设为首页收藏本站language→→ 语言切换

鸿鹄论坛

 找回密码
 论坛注册

QQ登录

先注册再绑定QQ

查看: 6249|回复: 132
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(5月24日更新)

  [复制链接]
 成长值: 58750
发表于 2017-5-24 11:47:04 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2017-6-1 16:44 编辑
% F1 d/ L% M! p3 ?9 ]) q! q/ j9 M
, c/ A# B0 v& {* v) C& q
3 T# Z8 }! D; `' Q- N; k/ X* u1. What is the Ethernet frame size for 802.1Q?$ S% N" u7 {) D" e2 g( D
a. 64
. K& z/ k2 w% a; y& m. t4 [  K+ lb. 128
5 x# E8 b9 x* D3 I" n. Pc. 1518
2 ~; \9 ]6 f% w- }; h5 \! id. 1522 **7 J/ x& g( S2 p  L; u' u; L0 K
Ans: D  n) D; G1 l1 I$ f, `
————————————————————————————————————————————————————————————
4 l- o8 h: W9 c2. How will the traffic reach the core switch from AS switch to DS core switch?% ?" p: f7 c  _- h3 M; N2 q* \
(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)
+ g6 I- S* x( v/ o# r9 Ga. ASW1 to DWS1 to core
) n: D* j2 d9 L* a6 U9 {6 bb. ASW1 to DWS2 to core **9 y9 {2 x' v, g. q
c. ???+ N& `$ U! v; \; Z1 R
d. ???
9 Z4 N/ p. t+ n4 {' @Ans: B. n. u1 {1 m6 H" N- E4 F, F' d
————————————————————————————————————————————————————————————
  }2 x" I$ i* T+ h. ~$ K) v3. If HSRP group number is 45 what would be the MAC address?. f0 ^( i+ K5 ^
(Basically conversion of digit to hexadecimal with group of 16.)
- y  S7 Z5 V' x: @- v% ]5 U1 P" Ga. 00-00-0c-07-ac-2D
; y/ T9 V; U, Y# d, a$ |" M. l% qb. ???2 X4 s) O1 ~; z" i- ]+ ~+ j
c. ???
! a  Z: I2 G  ]1 w% t8 @. n( yd. ???
, \9 |1 t) k) j/ VAns: A$ w5 e7 [. X7 [9 F5 p
Explanation:6 B8 j( A( K2 H! M5 R6 k
00-00-0c- 07-ac-2D
* N) Q% y! M- }& ]2 c1 OCISCO_ID :HSRP_ID:GROUP_ID
& \2 }- [& o  R4 G$ E2d=450 O; k" N4 ~5 G7 M% g% E# h& Z
————————————————————————————————————————————————————————————
; m0 `( }; V* v7 u  S0 `8 b4 A question on EtherChannel misconfiguration…….
" V/ H- s+ U7 [1 F& j8 V. z% x- Ja. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **
! R' G2 q" Q8 A2 g; rb. ???; v! t0 Y3 A; c: A. l* c2 W
c. ???
! B  z0 \0 G# l6 Xd. ???
# @6 L- @5 b- t( YAns: A; T4 `% n: M' O) O0 E' X
————————————————————————————————————————————————————————————
* G. u% Z% T, g5 ]' k$ x5. Select a valid VRRP configuration from a list of possible configurations.
# y* s; n. G# x  \; ~% ]4 ma. vrrp [group-number] ip [ip-address] **! M+ N0 N& C5 c9 Z
b. vrrp [group-number] priority [priority] **
$ P0 T* |' H7 _& bc. vrrp [group-number] preempt **
& m. v4 R* ^; E) ad. ???
; n& [# R4 E& |8 u" f7 Ae. ???
+ Q( I' ?  _0 ?! _. q& e+ V( M* vAns: A,B,C
7 H  r: x1 k# a! l/ O' }Explanation:
- j2 `; D2 ?9 N8 @  Y& I( kYou can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.
+ {' ?  C# i# R8 r————————————————————————————————————————————————————————————* i: [2 f, J! J" D( W" I/ W  ~
6. Private VLANs (PVLANs) have two secondary VLAN types.
# t. K* I9 o% I2 s% \a. community **7 d" M5 Z; `# H& j
b. isolated **7 q! f% R5 ~2 E
c. ???# l- u4 T' E' T7 X% D6 s# n
d. ???! Y- w0 ?/ i- i+ o9 x
e. ???
. l; {& _" ?( k/ c) A4 Q: _Ans: A,B
3 i+ p3 c( g% R% t1 e____________________________________________________________% }4 w) ?! y4 `/ v+ t% f/ L2 x
7. What types of SDM templates you can use in switch? (Choose three), Q' y0 h: g- ?% T
a. Access **1 z8 Q; F, T$ y2 K" J
b. Default **
9 {% ^" ^: a& t  Sc. Routing **5 h; f0 ]3 Z# d, j
d. VLANs **( m  g; a( w: p' ?$ f3 W+ K
e. ???
$ U3 h% x5 G. Qf. ???
