-tree etherchannel misconfig guard

Question 19

A network engineer tries to configure storm control on an EtherChannel bundle. What is the result of the configuration?
  • The storm control settings will appear on the EtherChannel but not on the associated physical ports.
  • The configuration will be rejected because storm control is not supported for EtherChannel.
  • The storm control configuration will be accepted but will only be present of the physical interface.
  • The settings will be applied to the EtherChannel bundle and all associated physical interfaces.

Question 20

For security reasons that IT Manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? Choose 2
  • Apply BPDU guard and BPDU filter
  • Enable switchport block on access ports
  • Configure trunk and access interfaces manually
  • Disable DTP on a per interface basis.

Question 21

When a network administrator is attempting an SSH connection to the device, in which order does the device check the login credentials?
  • Line password, local username, RADIUS server
  • Line password, RADIUS server, local username
  • RADIUS server, local username, Line password
  • RADIUS server, line password, local username

Question 22

Which statement describes what happens when a port configured with root guard receives a superior BPDU?
  • The port goes into errdisabled state and stops forwarding traffic
  • The port goes into BPDU-inconsistent state and stops forwarding traffic
  • The port goes into loop-inconsistent state and stops forwarding traffic
  • The port goes into root-inconsistent state and stops forwarding traffic

Question 23

Which two statements are true about recommended practices that are to be used in a local VLAN solution design where layer 2 traffic is to be kept to a minimum? Choose 2
  • VLANs should be local to a switch
  • VLANs should be localized to a single switch unless voice VLANs are being utilized
  • Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
  • Routing should not be performed between VLANs located on seperate switches
  • Routing may be performed at all layers but is most commonly done at the core and the distribution layers.

Question 24

What statement is true if a new switch with a lower bridge ID is introduced in a network with root guard enhancement?
  • Prevent unknown switch be a root port
  • Allow two root bridges in a network
  • All ports of the new switch are changed to listening state
  • Root Guard puts the port into root-inconsistent state

Question 25

What is the result of the SPAN configuration on a Cisco switch? Choose 1
  • Configure a SPAN session to monitor received traffic on interface g0/4 for all VLANs except VLAN 3.
  • Configure a SPAN session to monitor the received traffic on interface g0/4 only for VLAN .
  • Configure a SPAN session to monitor the received traffic on interface g0/5 only for VLAN 3.
  • Configure a SPAN session to monitor the received traffic on interface g0/5 for all VLANs except VLAN 3.

Question 26

What is the priority value or the VLAN 105 HSRP group DSW2?
  • 150
  • 100
  • 50
  • 200

Question 27

An enterprise network has port security sticky enabled on all access ports. A network administrator moves a PC from one office deck to another. After the PC is moved, the network administrator clears port security on the new network switch port securing the PC but the port keeps going back into err-disable mode. Which two factors are possible causes of the issue?
  • Port security must be disabled on all access ports
  • Port security sticky is still enabled on the older network switch ports
  • Port security is still enabled on the older network
  • Port security sticky exists on the new network switch port
  • Port security sticky is disabled on the new network switch port

Question 28

Which information does CDP supply from connected devices? Choose 3
  • Interface ID
  • Config Register
  • Hardware Platform
  • Not Available
  • Hostname

Question 29

During routine maintenance it became necessary to shut down the ge1/0/1 interface on DSW1 and DSW2. All other interfaces were up. During this time, DSW1 became the active router for the VLAN 104 HSRP group. As related to the VLAN 104 HARP group, what can be done to make the group function properly.
  • On DSW1 disable preempt
  • On DSW1 increase the decrement value in the track command to a value greater than 6.
  • On DSW1, decrease the decrement value in the track command to a value less than 1.
  • On DSW2 decrease the priority value to a value less than 150.

Question 30

What command does an network engineer use to verify the spanning-tree status on VLAN 10?
  • switch# show spanning-tree summary
  • switch# show spanning-tree bridge
  • switch# show spanning-tree brief
  • switch# show spanning-tree vlan 10
  • show spanning-tree vlan 10 brief

Question 31

If HSRP group number is 37, what would the MAC address be?
  • 000-C007-AC37
  • 000-0C07-AC37
  • 000-C007-AC25
  • 000-0C07-AC25

Question 32

What statement about SPAN and RSPAN configuration on SW1 is true?
  • SPAN session 2 monitors all traffic entering and exiting port fa0/15
  • SPAN session 2 only monitors egress traffic exiting port fa0/14
  • RSPAN session 1 monitors activity on VLAN 50 of a remote switch
  • RSPAN session 1 is incompletely configured for monitoring

Question 33

You are adding new VLAN500 and VLAN600 to the topology in such a way that you need to configure SW1 as primary root for VLAN500 and secondary for VLAN600 and SW2 as root primary for VLAN600 and secondary for VLAN500. Which configuration step is valid?
  • Configure VLAN500 and VLAN600 on SW1, SW2 and SW4
  • Configure VLAN500 and VLAN600 on SW2 only
  • On SW2 configure VTP mode as off and configure VLAN500 and VLAN600
  • Configure VLAN500 and VLAN600 on both SW1 and SW2
  • Configure VLAN 500 and VLAN600 on SW1 only

