CCNP SWITCH Exam Back to Exams Page 1. Which of the following are not capabilities of the access layer in a hierarchical network design? Low cost per switch port Security and policy-based connectivity functions High Layer 3 routing throughput High port densityQuestion 1 of 50 2. Which of the following is a characteristic of a core layer in a hierarchical network design? Aggregation of multiple access layer switches No costly or unnecessary packet manipulations (access lists, packet filtering) QoS features High port densityQuestion 2 of 50 3. When is a switch block considered to be too large? When the routers at the distribution layer become traffic bottlenecks When the broadcast or multicast traffic slows the switches in the switch block When you have more than 100 users connected to a single switch block When you start having more than 1G of traffic on the uplinks of the switches in the switch blockQuestion 3 of 50 4. What are some of the best practices with regards to the redundant hierarchical network design? Design each layer with pairs of switches Extend VLANs beyond distribution switches Connect each switch to the next higher layer with two links for redundancy Connect each pair of distribution switches with a link, but do not connect the access layer switches to each otherQuestion 4 of 50 5. What are the drawbacks of this hierarchical network design? The PCs should have been connected to the core switches to avoid loosing the network connectivity If the uplink of the access switches fails, the users connected to the that access switch will lose their connectivity to the network If the distribution switch fails, then the access switches will lose their connectivity to the network There are too many PCs connected to the access switchesQuestion 5 of 50 6. What is the drawback of this hierarchical network design? For increased redundancy, you always need four switches in the core There are no drawbacks with this design In case of a distribution uplink failure, the distribution switch will not be able to provide network connectivity to the access switches There is no uplink redundancy at access switches levelQuestion 6 of 50 7. What information is used by a switch to forward a frame? Destination MAC address Source MAC address Source IP address Destination IP addressQuestion 7 of 50 8. What does a switch do if the destination MAC address of the frame is not in the CAM? Keeps the frame in memory until the destination MAC address is in the CAM Drops the frame Floods the frame on all ports, except the port from which the frame was received Floods the frame on all portsQuestion 8 of 50 9. Which types of MAC addresses are not multicast? ffff.ffff.ffff 01xx.xxxx.xxxx 3333.xxxx.xxxx 0501.xxxx.xxxxQuestion 9 of 50 10. What kind of Multilayer Switching is Cisco Express Forwarding? Route Caching Topology based Demand based switching Flow based switchingQuestion 10 of 50 11. Which of the following is not contained in the TCAM of a switch? Security ACLs QoS ACLs MAC addresses IP addressesQuestion 11 of 50 12. What are the three actions that a switch must perform once a frame is taken from the ingress queue? Find the egress port by analyzing the L2 forwarding table Verify if the frame can be forwarded by analyzing the Security ACLs Update the MAC address table with the source MAC address of the frame Classify the frame according to the quality of service parameters by analyzing the QoS ACLsQuestion 12 of 50 13. What is the purpose of the Forwarding Information Base(FIB)? It temporarily stores new MAC addresses before they are added to the CAM table Contains each next-hop router’s Layer 2 MAC address and the egress switch port (and VLAN ID) It is consulted using the destination IP address as an index It contains the MPLS labelsQuestion 13 of 50 14. Which of the following is not a punted packet? ARP Requests IPv6 packets sent between two hosts for which the device is acting as the default gateway CDP packets IP broadcast packets that will be relayed as unicastQuestion 14 of 50 15. Considering the following configuration on Gi0/0 interface, what is the correct command to have the MAC address of the host as static entry in the CAM table? switch(config)# mac address-table static 1111.1111.1111 vlan 51 switch(config)# mac address-table static 1111.1111.1111 interface GigabitEthernet 0/0 switch(config)# mac address-table static 1111.1111.1111 vlan 51 interface GigabitEthernet 0/0 switch(config)# mac address-table static 1111.1111.1111 vlan 51 interface GigabitEthernetQuestion 15 of 50 16. What are the two components of the TCAM operations? Feature Manager Switching Database Manager ACL Rules Compiler QoS Rules CompilerQuestion 16 of 50 17. What are the