- 积分
- 46
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 10
- 听众
- 收听
网络小学徒

|
发表于 2016-1-8 16:27:01
|
显示全部楼层
之前老题库 + 以下的就新题了 看熟了再去 我今天刚做小白鼠 挂科了0 R6 T. W9 k' @! q
9 J" C# o& ?9 bQuestion1 rag and Drop Question1 ]* s8 {% ]/ M$ l! K, Y
CDP7 I# ~/ L: O5 m# Z: ]" g
– multicast destination address 01-00-0c-cc-cc-cc
9 b) e) ? O6 N1 i8 x% O0 h– 60 seconds$ F8 i/ Z' R6 k+ a
( i7 B8 [ ^; M$ i/ u1 S7 b– compatible with Cisco Discovery Protocol uses IEEE 802.2 and 802.3 encapsulation only.1 f9 T( A' m v" Z O* ^) E# X4 P& a
LLDP
" G0 ]* T7 z: x/ N+ s* A( M3 x– multicast destination address 01-80-C2-00-00-0E //03 r 001 K# C9 G: J2 t
– 30 seconds( S, \, W5 J- L( u# ?' L8 [3 d3 Y
– Inform topology change ^1 Q4 [# ~2 `" h1 _( z/ L! g
" K! e% j$ B& I; B" ?Question2:/ |1 H" y" ^0 X; n1 S V @8 F) ^3 B
; M& ? V/ R) r; ]2. How many table in DHCP snooping database can bindings?4 P, W/ l# `' t* b, c% O3 G' Y% J( F4 J' ^
A. 1000; L! F9 k7 @+ a) r1 o" e
* ~* O. a: M" c+ U( c5 fB. 2000% T, f2 U2 {2 ^' Y q0 q! Q7 g. l# y9 d& k6 ?# r( m. B0 b- K
C. 40007 O m: R7 e, c( T! K3 c8 M
D. 80009 I0 m/ |: O7 r2 l* J% ?
Answer: D: 8000 (The DHCP snooping database stores at least 8,000 bindings.) `* O% ~6 l2 m2 u) z5 n- d8 ]+ h' I; d( `; L! Q2 I
Question3:" E( y' t- r9 c, b% ^) ^0 T. s6 T1 o6 g/ L s, o( l* F) u0 v
Engineer request to set half of cdp transmission default time4 T9 M* _# F; I9 R8 I6 o- |& y% `& U2 x7 e" o8 r
Answer : cdp timer 30! U9 [0 Z L, h
Question4:
1 E$ Z8 ]( f& k$ Q LOn which layer does IP source guard provide filtering to prevent a malicious host from impersonating IP address of legitimate host?9 x* B# h) j8 y, }$ W: }! k) ]8 ~5 K( k/ G7 B. v( x) R
A Layer 1
$ F5 p) A s, g0 Q, p. mB Layer 2( M& B" n- z, V0 a$ O& w
C Layer 38 j1 f5 M3 m0 s1 J% u/ F: v$ u y
D Layer 7
* Q* ?: q; \; t# c+ B RAnswer : B: Layer 2& R w& G3 }9 o) k
Question5:5 P- \5 b/ y; G- n8 z! H, M1 [ N# V: }, K/ R7 }4 g
Which feature puts the port into err-disabled state when the port has PortFast enabled and receives BPDUs?