- Q/ g4 ^& ~4 F7 l* V& t: I5 }Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)+ M. t. n, F0 y, L* n8 D1 _8 t
Explanation:' y: H+ \- P2 x. S0 Z& |3 [; g
+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.& y: Y& _; A9 J  G
+ Default – The default template gives balance to all functions.
6 x# ^: u% y( m$ ?% y+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.
( H6 n( t+ Q3 B2 ]* \& y+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.
% u/ p! [: N4 Y' P- t$ Y, u____________________________________________________________
2 a. U- q$ T1 m/ [: ^# a( v8. EtherChannel – what is the process to configure EtherChannel.
* o* k& }2 \4 y2 a9 l% ?a. shutdown both interface ports **, N8 n# m7 n. {; m# v
b. shutdown the interface on one side only
$ z$ H) q$ `0 X8 ?  {" j8 lc. ???
3 g8 z  e4 L; |. I; G6 F4 C4 y0 hd. ???, I3 R. k2 y1 T9 R" D9 q( o
Ans: A
& J5 \% B1 n6 E5 W7 P5 _/ \____________________________________________________________
, E: A5 C6 a* Y# E: o( f+ ~" e: ^9. A question about spanning-tree port-priority.# r# [- H2 k. w" V  Z
a. 127 **
3 n, E- W) a5 ]1 Q$ \# V: [: ob. 1293 b' W. q8 X: G. `9 J
c. ???
! c7 |; b; k9 T2 dd. ???
& G  q) b- E+ a9 tAns: A% r; @4 L; {) x
____________________________________________________________, j# I# ?  q) c+ O
10. Question about EtherChannel based on STP EtherChannel misconfig……, m, b: ^# R# i
a. (config)# spanning-tree etherchannel guard misconfig **+ h' M' l' y+ z% j; ~6 i# y
b. (config-if)# spanning-tree etherchannel guard misconfig
2 E% f5 ?: |( x( U3 X1 m" @; Qc. ???
  |2 F! `1 e6 {: D* h; \d. ???
+ J! R8 k+ \/ E# z( V2 TAns: A
9 f$ H: k0 t% I________________________9 q+ Z! Z9 ]) K6 s
. \) t8 N7 `- V# p+ X$ O! k: Y' U
. d, z4 @3 H# b' N0 |
___________________________________. ?# U4 B1 y+ g( D8 U
11. If HSRP group number is 37, what would be the MAC address?* p% O! X+ T7 ^2 s7 q1 R
a. 00-00-0c-07-ac-25
+ ?7 E: o2 T3 M$ Ib. ???
! V0 Q* T1 C6 O/ A+ Xc. ???% W/ x6 W2 Q, I' N  ^7 e! J) q& t
d. ???
' Z. k; g. m, @) s# VAns: A6 s. h, {/ {* S- N# i5 [- n
____________________________________________________________! S# w0 a6 L) O/ b2 H
12. What is the default value for spanning-tree port-priority?
& [8 f6 R; O: La. 128  m+ X/ u: _. B! V# x+ U
b. ???% j$ Z. C8 b5 n. h) t% \- T
c. ???: `  `( M# R% ~/ I
d. ???/ D! e& B  m6 B3 ^+ k$ b( F+ g; l+ y- ~
Ans: A' W4 n7 r. @* c, c
____________________________________________________________
/ g* S/ j4 J# `' D+ k& z1 }13. Which information does CDP supply from connected devices?# n" F# Y7 H, M' E6 e+ U/ g. i
a. hardware platform, interface ID, hostname' A( G0 \, }+ ?6 P: X' X; H
b. ???
& G+ i0 J! ]# v2 i2 |. x4 Dc. ???
- D& J' E) R; K: [d. ???
9 D6 v) T: E  V; YAns: A
% d" g# |/ u, P2 N; ^____________________________________________________________
/ c" X0 H+ q. O! }8 N14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?  `7 E+ y$ R- m! W
a. errdisabled* Y1 s. _  V2 x: \* n
b. shutdown& i! f, p$ Q) b- P3 t8 |
c. ???3 @3 g) A, r* l& y4 ~: }6 T  t
d. ???! \/ k) r' B3 _! ^6 y3 c6 h1 ?
Ans: A
2 B% m9 k, u  r( B2 M& _5 H____________________________________________________________: m# W" v% p, v2 T, K7 t- |
15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?
2 w5 l0 P, L0 t$ E' z( Ta. isolated
# j3 v8 k: `, d0 E# v  L6 B  K* sb. promiscuous
# M- y2 ^% N! ^  M. N. i' tc. ???; q9 f0 j9 B  e5 ~3 T3 ?
d. ???$ l2 X2 ?& N" Y3 g
Ans: B
  ]! D3 {! Y: V1 e____________________________________________________________
- T0 [1 ]7 `% U  z7 T& G1 j- g3 X! b16. A question with an exhibit.
/ E6 K+ f( Z- |& f+ L9 jThere are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5./ @* D: |: _7 g5 X
a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.
; r+ y& j7 r& \  u* a* U* eb. ???
2 U, Z* p& G4 r) @/ H3 P$ M' k5 dc. ???' [4 e8 ~& U) B
d. ???