components of a TCAM entry? Index Value Mask ResultQuestion 17 of 50 18. Which two of the TCAM components are 134-bit long quantities? Value, Result Mask, Result Value, Index Values, MaskQuestion 18 of 50 19. Which statements are true about masks in TCAM context? The TCAM is always organized by masks Each unique mask has eight value patterns associated with it The shortest match is always preferred Each of the mask-value pairs is evaluated in parallelQuestion 19 of 50 20. Considering the diagram and the output shown, what conclusions can be drawn from it? The host is connected on interface Gi1/0/11 The MAC address of the host was learned dynamically The MAC address of the host is 1111.1111.1111 The VLAN to which the host is placed is VLAN 51Question 20 of 50 21. What command returns this output? show tcam utilization show platform tcam utilization show tcam platform utilization show platform utilizationQuestion 21 of 50 22. An operator configures the switch like this: switch#conf t Enter configuration commands, one per line. End with CNTL/Z. switch(config)#sdm prefer routing switch(config)# What is the next step so that the new configuration will effect? Bounce all the interfaces Save the configuration Reboot the switch Disable and enable all the routing protocolsQuestion 22 of 50 23. What is the purpose of Switching Database Manager (SDM)? SDM allows unallocated memory for the CAM table to be used SDM allows unallocated memory for the FIB table to be used SDM manages the CAM and FIB table sizes by increasing one of them and decreasing the other one SDM is used only when VACL are configured on the switchQuestion 23 of 50 24. You want to apply the same interface description to the range of ports starting from gi1/0/10 up to gi1/0/20 and for ports gi1/0/23 and gi1/0/25. What would be the best way to do this? Configure the interface description separately for each port switch(config)#define interface-range PORTS gi1/0/10-20 , gi1/0/23 , gi1/0/25switch(config)#interface range macro PORTSswitch(config-if-range)#description TO SERVERS”” switch(config)#define interface-range PORTS gi1/0/10-20 , gi1/0/23 , gi1/0/25switch(config-if)#description TO SERVERS”” switch(config)#interface range macro PORTS gi1/0/10-20 , gi1/0/23 , gi1/0/25switch(config-if-range)#description TO SERVERS””Question 24 of 50 25. What command puts a port in errdisable state when a BPDU is received on a port configured for STP PortFast? switch(config)#errdisable detect cause bpduguard switch(config)#errdisable detect cause bpdu switch(config)#errdisable detect cause bpduguard shutdown vlan switch(config)#errdisable detect cause bpdu shutdown vlanQuestion 25 of 50 26. Which two commands allow the switch to reenable a port in 60 minutes after it was detected that storm-control threshold on the port has been exceeded? switch(config)#errdisable recovery cause storm-controlswitch(config)#errdisable recovery interval 1 switch(config)#errdisable recovery cause storm-controlswitch(config)#errdisable recovery interval 60 switch(config)#errdisable recovery cause storm-control switch(config)#errdisable recovery cause storm-controlswitch(config)#errdisable recovery interval 3600Question 26 of 50 27. Which of the following statements about CDP are true? CDP advertisements are sent at the data link layer Neighboring devices can receive and understand them if the upper protocol is IP The advertisements are not meant to be routed or forwarded on through a network CDP works in only one direction; advertisements are sent at regular intervals toward any listening device, but nothing is expected in returnQuestion 27 of 50 28. What command is disabling CDP packets being sent over Gi1/0/10? switch(config)#interface Gi1/0/10switch(config-if)#no cdp run switch(config)#interface Gi1/0/10switch(config-if)#cdp disable switch(config)#interface Gi1/0/10switch(config-if)#no cdp enable switch(config)#interface Gi1/0/10switch(config-if)#cdp shutdownQuestion 28 of 50 29. What is the command that returned this output? show cdp entries show lldp entries show cdp neighbors show lldp neighborsQuestion 29 of 50 30. Which of the following tables is correct? A B C DQuestion 30 of 50 31. Which one of the following trunk encapsulation method is standardized? 