- ?% y/ `0 V. c+ [A EtherChannel
0 L" a3 O* p, V$ W% o* C2 m7 C5 GB BackboneFast8 J* R$ f7 l i1 g* R2 q1 p; q7 e6 c$ s E, ?
C BPDU guard6 B, h2 h; y' K( F3 A: W4 C4 x: l1 h0 N1 H7 S6 K
D BPDU filtering& F$ A/ E# ^5 y$ T7 x
Answer : C: BPDU guard! x$ T1 ^# N% |; `5 m# H
Question6:& _ u$ k6 _, {# T
When SDM templates are configured, which action must be performed for the configuration to take affect?# ^4 c$ S% N8 A L1 o r- @ ]1 ~- Q/ X" o! y6 q* o
A write memory- z4 }0 |8 }: n* Q' O4 `2 _; V; Y2 ~+ m2 ?+ r
B shutdown& v' ? h2 F7 z, Y+ F9 g
C reload" F7 u1 Q' y8 k# z% ~- U+ Y$ W
- O& J4 g1 @3 r2 LD backup config
0 r! i# e1 _, S0 r; TAnswer : C:reload/ Z8 K* K* `, w: \4 O1 p9 Q7 d& e) k* K" k; w4 z8 }
Question7:% R7 W6 U8 l% P; \% a0 r" O% C2 n$ \/ J
Which of the below options is VALID for etherchannel load-balancing?0 L& U# J$ j0 N
- Z% k2 h, L, z5 C/ Y/ k$ v0 ha) source mac , destination ip8 _. A/ k- X, `' ?% C) g
b) source mac , destination mac- U9 x- v" v3 Z) Z; T* o/ n+ q
5 P, d4 {: l" ]" J2 x- \c) source ip , source mac& G6 {" M6 ?. ?: G- n: B
d) destination ip , mac ip {9 F2 ^6 Y Q
Answer: B) n" o& n/ F+ |* F3 R1 _+ ?. z2 K$ N8 Y1 `$ M1 L; J% E
Question8:+ _: F/ ^7 ~+ k0 a2 U% a6 A
Which two statements about SPAN source and destination ports during an active session are true (Choose two.); L& ?4 J* o' {$ ^ h# p7 }0 C2 u8 N3 r2 P
A the destination port can be destination in multiple SPAN sessions; k6 F1 A& S# {# A
B The source port can be only an Ethernet physical port0 N, A6 c" N: n% z& A! ~3 G n8 a1 P- I6 @9 I- z0 P
C The destination port does not participate in STP
, A4 r I9 v: y+ S. f( L9 y t1 bD You can mix individual source ports and source VLANs within a single session
4 f( L+ i3 Y/ r1 gE The source port can be monitored in multiple SPAN session.8 ?. L+ e% ^& G1 T* K9 B0 i8 b; k
- m4 H1 m6 M u% SAnswer:C,E3 X( K$ I0 b- G8 Y% Q$ x5 e: ]) ~# x
– c) The destination port does not participate in STP
& _5 J5 {3 Z9 M" b, ]/ ?, F– e) The source port can be monitored in multiple SPAN session." v, r: [6 K Y5 L7 ]+ {, i& s0 u0 Q( C# \0 \5 i! j
Question9:* X9 r! T3 q9 G: l4 w
6 f0 b" `% a& T( z9 S O7 ZMST Configure on switch (spanning tree mode client)
" o& R1 i: I* D+ y( p3 qAnswer: Configure Manual, same region name, revision number and MST instance VLAN mappings.( o$ n8 U) c' F# h$ N
Question10:# d) Z, _7 w9 }/ r$ z0 J# @" Y5 i* z& w7 v! D: M
11. What is the max. “stack bidirectional speed”?9 |; g. B- s" R+ t) C% |1 \
& B$ `9 U. P& Z$ l) \A) 8000) d a9 ]3 @" N) C6 O; I/ X ~2 m
- a# h# w0 p: f" lB) 160002 @4 Z- F! m5 Q9 p. _6 y$ T: f( X! u& O, `
C) 32000 **
4 R5 G9 R7 s1 ]9 e( {D) 64000: M0 E5 Z4 J+ D% u! ~
* ^6 b+ V8 u* ]4 n% aAnswer: C:32Gb2 `5 a( s) q/ Q m9 d$ T; L2 m4 T/ l( T, V6 U
Question11:
. y- W5 |" b% W6 F* ~9 ?; GWhat’s state of port security by default in a switch. p5 v& _1 i ?, ~2 s, |9 |* S
Answer: Disabled+ ]! X! m# v- _; t( X) ^# |8 ~7 q7 ~: \
Question12:
4 J; d/ K. q8 c+ u6 g9 N1 Z" YExhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that duplicate with virtual ip address)& T/ m. b% X" c" m5 q- S
a) misconfigure: h) F# W b' B) o/ s7 ?2 x
# I$ j" X6 D, f- ~1 ?2 R+ gb) PC’s IP address
- U* x W% ?- A1 I; Oc) STP Loop (This should be answer)( [: R, D( I: [7 R1 T l+ i# c
d) can’t remember+ |: E. ~, h. v5 @: n- r