1 S( _, o% s: L3 I3 j: k: sAns: A2 ?, c- N4 v; p1 f
____________________________________________________________/ n4 V) c( G: X. Y4 E% |
17  Which option TPI 802.1Q tag?
3 u0 X; R9 n  {+ Y- m( ^a. 0x0806
" |5 m, z# }( m6 U/ t  Rb. 0x888E7 g/ Q" o8 h' g' t+ ~0 x
c. 0x0800
3 z/ X/ K" y& v' [) kd. 0x8100 **4 _3 o! e+ f) x& Y* h
Ans: D
4 `% C" a5 Y1 I6 u7 a; g____________________________________________________________
/ }  a& n, }$ q) U7 N! J18. MAC address filter?
+ S& y5 ?5 d* k1 A6 z8 va. CPU-destined* _1 e# b8 P( O
b. router
3 O" w5 s+ ~  k2 m5 I) Qc. unicast **
# R% B# Y0 g% V. `" G. H+ `. E* Fd. multicast; b4 u* @7 K& S# a
Ans: C
5 A  T+ A3 g: x* X____________________________________________________________
; w" w; K) l, b; |/ c% s19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)9 H9 @9 X0 }+ z6 d4 d
a. trunk port will be immediately% G' T6 E* \2 `+ ~9 d3 e
b. trunk port can be portfast mode6 E' S: g0 m' v9 k. ]1 M7 _. f
c. BDPU turn this port to err-disabled **2 }6 D5 d5 {# w
d. ???8 Q* K+ D- K5 ]0 t
Ans: C
0 M6 _9 L+ T1 p" t* c____________________________________________________________. ^7 v$ [- b- ~/ `$ C
20. Question about root guard…." f  ^8 |2 i: _& F0 S# t( s' [
a. Prevent unknown switch be a root port
  R( A# t/ z1 Ab. Root-inconsistent **
+ X4 f1 [9 L4 u1 ]+ p0 _2 pc. ???
0 g0 b; l4 [4 G1 ld. ???6 _2 |: x* u1 X- l& l" i
Ans: B) z3 x, u0 z( e) N, I
____________________________________________________________
9 g8 q9 r" V5 ]% z, l% d" P* q21 Question about Loop guard configure……..3 l( r" s1 _8 I
a. (config)#spanning-tree loop guard default% N; \& S4 {, E9 ~) K' H
b. (config-if)#spanning-tree loop
$ t5 o+ }5 d( l0 s" m, i( |c. (config)#spanning-tree loop-guard default
* b2 K- ]8 Y5 K6 j) H# Z! e  gd. (config-if)#spanning-tree guard loop **4 O" n- G- @* T4 {2 z
e. (config-if)#spanning-tree ??????% J! y9 o* U& i2 ~
Ans: D. ~8 X  {/ V2 S3 h$ t3 m" v
____________________________________________________________9 v/ Q/ [7 u, J$ S
22. VMPS question – a dynamic access port is member of which VLAN by default?
) H% s6 a7 R" k! R0 e4 ra. VLAN 1 is the default VLAN **
1 ~: K/ Y0 t/ K! z9 Q; Ib. none until the port VLAN is determined
! D* X) `, p+ \6 Ic. ???7 _' {6 m! Z1 E
d. ???; g, P" }# h/ P9 D
Ans: A
9 _. {5 ^( ?: g. |  b____________________________________________________________) ^$ ^& D) u$ ]7 @3 A/ z7 Y
23. Question about the behavior of an access port when a tagged packet is received.
  l5 C% _5 `8 ~) S3 I* @  r/ Da. packet is dropped.
% B6 I" C- j+ m( m, E# n+ v6 ?b. tag is removed and packet is forwarded on the VLAN of the access port. *** j2 f9 b, d3 @5 J' V5 z$ Z8 n
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.
" C+ A. K: g& Y, u: f- R8 vd. ???
/ f# s  C; V4 y, H8 {Ans: B
/ x$ P' Q: Q+ n____________________________________________________________
/ e* b8 A# k  t1 a2 @* C& m  k: M24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?+ o( ^" d; W+ J2 A. H, |7 ]* A
a. ???
* c3 S4 H4 E- }b. GHSRP
) }, D- Y) O3 i* W' ~- Kc. MHSRP **4 M6 u- _: W$ a
d. GLBP6 W8 E) `1 |7 e+ A0 U
e. ???
