成长值: 62320
|
" w2 Z" M3 a) s- D1 I2 g1. What is the Ethernet frame size for 802.1Q?
& l4 e! F+ D) T$ e5 Da. 64
5 J7 O& [* _/ ub. 1284 i' ?6 V0 B ^! D
c. 15183 A( K% t* @7 G1 Y
d. 1522 **
/ h- n; f& f1 CAns: D8 J& q |# J" x4 q
———————————————————————————————————————————————————————————— s/ [2 X5 h6 E5 S8 \1 o
2. How will the traffic reach the core switch from AS switch to DS core switch?
4 f& w# g0 Q u) ?! J) p( Q(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)
2 S3 j' @! Y# X2 ~1 `: {) ea. ASW1 to DWS1 to core# D* R0 Z/ U) K; b! _+ x. c1 Y; j
b. ASW1 to DWS2 to core **4 X+ h e9 m3 R5 F
c. ???
0 R* ]5 D) S: wd. ???
! _0 p9 N m: j& L8 M' A, ]Ans: B: T* s8 F+ a# W& V/ H
————————————————————————————————————————————————————————————0 ^3 N# z1 G- ^: l$ i7 m: i% A7 p
3. If HSRP group number is 45 what would be the MAC address?
. d2 C. d2 T: H: T+ s3 G+ ~(Basically conversion of digit to hexadecimal with group of 16.)+ \* t$ q' T" F2 s G4 ~
a. 00-00-0c-07-ac-2D
8 w- l$ R d f6 [5 T$ z; |# Rb. ???
2 J) S3 ]. t) [* cc. ???
1 G3 w, W; S2 a2 s& |d. ???
; U* G! [5 h! dAns: A j) O- z# u& ?; u4 _
Explanation:
, ]& p: R5 k/ c3 A* h- y00-00-0c- 07-ac-2D
, ]! Z2 H5 o9 j- S% [% k5 @CISCO_ID :HSRP_ID:GROUP_ID
& |2 e" J6 t0 W5 m# U( {6 E5 D2d=45
, M0 m N* i4 {! u) f. _2 s/ D————————————————————————————————————————————————————————————: `; A$ g. F1 }; K# u* l
4 A question on EtherChannel misconfiguration…….- |; S5 w( b, {0 a2 `5 E6 a0 m
a. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **
! o( F3 K( o* y# I Ub. ???# l3 b+ ?. p A$ g! w
c. ???
7 l, f J5 ^* qd. ???2 k# K& \/ q/ Y6 ~: k0 z( O
Ans: A
$ A9 v4 X5 |! g/ K# N6 i————————————————————————————————————————————————————————————5 T/ O& T6 H/ t! R
5. Select a valid VRRP configuration from a list of possible configurations.
: d) u+ F- F- a' m! h5 Qa. vrrp [group-number] ip [ip-address] **
3 c8 I e: a3 K( N, W3 ^$ {8 Pb. vrrp [group-number] priority [priority] **- k/ i+ w! |" v w
c. vrrp [group-number] preempt **
/ Z, W. o, {% {1 R( p2 jd. ???9 s2 W% M" @+ q& h" k. ~% H& f
e. ???" |( ~" `7 W$ m9 B7 X
Ans: A,B,C# G" T. S; Q$ i* f& i! J
Explanation:! n! X9 c& E, E, f7 ^4 u
You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.4 Y) c- a5 }1 a1 ?# A" u9 _
————————————————————————————————————————————————————————————
& M5 z4 }6 `) C6. Private VLANs (PVLANs) have two secondary VLAN types.
; h* B8 H! S* H( T7 Za. community **
0 n+ ^9 e+ J9 g9 L# h% Db. isolated **) u! |$ G' f1 q7 |! g
c. ???
, b4 @+ l2 a4 B/ S7 Z% hd. ???
0 ^2 H( h7 v$ F; V7 Te. ???4 l7 `9 X# `9 Y- }
Ans: A,B5 s3 O8 b8 }$ a; a u# t! ]
____________________________________________________________$ _! ^5 O! a. N7 m7 w
7. What types of SDM templates you can use in switch? (Choose three)
8 \7 M/ h$ a' La. Access **; c, y/ a! u) \+ g4 d: y9 g5 ?
b. Default **
! J. y P# p. a: F7 i( m: l; pc. Routing **
9 {+ A4 B* L& ^ \9 a5 {: s. yd. VLANs **' K, \1 w ]6 c
e. ???
: [+ z/ z5 u1 c: H$ Tf. ???
' G7 q6 U. N* W6 G! q2 V5 _Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)% w' x2 I9 \& w0 M3 B' j
Explanation:. y, N; Z E( W/ g- o: |9 Z+ u
+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
5 ~2 r. U+ v7 o+ Default – The default template gives balance to all functions.
" W4 x; i4 V7 t7 Q5 O* m2 q+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.2 `- r; @+ J/ P5 h
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.