Answer:C9 W! c3 q) p8 q1 g1 L9 d1 A2 J
Question13:" S& N6 F" o' Q+ @- i6 X. n; }- ]2 u; \+ a; ]+ b
Where does a subordinate switch in a stack store the information about VLANS?. y6 Q8 [. N2 Q- `& q
: P4 N7 u+ F' G. P, b* m, X, ^/ canswer : vlan.dat
8 `# ~/ y: V% x" J9 n% ?& tQuestion14:4 d) G) V8 \* }5 Q& x' \
- W* H5 A$ k8 y9 U9 \/ o) O jOne site is “active” on port channel what other side can you configure? Choose two.7 w1 ~ i$ H$ f5 T. C* t. T/ F
A) Active **, j) I- S7 X# |9 d& N4 h
B) Passive **
& o) {9 N+ B, l$ {' x2 H. C7 ^C) Auto" u+ [; P% n0 w& I2 Z
D) Desirable/ D7 _1 i6 ]3 b) ]; r+ s g8 {
6 ]/ f! h h. Q. }Answer:A,B:Active, passive
5 R/ n) \& ]* G) ]# ?Question15:. [: G T% x8 b- |4 j
# V- `/ p! D( } aWhich two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration (Choose two):
( x& w% z; E* k4 G5 f- `$ nA) The switchport that is configured for VLAN 50 is the primary connection to the spanning-tree root switch! f, e/ k* n, i& G7 B% ^- |7 I8 K
B)The primary value for VLAN 50 is set to 4094 on the root while the local switch priority is set to 32768( ]5 v( y, Z+ j1 |
4 _0 Z# g7 I8 H+ P7 Q! ^C) All ports that are configured on the current switch with VLAN 50 transition to designated ports; J) c+ B& E* j" r9 @* H# j8 F
D) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value V% R4 S2 Q4 U
* U) o+ m/ y; ]6 \) I# jE) The spanning-tree timers are reduced to improve the convergences time for Vlan 50. `: x, o6 o3 V. T( t
Answer :C,D+ O& V9 A; [$ u J4 c
9 {( a" j8 [1 y9 ?* I( D( i3 x– C) All ports that are configured on the current switch with VLAN 50 transition to designated ports (because Root switch has only designated ports)- E. B& E3 d8 ?% h! |1 K
– D) Spanning tree determines the priority of the current root Vlan 50 and reduces the priority of the local switch to lower value0 u8 k! D4 `+ T0 O. Q4 I# s1 f5 G+ u C2 T B
本帖隐藏的内容
' W$ j! z* R, b0 p+ wQuestion16:; }! g7 C `$ i+ g7 s/ S4 w/ t5 J7 j- R& N2 s7 h3 I( e# M
L2 etherchannel formed where do you assign IP ?
* o- A6 ]% r- x( Y3 Ya) dhcp v6 W2 O* L! N" p/ o! W+ W7 T$ R: e; y1 ?& F) v" I5 A7 G
b) physical interface, M0 ^3 m. f* v: D9 j; }
c) logical interface (this should be answer)+ d/ Y1 V# R( k6 W: }( Y# _8 t
d) lowest physical interface; ~/ m u/ F6 u- |* W+ o& u
Answer: C : logical interface7 c& M4 H0 c# ? L: `1 Y ?; Q% |2 r$ U# H8 ]* Z M
Question17:1 e0 D) F3 W+ K! A7 ~4 O! x7 |( y
19. There was exhibit for RSPAN with two sessions% a; Y: Y) X) i- {( r! h# \! x; `# i" ?; k1 U4 J% d F9 s, {
a) session one had destination port was missing
% i3 O; G# v( c* |b) session two was properly configured
" R6 n& N4 p3 k& s( F5 e??" u2 C: \5 T. E1 ^( M1 N- l& x& G4 H0 u# g3 |
Answer: session 1 is not properly configured7 ?7 p/ I, A4 B q) x# O
Question18:
3 s, \( l- j+ J' Q- w20. There is native VLAN mismatch after administrator change native VLAN to VLAN 999. What can be the reason for the error message? C' g% r& t' b8 k
% n% E# u; ?+ k6 C, ^2 q( SAnswer: Native VLAN is not present.6 @. N9 Q% k6 P- Z$ q& m+ Z, o' ?) x+ h6 d
Question19:# {$ m9 O/ o: e$ j
21. Why is there a mismatch?$ r2 y# E9 \* G, b. g- [8 |
. j: H% `) f, a! x% w/ {Switch1# sh etherchannel summary
: X: s7 q, A6 h! H h* p) \Number of channel-groups in use: 1$ Y. U# [8 k8 R) H; J8 U% H; F! m' q, K& D* U9 z