4 ^% f2 ]' u* d! r; Qf. ???% ^& R; ~8 @" [' O
Ans: C6 I* g! l# Y  G4 _$ R- n) ]8 l
____________________________________________________________
4 C/ f% i' w4 |6 L) @; k25  A question about RSPAN.
+ b  u# s$ d4 w7 Y9 fa. vlan 4029 remote span: U. _5 c& N5 G  g" Q: i
b. vlan 510 remote span **
- b. |+ @3 c' ]4 Q! O+ oc. vlan 510 span7 ?1 @0 M7 p7 D1 s* A9 E
d. vlan 4029 span
9 R% n: _+ z7 W: [) {+ YAns: B
+ u: g8 j" n. R! n____________________________________________________________3 B- V: s% H' H
26. A question about configuring spanning-tree port-priority based on a diagram.2 f. N0 b* f# |: {: P, Q4 d+ i, A. m
a. (config)# spanning-tree port-priority 127/ R6 v& x" z  a' N* x
b. (config-if)# spanning-tree port-priority 127 **
/ {4 [2 |) j0 D; w: R' Zc. (config)# spanning-tree port-priority 129) `. X* X' D: k4 T. G8 j0 h
d. (config-if)# spanning-tree port-priority 129) n! w0 ~( k& S' u0 |+ P
Ans: B! X6 L+ t7 E3 M4 W
____________________________________________________________
6 f) T/ x) i4 R27 . A question on EtherChannel misconfiguration.
; R  S5 D9 e8 ?( f+ f8 K$ Ea. PortFast" T3 L3 `  K1 N0 v7 w
b. PAGP& s2 G' a( g. P! E& W0 v
c. LACP
, [9 c3 m" {; j  Md. STP **
! }8 ]# [7 I8 ?+ p$ O. JAns: D
2 Z# O, @7 K" w( b) r1 g____________________________________________________________
, ]! ^: h" H$ Q" h* U* g, \$ ^28. A question on local database for consoling to network devices. (Choose two.)
4 c/ c6 I* @# p4 u$ \a. Console is a backup authentication method **
; H# L# D& L; X" Zb. Console is the only backup authentication method
, o9 p$ [9 S4 A$ {# A2 wc. You can set user privileged levels **
: A9 U" ^7 A5 P" o4 dd. ???
# s9 ?. p, r" X8 U/ F  Q% u* gAns: A & C" _9 i* h: `0 v. b; y: z
29. Drag and Drop – STP Timers
! g0 j% t0 O3 P- ]% ^Hello; Z0 g5 A+ r7 \* A1 S- h( M
– 10 seconds5 w8 O  _9 V& U8 T! K1 k
– new BDPU
* ]) V; n/ M, y( `! p  [9 d+ [Forward) l' `3 {. Q3 @  m
– 15 seconds+ W% z* ~2 v7 M8 ?
– listening or learning" U8 M* a+ ?$ d
Hold
+ K2 T# U/ G% v9 S, D8 h; C8 i– 20 seconds
: F, v7 e9 c  D* C" U1 w* P- P– time when BDPU expires7 w: \9 i2 \8 l/ e3 c3 W* v0 h. `
____________________________________________________________* d$ A6 [( \# ~( E2 i5 P/ l* W" F
30. Three reasons for err-disable. (Choose three)
( u+ g2 Q; r! U+ b5 ya. storm control **
& G8 x4 ^2 |& R# k4 y( ?: hb. security violation **
$ U8 H6 ^1 {) Q' f( b) }c. configuration ports into EtherChannel
; g! s" j. A2 R4 G: kd. BPDUguard **
, x# h: a; V  p" K- P; De. ???0 ?0 Y- i" d' }; A) x8 w6 |
f. ???
7 m% x4 \3 c! m( j, N' _7 M  s+ BAns: A,B,D
9 A' k0 N2 @6 T: l____________________________________________________________" X2 B6 {* Z* w$ O# z
31. RSPAN what happen after configuration.
2 R9 Z' C/ f* M: U' @# d  d- T5 va. destination port is unusable for normal use **
4 x9 q) z$ Y2 k* z, rb. traffic in network is doubled
/ L: M6 q' v* H# Lc. ???6 ~5 L- [5 R* d0 h! O
d. ???
4 N7 _# {' a+ h* d' e& F% t- jAns: A
/ H# B# J3 ~. X) t5 X, P____________________________________________________________5 i8 Q9 e/ G; k- x+ f6 G7 `# |
32. A question on local user database for login to network devices. (Choose two.)
3 i7 `+ k9 N* ?! Ba. Local user dbs can be main and also backup authentication method **
3 T  v0 t/ z# i3 n) Ob. Local user dbs is the only backup authentication method8 k/ y1 |8 j: Y! f. ]; w
c. You can set user privileged levels **
9 u( _' I7 z( t# Rd. Local user dbs is used after 3 unsuccessful logins via RADIUS server
7 H8 E7 ^: H; L! o$ x9 be. ???
8 A9 `8 e$ q- z( f0 PAns: A,C- B! C% ^, p; N# E9 V
____________________________________________________________
( j; G# R8 x1 A7 w  L8 S33 Which switchport feature will block the packet with unknown MAC address from sending it via port.
* T  z3 x* g9 Va. switchport protect
. M4 j0 x# J: h  Q/ V- v% Zb. switchport block unicast **9 `) j7 I( K1 x# ~3 o. v
c. switchport portfast/ Z% `, w5 v1 a9 \3 T' l. \+ T1 b
d. packet with unknown MAC will be dropped4 a( g' q0 _+ w- O; ~0 ^6 V
Ans: B
5 n; `: I5 B+ E  E! y  T" v4 F____________________________________________________________
% ~* a2 t/ x0 ~+ P, ~' r34. What are the two ways to configure loop guard?