% M$ S& q6 z% o# Z____________________________________________________________
7 v9 @' l, W* N/ ~8. EtherChannel – what is the process to configure EtherChannel.' f% C |! O! C
a. shutdown both interface ports **6 c9 D! U# H2 U7 x H0 x) H
b. shutdown the interface on one side only
0 N( ]( E# V9 W6 _7 n. a qc. ???
+ u" M: `2 c. ?d. ???' p% b; g6 ?0 Q
Ans: A
6 p% `' A! S& w* C, s) T____________________________________________________________' K% o" s0 d3 V8 e6 |
9. A question about spanning-tree port-priority.% F1 ^5 Y* ]5 V: B. K5 t2 k" W: ]: f
a. 127 **) E1 e0 b J7 ?. V4 m8 n# {
b. 129
" e$ o% z) k6 w) K+ j I7 H5 Z" |( Bc. ???4 r: n$ R6 b3 h
d. ???1 X) u0 P; Y# [9 {
Ans: A
* z& u1 p( o+ p* _1 [& f2 V) D# _____________________________________________________________( N/ ^* Q2 O4 W9 d4 V4 D, o+ ?
10. Question about EtherChannel based on STP EtherChannel misconfig……
6 m# O6 P& O. j# w+ m! P8 Xa. (config)# spanning-tree etherchannel guard misconfig **
1 _3 F( A7 m( N2 k& Ib. (config-if)# spanning-tree etherchannel guard misconfig5 u0 g$ M( E& Z4 A9 F
c. ???' y* f* U, D- G) |5 s
d. ???
( P1 s3 r' u1 O# f) eAns: A6 T4 k* M7 C* p1 u/ A h
________________________- f) j* ^! y9 i3 R2 R3 J
* m, U: W9 j2 s, \6 ?46 Question about voice VLAN.
4 a5 \- N) {9 @* @! i8 g! V6 Oa. Disabled by default **5 P& b1 p9 \1 b% A" Q% T+ `/ N: V/ E
b. Enters on untrusted port
; g: a. X! D3 O7 Z# M' W2 Zc. Default CoS value of 5 for untagged….. **
( h2 v) S% j6 L$ s$ md. Needs manual enable of portfast. y2 {0 b+ d6 @( G( n t
Ans: A,C8 z$ v/ I; ]- L1 L5 k3 A
____________________________________________________________
5 r X3 c3 d' _, o% r$ f47 . Question about UDLD aggressive. (Choose two.)
5 }& i% H+ d2 ~2 x8 F; ?* g* ka. UDLD messages are sent every 15 seconds. **
1 J4 S1 {8 F$ N {8 h2 d% V# qb. UDLD tries to reestablish link once before declaring the link down.3 a1 H* j( Q, n3 u9 h
c. When unidirectional fail is detected, port state is determined by spanning tree.
" E- K' o/ |2 z# l% od. When unidirectional fail is detected, port is turned to errdisable. **- @2 y, `, M* ?! d4 E) [
e. UDLD sends messages four times the message interval by default.
: N8 {1 A# f, b6 t9 ]f. UDLD automatically … message interval based on configured timers.( i' |' j4 y! K
Ans: A,D# h! b# ]( t/ k* I3 \7 S
____________________________________________________________
' w' G* ~( q( ]# G/ e! r) w0 J8 j48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.
8 W! k7 o. B K+ r! dQuestion is how to make DSW1 the primary root for VLAN 10. (Choose two.)7 e& g6 ?" w% @5 `% i
a. DSW2: change bridge priority to 61440 (highest). **' @) N4 w+ `8 e K6 J& q' n
b. DSW1: change bridge priority to 4096 (lowest). **
3 F8 D, u" i! Y tc. DSW1: change port priority but in global configuration mode.
' e! F. u% R E( \d. DSW1: change bridge priority but value is 0.1 [7 m+ m: i) B, ?& F- k& s
e. DSW1: change bridge priority but command is priority root.) o. j% P/ r1 {: A
Ans: A,B1 y: Z( g: [# w' d
____________________________________________________________- `$ o. J+ x& n8 j9 s# M2 {
49 . How to configure dynamic ARP inspection on a VLAN?4 v) z. R6 g! U3 b! A3 P6 |
a. (config-if)# ip arp inspection vlan
7 e. y" G( U" a8 T; T" k: N3 S/ e, Fb. ???
+ T1 z2 o1 ?0 R0 |( `c. ???
. E$ O7 W( z1 @' M% d( |d. ???
5 E+ J& T5 @4 ~. |* t( F9 lAns: A8 S8 |( Q3 Z9 d8 T" \1 X: a) m
____________________________________________________________
/ @/ X) j7 R, V50. Drag and Drop – Port Priorities+ _5 x* c- W/ [7 a8 i
Port Cost T) `7 M& E. v: Y, q( I7 I9 U
– 8 default is being the interface value( V, v. I2 K8 N+ T$ J. p
– range 1 – 200k (200,000); Z- B- r: E m i+ P4 {2 |
Switch Port Priority
) e; C+ b' s6 W0 o– default value is 1286 E. ?) M O; C5 w
– multiple of 16
% f3 o- f* j. R, ESwitch Priority" X- h- ]: F- c9 r
– lower the better
0 E% f4 r' J6 v8 N– multiple of 4096) N/ O4 ]3 b3 T
3 B" G2 u$ w5 J% |' w& M* S) _ |
|