Number of aggregators: 1Group Port-channel Protocol Ports
2 V0 g* `7 m8 B) y1 Po1(SU) LACP Fa0/1(P), Fa0/2(P)0 ?. R5 j7 B- Q- r# q; [; g: v/ P) q. U0 \" c1 ?
Switch2# sh etherchannel summary, M" R9 V8 B5 g- H0 N \1 V* W4 f8 H% [& q u* _
Number of channel-groups in use: 1
8 o" M& f8 Q* c; ^0 p1 |; MNumber of aggregators: 13 \" L' U7 x! b$ f
Group Port-channel Protocol Ports
$ q, S* L4 Y' d! `1 Po1(SU) Fa0/1(P)8 _7 I" f% Z5 C# U5 c7 I( ]' k6 q A) |8 j7 [4 j
A. Port channel has not been configured properly/ H$ _0 r) p% b0 ^9 j: b1 p2 S) W
1 B6 V) R. z4 W$ o( C; Y) _) ?B. Too few ports in Switch26 L& F# f9 e+ z( ~0 I% ^8 I
/ N; Y( I5 p# @C. Too many ports in Switch1
) `/ Y# k! L( o- G" k, O& i' mD. Protocol mismatch4 f# x$ f. P8 u; F# e" w" K# [% [* {& t
% ]% \+ ?; o$ w' K: Q% f# kAnswer: A: Port channel has not been configured properly- D& D$ F; B- P& D4 C4 N- \( k3 n4 t( v" O
Question19:7 w5 E% q- E, d6 v( q
What happens to the sticky address after copy run start and reboot1 V( Z0 Y: N U' r6 K3 Z. c9 m% j1 Q+ V- H# j4 S
A. Sticky address are still in configuration
5 g! r4 R5 W" v1 W& \' B1 P4 TB. Sticky address are not in configuration( N, e3 d. F8 ? c, t/ N9 I- B- F, b- g" w7 u2 x& Z
C. Sticky address can be unicast or multicast address) p. G4 @7 D1 ?+ c
0 F& k# F" Z. V @1 s) rD. don’t remember+ i. r0 h# h2 O( J& n ]' V6 x" e* e" K% E C% J6 p
Answer: A. Sticky address are still in configuration (If you enable the sticky method, the device secures MAC addresses in the same manner as dynamic address learning. These addresses can be made persistent through a reboot by copying the running-configuration to the startup-configuration, copy run start.)8 w6 K, t g: P ], n. r, _" S$ F$ C
Question20:
) [/ l4 }0 j) W: TWhich statement describes one major issue that VTP can cause in an enterprise network when a new switch is introduced in the network in VTP domain server$ X" y% C, Y. s, ?5 K& v5 y2 [ g1 w* L8 b/ Q8 f9 o
A It can cause network access ports to go into err-disabled state- [. W4 e, P! g- u( d9 y
B It can cause routing loops3 D/ w2 `0 \5 X; Y2 P: |5 P1 S: | L4 e& I# k0 I( O5 T, h
C It can cause a network-wide configuration change if revision number on the new switch is higher7 U6 q* w0 A. ]; @
D It can cause a network-wide configuration change if revision number on the new switch is lower5 i, R9 M& k: @" l o* \
Answer: C: It can cause a network-wide configuration change if revision number on the new switch is higher) J$ c; n, R7 U
# {( p1 u7 G5 s9 C& hQuestion21 W0 ~3 r# m# V' Y
# p' ~2 R. j: e5 d24. A network engineer wants to make sure that an access switch will never become Spanning Tree root for VLAN 5. What action will accomplish this task?6 s& D2 o8 J% i
A enable MSTP and use a different revision number that all other switches. X& I- f+ o+ }. \; K% h! r# L) `! T& ~5 Y4 Q
B disable STP globally8 ?, |0 r! [. l" q8 V
C apply root guard to all outgoing neighbor interfaces; f6 i, ^6 ^5 Q4 p
D adjust STP priority to the maximum value5 O1 E U& l' U6 @& p
G) E3 I2 g2 l) HAnswer: D: adjust STP priority to the maximum value (so it will never become Spanning Tree root for VLAN5)8 G9 \5 ^; M* O6 r' O7 O1 @: h. b. `) V: G& f% |
Question21:+ o' W N) z8 Y1 r- z- ^, }# ?$ ?. [