3 ~: k5 o2 B" K$ T  ^. \' l3 C. ^4 ga. (config)# spanning-tree loopguard default **
3 Z4 Y9 A" \) U) s9 d; P: _2 Wb. (config-if)# spanning-tree guard loop **: \( ?$ c. T- n( I2 M! Q4 M! E4 o
c. ???4 I+ W7 x% f8 K6 [4 _6 n% i6 p' [% Z
d. ???3 M! P, w/ F( Y2 Y
e. ???: p) D0 d, R2 c6 I0 e% E
Ans: A,B
, Y, C7 v, E( J5 Y____________________________________________________________3 }" ~" h8 Y. p9 q, v# g
35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
$ a2 z$ S, s2 I3 g$ C' Ea. Intercept **+ G8 d: L1 h& V8 f
b. Drops **
3 m" p* [. y6 h6 Q% Vc. Log **
7 H. d& p5 u: |: {* @6 e5 ?d. ???
8 ?; ]5 Q  O+ |$ Le. ???
/ R9 u5 O3 \* R5 ~. W( |Ans: A,B,C
+ X) ^/ F% S" h____________________________________________________________
- _" @; [5 s& Y% [36. Question about what are RADIUS server responses. (Choose three)
( ]6 Z& K  h/ ?8 L7 @# y0 p6 Fa. Accept **
( n: g+ Y( h8 ~/ a) U/ Db. Reject **
1 e  x$ A" l6 S. I: j8 L. k( `c. Challenge **. Y4 @3 q6 ?1 L8 E9 T
d. Get Password5 l" s: @1 b, i  I0 f
e. Cancel  f, ]% |" R$ y* N5 p0 U8 K
f. ???
" O3 ^5 M0 Q: m$ L) p2 n( PAns: A,B,C* z! L: _4 r4 h
( f$ F7 u! Z- n0 N# q4 h

+ j# g9 P& N! j# I! R/ E' d* ?* I0 r% n5 C' Q7 X# k3 X
' L8 _9 r5 q6 ]3 L& t: X$ s9 @
37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
" J, w5 [3 L# xa. Drop
! m) R% u) J' ]0 d8 y' n- cb. Remove 82 and forward **+ e1 ?$ `7 h' J4 [/ e" r7 ~7 x' X
c. Proxy ARP% x. v7 e+ M) s( W
d. ???
8 U6 l( C9 ?. P+ qAns: B
0 P6 Q' V, z" O/ J& @5 F____________________________________________________________
8 Z. y+ Q/ P( z5 Q38  Option 82 question with two choices. (Choose two.)( p, s2 K0 c' e! Z# w6 [: s
a. Layer 2 ingress **& j( m; c  h' J1 {; ?) _6 w
b. Layer 3 egress **% F5 R0 i- W+ a. l3 [
c. ???2 ~  ]: m: k6 @) |1 I. R
d. ???! r0 U9 ~3 G& {: ~
Ans: A,B; B9 L! \5 y) I5 w, B5 r; N
____________________________________________________________
& {: j* C) f: d: f4 ?) F39 . Drag and Drop – Port Priority/Switch Priority/Path Cost8 m6 A* h9 X# g/ }7 k9 {7 v
Port Priority
7 X- n- d; _. S+ \% {2 U, J5 o– By default port priority is 128+ Q6 P, ^5 n. G; B! o, G8 }
– Lower port priority most preferred path to root
9 I4 q: ~; a4 p& v- x2 a– Value from 0-240: F8 M; `6 I  @
– Multiple of 16 <—– this was there
) [) Y5 w8 e1 o* v# iSwitch Priority" R7 t+ k: g9 ?5 }: Q5 ~3 R
– Lower priority is better to be root bridge
7 u1 [$ Z8 G/ z& A– Multiple of 4069 <—– this was there% u) N+ {  |4 `" n
– Lower bridge priority is root bridge
$ f7 S1 k8 \$ O/ ]4 \! q( h4 |Path Cost
  G; R3 S  j/ ]– Cost depends of link bandwidth <—– this was there' o! ^2 S+ c; q5 P1 L
– Lower cost value is better <—– this was there but it can be draged to any of them/ {) N% U3 p5 _% H; a% z# H
– If you change the cost on an interface of SW1 then only SW1 will learn the change
4 i2 [8 B  w# N$ Z; h; R  V! C" N– Short range — The range is from 1 to 65536.- p) |3 v  _. S% f3 ^- _1 Z! s; G
– Long range — The range is from 1 to 200,000,000.1 b" V4 k* F, `& Q9 K1 q: W# V
____________________________________________________________
1 Q. B' }8 w% x. a/ g. ?6 T6 w40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)9 u8 ?7 h$ _  \8 h5 g5 \9 J
a. deletes& F+ v8 w0 X' C* b: n+ h- ?
b. logs **
# s0 W0 x8 X5 O& ic. accepts
- D- F1 |5 q" ^/ j% O% @d. intercepts **
, e5 K1 Q5 C' V' R: Q* we. discards **# v  b8 b7 S- [! \- x4 b! u# U
f. bypasses8 U4 @6 Z  k! A# g
Ans: B,D,E2 D6 `/ D0 M' }9 L# P5 _5 _
____________________________________________________________
& T- w  L$ ]$ d* i8 w41 . Which three features can be optimized by using SDM templates? (Choose three.)