Question 34

What happens on a Cisco switch when an RSTP configured switch receives 802.1d BPDU?
  • 802.1d does not understand RSTP BPDUs because they are different versions, but when an RSTP switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the two switches run 820.1d to communicate
  • 802.1d understands RSTP BPDUs because they are the same version, but when a RSTP switch receives a 802.1d BPDU, it responds with a 802.1d BPDU and eventually the two switches run 802.1d to communicate.
  • 802.1d does not understand RSTP BPDUs because they are different versions, but when a RSTP switch receives a 802.1d BPDU, it does not respond with a 802.1d BPDU.
  • 802.1d understands RSTP BPDUs because they are the same version, but when a RSTP switch receives a 802.1d BPDU, it does not respond with a 802.1d BPDU and eventually the two switches run 802.1d to communicate.

Question 35

MAC address filter
  • router
  • unicast
  • multicast
  • CPU-destined

Question 36

DHCP snooping and IP Source Guard have been configured on a switch that connects to several clients workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?
  • Packets from the workstation will be rate limited according to the default values set on the switch.
  • The packets originating from the workstation are assumed to be spoofed and will be discarded.
  • Traffic will pass accordingly after the new IP address is populated into the binding database.
  • The interface that is connected to the workstation is question will be put into the err-disable state.

Question 37

A new network that consists of several switches has been connected together via trunking interfaces. If all the switches currently have the default VTP domain name "null", which statement describes what happens what a domain name is configured on one of the switches?
  • The switch with the non-default domain name restores back to "null" upon reboot.
  • Switches with higher revision numbers does not accept the new domain name
  • All other switches with the default domain name become VTP clients
  • VTP summary advertisements are sent out of all ports with the new domain name.

Question 38

Which statement about Cisco devices learning about each other through CDP is true?
  • Each device sends periodic advertisements to a central device that builds the network topology
  • Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC
  • Each device sends periodic advertisements to all IP addresses in its ARP table.
  • Each device broadcasts periodic advertisements to all of its neighbors.

Question 39

When you configure private VLANs on a switch which port type connects the switch to the gateway router?
  • promiscuous
  • community
  • isolated
  • trunked

Question 40

Which EtherChannel negotiation protocol is configured on the interface f0/13 - f0/15
  • Link Combination Control Protocol
  • Port Aggregation Protocol
  • Port Combination Protocol
  • Link Aggregation Control Protocol

Question 41

To provide security a service provider configured various private VLANs in its backbone network infrastructure to prevent certain VLAN communicating to each other. Which version of VTP supports the use of private VLANs?
  • Version 1
  • Version 2
  • Version 3
  • VTP does not support private VLANs

Question 42

All ports are members of VLAN 10. Considering the default cost of upstream bridges to the root bridge is equal, which option will be the new root port for VLAN 10?
  • Interface f0/13
  • Interface f0/14
  • Interface f0/15
  • Interface f0/21

Question 43

What action should a network admin take to enable VTP pruning on an entire management domain?
  • Enable VTP pruning on any switch in the management domain
  • Enable VTP pruning on any client switch in the domain
  • Enable VTP pruning on a VTP server in the management domain
  • Enable VTP pruning on every switch in the domain
  • None of the other alternatives apply

Question 44

Which HSRP extension allows groups to share traffic loads?
  • CGMP
  • FHRP
  • GLBP

Question 45

What is the default value for spanning-tree port-priority?
  • 128
  • 64
  • 1024
  • 32

Question 46

A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. CDP is not supported , so the standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?
  • LLDP
  • LLTD
  • NDP
  • IRDP

Question 47

What is the size of the VLAN field inside an 820.1q frame?
  • 8 bit
  • 16 bit
  • 32 bit
  • 12 bit

Question 48

After implementing VTP, the extended VLANs are not being propagated to other VTP switches. What should be configured for extended VLANs?
  • Enable VTP version 3 which supports extended VLAN propagation
  • VTP authentication is required when using extended VLANs because of their ability to cause network instability
  • VTP does not support extended VLANs and should be manually added to all switches
  • Ensure that all switches run the same Cisco IOS version. Exteneded VLANs will not propagate to different IOS versions when extended VLANs are in use.

Question 49

What is the default interval at which Cisco devices send CDP advertisements?
  • 120 seconds
  • 300 seconds
  • 30 seconds
  • 60 seconds

Question 50

Private VLANs (PVLANs) have two secondary VLAN types. What are they?
  • Community
  • Promiscuous
  • Host
  • Isolated
Show full summary Hide full summary


01 Types of Computers
Golf Putter
Ysabelle Glori
Digital Technologies
Sociological Perspectives
Memory Key words
Sammy :P
Rights and Responsibilities
History of Surgery Mind Map
James Copley
Biology B1
Chloe Winn
AS Chemistry - Enthalpy Changes
Sarah H-V
Vocabulary Words
Jenna Trost