802.3ad 802.1x 802.1q 802.1gQuestion 31 of 50 32. Which of the following set of commands configures interface Gi1/0/20 as an access port in vlan 2000? A B C DQuestion 32 of 50 33. Looking at the exhibit, which of the following statements are correct? The port is configured as access port DTP is disabled The vlan assigned to this port is vlan 51 The port is operating as access portQuestion 33 of 50 34. Which of the following statements about ISL and 802.1q are true? Both are Cisco proprietary ISL adds a 26-byte header and 4-byte trailer to the frame 802.1q adds a 4-byte tag just after the Source Address field None of them allows to use VLANs higher than 1001Question 34 of 50 35. Which two actions can prevent switches from dynamically establishing trunk links between themselves? Disable ISL and use only 802.1q Disable DTP on every interface Configure the trunk interfaces statically Disable 802.1q and use only ISLQuestion 35 of 50 36. Which trunking protocols can be automatically negotiated between two switches? PAGP 802.1q LACP ISLQuestion 36 of 50 37. Considering the below output, what is the configuration applied on interface Po1? A B C DQuestion 37 of 50 38. Considering that the current configuration of Po1 interface is the following one:interface Port-channel1switchport trunk encapsulation dot1qswitchport trunk allowed vlan 1000,2000switchport mode trunkWhat commands are needed so that Po1 will look like this:interface Port-channel1switchport trunk encapsulation dot1qswitchport trunk allowed vlan 1000,1100,1200,1300,1400,1500switchport mode trunk A B C DQuestion 38 of 50 39. When both sides are configured as dynamic auto”” When both sides are configured as dynamic desirable”” When one side is configured as trunk” and the other side is configured as “dynamic auto”” When both sides are configured as trunk””Question 39 of 50 40. Which of the following are correct about dot1p and untagged modes when a voice VLAN is configured? The dot1p mode puts the voice packets on VLAN 0, which requires a VLAN ID but does not require a unique voice VLAN to be created The PC traffic for dot1p mode is tagged The untagged mode puts voice packets in the native VLAN, requiring neither a VLAN ID nor a unique voice VLAN Untagged mode requires an access portQuestion 40 of 50 41. Considering the following output, what is the configuration of interface gi1/0/11? A B C DQuestion 41 of 50 42. What are the VTP modes? Server Transparent Forwarder ClientQuestion 42 of 50 43. How can the revision number be initialized to 0 in VTP? Reboot the switch Change the VTP version and then change back to the old VTP version Change the switch’s VTP mode to transparent and then change the mode back to server Change the switch’s VTP domain to a nonexistent VTP domain and then change the VTP domain back to the original nameQuestion 43 of 50 44. Which of the following statements are correct? VTP version 3 supports VLAN numbers 1 to 4096 VTP version 1 and 2 support VLAN numbers 1 to 1005 VTP version 3 supports VLAN numbers 1 to 4094 VTP version 1 and 2 support VLAN numbers 1 to 1001Question 44 of 50 45. Considering the following output, what will happen if the operator will try to change the VTP mode to server mode? The configuration change will go through After the configuration change, the extended VLANs will be removed Device mode cannot be VTP Server for VLANS because extended VLANs exist The VTP version will be automatically changed to version 3Question 45 of 50 46. Which of the following characteristics do not belong to client mode in VTP? Listens to all VTP advertisements from servers in a VTP domain VLAN configuration changes are made locally, independent of any VTP domain All VLAN and VTP configuration changes occur here. The server advertises settings and changes to all other servers and clients in a VTP domain VLAN configuration changes are made locally; incoming VTP advertisements are not processed locally, but simply relayed insteadQuestion 46 of 50 47. What is the name of the feature that allows broadcast, multicast and unknown unicast frames on a VLAN to be forwarded over a trunk link only if the switch on the receiving end of the trunk has ports in that VLAN? VLAN ACL VLAN Prunning VLAN List Allowed DTPQuestion 47 of 50 48. What are some potential causes for which a switch is not receiving information from the VTP server? The switch is configured for VTP transparent mode The link toward the VTP server is not in trunking mode The revision number on the client is higher than the one from the VTP server The domain name is not the same as the one configured on the VTP serverQuestion 48 of 50 49. What does the command ‘switch(config)# vtp pruning’ do? The command is incomplete as some parameters needs to be passed on the CLI All general-purpose VLANs become eligible for pruning on all trunk links VLAN prunning will be enabled only for the VLANs that have at least one up interface VLAN prunning is enabled only for the VLAN range 1-1004Question 49 of 50 50. What are the additional features supported in VTP Version 3? Token Ring support Extended VLAN range Enhanced authentication Primary and secondary serversQuestion 50 of 50 Loading…