( J1 [3 `( i7 [" Na. port security
3 F4 o2 T' Z' W- Gb. trunk' j# A  e* R- J- A  {) i
c. VLAN **
; p0 O; j7 B3 l9 {& C9 e: o$ G6 H" _d. access **! o5 c0 z  X8 S4 O$ y* L. h4 M: v
e. DHCP snooping
- m5 u* m# s- b* E) jf. routing **9 ], R  [6 B' @' m( r; V- h
Ans: C,D,F1 W1 n, f% Z* Z8 G$ K* y
____________________________________________________________/ j0 ~. P+ _& U! k) k- c
42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
% E3 P  Q; {3 d" i, f" ha. destination-MAC
% k- i, s( S, V1 r! O/ V) |& p! ub. dest-source-MAC: x6 K! c& L4 [$ Q% @) r. Z
c. destination-IP  Z+ O0 x4 K8 Y
d. source-MAC **
1 J0 ~& M2 k8 g  X& [0 le. source-IP **
! N2 q( g' F5 z8 x6 _' Y2 `- \Ans: D,E+ ^6 t9 s" o3 ^: }+ j8 X
____________________________________________________________
: [' @, ~, Q2 E. _/ i! C2 c43  Which command is used to verify trunk native VLANs?. z) ]  @5 ]+ n3 f6 L: O
a. show access ports5 @: `2 _" B! M2 F
b. show interfaces trunk **
) p+ G; n! o( R# rc. ???
- i. @5 j/ w7 E3 C: y& [' @d. ???
6 V$ D5 h7 g4 ?  j- f- q1 HAns: B8 @9 D7 m& K8 U6 u) q
____________________________________________________________0 R/ D! m! E' |) ^) p+ \
44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)
+ P; `( D5 T- g/ y# ya. spanning-tree vlan 10 root primary **
2 ~1 J8 Z) ?  V' z+ O7 f  r2 Fb. spanning-tree vlan 10 priority 4096 **6 N( X3 y/ _) i) A1 y( [& x8 n$ e
c. ???
& ~+ {- e3 Y- l! h( l- t. Y" j  zd. ???
: [  j3 g3 w" G& ?% Q4 {( Xe. ???7 T4 f' d4 Q: k) q' A; i
f. ???
) @1 E+ t7 V6 v6 R' k5 yAns: A,B: ~. e1 D4 q+ t5 q9 L
____________________________________________________________, M; t& y$ m$ Q( B$ \* e4 I2 _# U
45. Which information does CDP supply from connected devices? (Choose three.)
8 L7 d0 m: u- m" X$ e0 pa. Hardware Platform **
, b, X& E) O) ?7 P# Ab. Interface ID *** B1 [. h/ q- E+ q3 ~& P3 L
c. Hostname **
$ p/ [$ O" u; C, c' A6 i+ ?4 s$ f' Od. Config Register7 j: ^& f2 r- H3 l
Ans: A,B,C
  e4 Z( x; ~6 o: c# `____________________________________________________________
3 Z) R6 o- X* V/ \1 Y) a, j8 A# G6 u

8 p& g# X& \% {$ d46  Question about voice VLAN.+ ]) c. M4 A% f
a. Disabled by default **! G% Q" f% B7 E# L- ?
b. Enters on untrusted port
+ o5 {: ~3 O5 F4 h9 u8 h' n" q3 Cc. Default CoS value of 5 for untagged….. **
# d$ m) c0 h+ ^" H+ h: Kd. Needs manual enable of portfast.; h* a$ ~: j6 g
Ans: A,C" k! E* a. t* L) @
____________________________________________________________
- w7 [& i$ v5 w$ K4 ~. f47 . Question about UDLD aggressive. (Choose two.)8 O: @5 _* I: b+ w* t7 E
a. UDLD messages are sent every 15 seconds. **( d% o! ]! ^& d6 [, T
b. UDLD tries to reestablish link once before declaring the link down.9 b/ e4 u, b4 g
c. When unidirectional fail is detected, port state is determined by spanning tree./ L/ J* m* j. a0 [0 Z! x4 e
d. When unidirectional fail is detected, port is turned to errdisable. **
9 @7 _8 |' l+ @. S) R4 x( q4 Ze. UDLD sends messages four times the message interval by default.
4 i% r$ q: M# b1 Ef. UDLD automatically … message interval based on configured timers.# r3 ~% T4 P5 j: E+ |! R
Ans: A,D
3 u8 q  d: ]" B1 C4 E____________________________________________________________
" J5 q6 a) S: J6 n; B$ J# _48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.
. Q0 Z' O. |6 Z- ]Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)
1 d! n6 F9 y: R: T+ G9 ~8 O% ^a. DSW2: change bridge priority to 61440 (highest). **. {# j- _* H' U* D3 w, r: x
b. DSW1: change bridge priority to 4096 (lowest). **/ p; @% D7 K: P5 M) S$ o8 Y7 Z
c. DSW1: change port priority but in global configuration mode.