Two switches had two redundant links between them. An interface on the primary link has a problem and the admin wants to move the traffic to the other link. What action must he perform?$ |) s7 W9 G( Y2 @7 @% c4 f- U" d6 n/ F. i3 ]$ e) D( E7 A
a) Change priority for secondary connection to a lower value than the primary
* K3 {6 }- E$ H4 p9 r' s3 {. Sb) Change STP mode to RSTP% e+ W4 @4 M% v2 g9 C
c) Configure a Point-to-point connection for the secondary link
2 S; r& D% w* M/ k5 {d) Apply bpdu filter on the primary connection0 t( e, g% t5 w9 j7 c0 m4 P$ g
. _$ U$ D' W2 j$ k4 l; {Answer: A: l) b0 F- \+ v) o* O4 F$ B8 c, @ P! W% W
Question22: i" W* V' c7 y7 {' b Q
27. Question with recognition of vlans 3050 and 3060: r7 f6 H' D2 P; X. ^
0 x7 Y3 d0 k' T; U2 rAnswer: Vtp version 3 is the answer) P6 S" j& A- P4 J/ U
0 t) ]" |+ ]& @( xQuestion23:
8 H C% o( e8 {; C3 Q28. Question about the voice vlan; P# G6 D5 u2 P" K! M5 d1 E9 L% n8 m5 D/ P
Answer: PortFast is the answer, p7 ]: Z; S6 M/ o; |
Questions from Old dumps:# l- B$ A" R D; A& V4 u7 H/ @2 I, L; Q# q
Question24:7 l0 Q. w5 \2 {/ i( ]
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is" b, _& f9 P" |. Q# z9 q5 c2 N, { w
9 E, Y% x# m0 j: d) ^# K, ^2 L# ?the problem?$ A5 R9 J% U/ ?% y z' z8 n' C* A+ c- y/ o* \7 m' P& o
A. The VTP server must be reloaded.' s3 o. y( b( r {9 k/ M6 M
B. The VTP version number must be set to version 3.9 J" `9 ]- ^$ |9 ~8 k4 ]7 N% k1 a: Y- i M
C. After each update to the VTP server, it takes up to 4 hours propagate.% Z' s0 q6 |# y4 r3 X4 K/ ~ _4 e m6 W' j b( K7 i; F+ V
D. VTP must be stopped and restarted on the server.; ]5 v5 |0 G2 Y: B3 o" T
E. Another switch in the domain has a higher revision number than the server." S; K. U+ C" W! D1 k" z+ H+ }# P' }4 p4 S, K' E: a$ d- `6 U
Answer: B
. m5 l2 [* n0 x3 f1 TQuestion25:! c+ ]& A& Y G0 w1 k9 j7 l. H3 I$ I" G6 r
Refer to the exhibit.2 g- W. [. D5 V' l& }1 D- o8 _
A multilayer switch has been configured to send and receive encapsulated and tagged frames. VLAN 2013 on the multilayer switch is configured as the native) a1 v# v* M8 l: [" q, J0 a
VLAN. Which option is the cause of the spanning-tree error?0 }, E1 ?9 U" U0 s- Y
A. VLAN spanning-tree in SW-2 is configured./ t1 i; V# T- y+ T' _) `9 [1 h% L9 `
B. spanning-tree bpdu-filter is enabled.
( y s9 o% N! U# M/ bC. 802.1q trunks are on both sides, both with native VLAN mismatch.' x$ z4 t* h0 K* W& r$ L
! T# D$ X4 x8 AD. VLAN ID 1 should not be used for management traffic because its unsafe.' C) g) z1 w! O8 r/ J5 O1 Y* F b* S' V9 ?
Answer: C
( z! E3 l* _/ \0 C4 {Question26:
$ k( }' O. C9 G1 d" ^Refer to the exhibit.& s: ~. N) g- a$ j% U& @. R4 H
" ?1 }9 R" w8 xf1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport f1/1 as a primary port?
& ~* e/ g K9 |# }. [1 `& {- J( E( oA. Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16.7 i# H7 l. K E2 g% }
) f# e8 q( |7 V( {0 V4 bB. Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0.
+ B8 p) j' t4 p: S0 @# C9 P0 nC. Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16.' F! @# U1 [' [3 \ c
D. Modify the spanning-tree port-priority on SW2 f1/1 to 16 and f1/0 to 0.% V/ s9 ~5 Q5 Z e$ y$ x; `
Answer: C/ J7 x: N' T# O2 G7 f$ E5 S# {# e) R5 Q# I7 I$ p# _* u! {* e
Question27:+ w+ C4 y+ N7 j4 |' C, M7 ?+ u
A network engineer configured an Ethernet switch using these commands.