" a+ e  x- q) s3 \d. DSW1: change bridge priority but value is 0.# ]# d1 Y  ?# I" B' Q4 m* u% }
e. DSW1: change bridge priority but command is priority root.
6 x6 ?  a& y4 T2 V' }Ans: A,B, y) u4 J( R- t) J' d
____________________________________________________________% L& d( e$ x3 X- R) W: |
49 . How to configure dynamic ARP inspection on a VLAN?
1 z+ b- _6 Z; D6 N% f- `a. (config-if)# ip arp inspection vlan
+ g3 G6 C7 D- `, Z5 B  U) m! Rb. ???0 }, o( o1 n: s
c. ???
6 a$ O! L, Z. I! P8 }, g1 md. ???
+ C. X3 @+ _: Y% [' b0 E- _Ans: A& k* s# t* j  u2 T+ @6 i# x
____________________________________________________________' w# N$ i! g" _
50. Drag and Drop – Port Priorities
' o4 {. M, j2 b1 f# s' ~Port Cost
7 _0 \9 V- ~$ w( q– 8 default is being the interface value
- r# G0 H; Z! X5 }7 `/ H( @. b0 a– range 1 – 200k (200,000)+ C4 D# g8 J# P- k$ D7 D2 ?: {5 S, c
Switch Port Priority
+ A" o( m( Z7 ?% R/ w& n8 ^7 E9 H– default value is 128
5 z6 R) w+ M& _( o# x: o; G– multiple of 16
" y) u7 o" @" k) O$ v% o+ vSwitch Priority' h9 d8 H" P, |, k6 Z% S% j% U
– lower the better8 Z+ q8 [6 `$ g( r. F9 U
– multiple of 4096# q8 F5 e; j! T0 O, J
游客,如果您要查看本帖隐藏内容请回复
_________________________________________________________
3 g3 X1 C( R( c( z/ K' ]96. A question about the priority of a Stackwise switch.
: D7 m" I1 r5 k(CONCEPT ONLY)
1 i7 N2 k+ T& @  u& Za. Master member is selected based on member’s priority. **
( N& p  u7 T5 v* g# s- P2 wb. ???, g; ~5 ?6 j% H2 O: r
c. ???/ s. z% L. Z  X5 L
d. ???
& [: ]2 y  @, [  l% k6 b; AAns: A
) i/ h. Z# v- m9 ]) i
7 R6 g3 F3 ~$ Z. V; [7 X97. What is the benefit of UDLD?3 D9 Z# H; O8 R- ^* k4 E# |
a. provides backup for fiber/ Z0 ~0 f8 b- `" p3 B
b. help in preventing loops **- c" t7 I5 M9 j
c. removes loops: w8 D( f3 n0 s* n) e
d. determines switch path' ]/ S. e3 C! F" @* j# j* z
Ans: B
; u. A% l) G: R2 l7 p, I' _____________________________________________________________0 s  B/ m( Z4 I4 p
98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?- F0 M2 `* Z" `8 a6 g: c: E
(There’s an exhibit that shows f0/7 receive BPDU.)
+ v$ `2 }' H: g0 y6 a1 Ca. We have to configure shutdown and no shutdown.
. J; ~2 B8 c& _- o/ Ab. Have to use errdisable recovery.
9 L4 z  q2 J: Z) \3 V8 _4 `c. ???
- e2 T1 f, D1 C9 a7 u4 O0 V: qd. ???* M) [% o: o7 u6 |) }5 q
Ans: A
$ d5 U: X/ {" r2 @# r拖图题汇总:
9 K0 {! ^5 V7 M  N7 f8 C; P5 w, C1.        CDP / LLDP
% c% n% C4 b  c( T" ~CDP+ ^, h5 Z6 S) i  c
&#8226;        Default time between protocol frames is 60 seconds
7 a9 e# E! m0 Y8 v1 P4 N6 k9 i&#8226;        Supports IEEE 802.2 and 802.3 encapsulation
% }/ k  u3 D2 Y&#8226;        Uses multicast address 0100.0ccc.cccc  Q' e" F1 e4 X/ N6 z
LLDP  n) b4 p9 V5 J1 l9 Z: G
&#8226;        Default time between protocol frames is 30 seconds
" }* Z" ~8 C! s# U  t4 K&#8226;        Sends topology change notification
0 h# F6 t5 h8 n0 K: d&#8226;        Uses multicast address 01-80-C2-00-00-0E5 M- u4 ?2 V& |+ Y- e6 _8 F$ G8 V! d
==========================================================
, \+ H. T, ?6 N2 a. d2.        BPDU Filter / BPDU Guard / PortFast
+ y- v2 _% z: DBPDU Filter
; D* \4 |, h: M  \" [, }. d, o% V&#8226;        Disables Spanning Tree on a configured interface" c7 i* y! u) I0 W- v
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames4 A! Z* r$ F5 y# \) M
BPDU Guard6 {' t' N6 @+ L# T! |2 I$ l  s* k' }
&#8226;        Protects configured interface from receiving unauthorised BPDU frames
& ~# o% ~' @7 n# F$ E/ M' t- V&#8226;        Shuts down port and places it in err-disabled mode
) c" \" H9 {% f6 dPortFast
2 @3 d" v$ [3 p&#8226;        Configured on access ports with a single host device; i$ r% N; D: V* l) E9 j
&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state( I  W9 i* a  i3 F
==========================================================
& ~# g) [9 q/ E. d7 r3.        MSTP / PVST+ / Rapid-PVST+
  B9 l( b' L! a# M8 Z6 KMSTP4 a0 O, r% L$ |% c
&#8226;        Based on 802.1S, R3 u, A( h) h  h% [( T0 N" Z
&#8226;        Maps VLANs to instances; u8 `! [& {1 p2 k: w3 V
PVST+
2 G6 z4 W+ S: I" p2 G) }&#8226;        Based on IEEE 802.1D
$ Y% v7 \7 [$ }" O. D$ p. S&#8226;        Default STP mode, P! ^: ]' F: }2 S$ ~# r1 W, ]
Rapid-PVST+
) J9 h) l7 g" y$ V9 S&#8226;        Based on IEEE 802.1W
+ E7 N5 m, D9 `&#8226;        Discarding port state
# d$ j6 z1 x0 j==========================================================  O. s6 A' v, A7 G4 X' s
4.        Forward / Hello / Hold1 }' Q! o6 D( `! l: _- Z
Forward
7 ^" e8 _1 ^& T: b& x. ^) x&#8226;        15 seconds
# E+ U/ B5 i" q/ \- K) U. R3 O&#8226;        Listening or learning* u* z7 v# j0 H6 Q0 \4 x
Hello9 q" G- _/ Q0 U/ \8 k- P
&#8226;        10 seconds
' v5 L8 f1 M, e5 y5 p&#8226;        New BPDU
+ {5 E" F1 |3 d5 H% bHold
* A, x1 U3 R! @# w% @3 l&#8226;        20 seconds
+ t3 s1 d  S$ p1 g) h! I&#8226;        Time when BPDU expires) C# r5 i. a0 l8 H; _6 i  u
==========================================================
1 m8 k* E) x8 X( z8 w9 g7 K1 S5.        Port Cost / Switch Port Priority / Switch Priority
7 g3 @( ~$ e- cPort Cost; r) {' Y+ ~2 k/ O. f& X
&#8226;        8 default is being the interface value
/ f9 W1 T9 L# {( D$ e) o+ L&#8226;        Range 1 – 200k (200,000)$ }  M* O0 b# r# N" N; o7 A
Switch Port Priority
! S  w/ `6 F) S&#8226;        Default value is 1281 d0 R  j- T. }" w
&#8226;        Multiple of 16
: P# a' X) f- y7 I* k# |& d6 vSwitch Priority
# P) _7 u* o( U7 H& u4 n  l7 B' q&#8226;        Lower the better
, }* b- }6 V( ?2 t0 i1 R&#8226;        Multiple of 4096! `( ^7 F4 c, c0 V( u  a$ o  [7 ~
==========================================================: _' V% i& H/ v  V3 G
6.        Guard Loop / Guard Root
- z/ _* T: X1 JGuard Loop! }  d5 [" V* z8 s, m( f7 ]
&#8226;        Detecting unidirectional switching links! J# e' G  U' Q" G+ }( k# M
&#8226;        Port self-recovery
4 L1 B  A/ [0 U7 n! }, `  {Guard Root
) X9 @2 X' P0 N4 L1 S% E3 i  a( q&#8226;        A better BPDU disables the port as err-disabled- G1 V5 G: R! @$ A
&#8226;        Protect designated port from receiving superior BPDU
+ G8 c& V( k* k/ K2 b1 S" i; {' S9 ^" S( [4 }6 z
3 z5 C3 a3 D: L% z7 K
0 _5 l$ S4 a7 D" X( T- _1 \
发表于 2017-5-24 12:11:42 | 显示全部楼层
DDDDDDDDDDDDDDDDDDDDD
沙发 2017-5-24 12:11:42 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:50:14 | 显示全部楼层
非常感谢楼主分享新题,准备考试了
6# 2017-5-24 13:50:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:54:55 | 显示全部楼层
很好很好很好
7# 2017-5-24 13:54:55 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:55:02 | 显示全部楼层
很好很好很好很好
8# 2017-5-24 13:55:02 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:55:11 | 显示全部楼层
很好很好很好
9# 2017-5-24 13:55:11 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:16:04 | 显示全部楼层
居然这么多。
12# 2017-5-24 14:16:04 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:24:52 | 显示全部楼层
之前不是发过一次
14# 2017-5-24 14:24:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:36:07 | 显示全部楼层
真是好东西啊,正在备考
15# 2017-5-24 14:36:07 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2024-3-29 13:18 , Processed in 0.067017 second(s), 7 queries , Redis On.  

  Powered by Discuz!

  © 2001-2024 HH010.COM

快速回复 返回顶部 返回列表