# W( I' s5 c7 ?$ H" L) o- N/ }Switchone(config) # Spanning-tree portfast bpdufilter default Which statement about the spanning-tree portfast feature on the switch is true?7 D) }& }% O) Z- [
0 f3 _( e# `0 m' c6 hA. If an interface is enabled for portfast receives BDPU, the port goes through the spanning-tree listening, learning, and forwarding states.# U/ s" Z$ _6 O2 y6 v
' Y# R$ V. g9 e; e9 pB. If an interface is enabled for portfast receives BDPU, the port does not go through the spanning-tree listening, learning, and forwarding states.; g9 \1 y* _" R+ E
C. If an interface is enabled for portfast receives BDPU, the port is shut down immediately.+ R: k3 {% ~5 H/ k& m! D: }- W; {1 J$ M$ S @ X
D. If an interface is enabled for portfast receives BDPU, the port goes into the spanning-tree inconsistent state.
- r( a% _) [ d- w7 O4 rAnswer: A
0 F' {/ q1 y( mQuestion28:' \) W/ _% ], `5 q% a K
The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this
8 D- ?6 a# _0 L" m, R* G6 @: w# ocommand impact the traffic? (Choose three.)5 c/ f1 p9 J' p# g4 Z
! ]$ a# w- d& b3 T" @A. SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level threshold.9 {6 N, i1 G$ F' |) y6 w* h5 s- y9 ^( [! H z( W6 D1 o4 q
B. The switchport is disabled when unicast traffic reaches 75% of the total interface bandwidth./ o% R) T- f! q5 {6 p( H
( }! b7 P4 ~' S- cC. The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
6 j/ Z2 T2 u1 a, V- ~; bD. Only broadcast traffic is limited by this particular storm control configuration.- v4 i6 d9 E; A' B4 t* U, g7 \
E. Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total interface bandwidth.0 m) @- c: C2 `' j L. |
; v* L6 t5 \$ S0 pF. The switch drops broadcasts when they reach 75% of bandwidth.
! o' P! {3 x6 G1 S6 g+ j, O- Q8 p0 }Answer: CDF
4 O' S$ N9 f: `1 I: ?' z! uQuestion29:% [& e- e* f4 ^
" I3 I, x3 {+ B* ~Which command correctly configures standby tracking for group 1 using the default decrement priority value?; O. J( p7 o6 \, W" M9 a3 z* w: l H! U4 W1 w( C
A. standby 1 track 100
, v" F6 C# r9 y; GB. standby 1 track 100 decrement 1$ _- p9 C3 W, l( C7 y: z
C. standby 1 track 100 decrement 5
! I# V& z/ L) N8 R( E+ p* {D. standby 1 track 100 decrement 20
0 w+ R' B- X5 K: X( QAnswer: A3 z& E1 p# c6 c8 t7 I7 s: B
Question30 I3 o! c3 ]7 K& z. }
+ x$ u1 @0 _; d5 |: N1 ^After the recent upgrade of the switching infrastructure, the network engineer notices that the port roles that were once “blocking” are now defined as “alternate” and u& x1 }% t. t. v. V4 h4 I& {
) Z* r5 n# C7 R! E7 l+ Y“backup.” What is the reason for this change?
! h) H! f5 K; ZA. The new switches are using RSTP instead of legacy IEEE 802.1D STP.9 c+ u, g9 R* m; g$ z2 x! H5 W
! P. x! q3 m" `1 |' T) c1 VB. IEEE 802.1D STP and PortFast have been configured by default on all newly implemented Cisco Catalyst switches.% M$ p- o. O/ r( D4 S- ?
C. The administrator has defined the switch as the root in the STP domain.1 c; f8 _+ A- n2 N* g9 [
1 F$ O; }! G% n3 bD. The port roles have been adjusted based on the interface bandwidth and timers of the new Cisco Catalyst switches.5 {& o* K8 F4 I" B
: x* j+ R6 G8 E c+ JAnswer: A4 X* `5 f c0 a6 v
Question31:8 C4 @4 K, i) D+ W
A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU. W# u* d( u p7 A" b O4 `8 N# W, P
of the switch to spike during peak working hours. What is the root cause of this issue?5 ^4 u/ y; g' L- Y6 k( E
. H1 e+ G: R+ }# vA. The VLAN receives additional frames from neighboring switches.( o K: u7 X% e3 z$ J. N/ {. D+ r/ F6 @8 j
B. The SDM VLAN template causes the MAC address-table to overflow.5 F5 H5 ?5 [9 e7 P4 G
C. The VLAN template disables routing in hardware.3 U0 _2 q- C- B% q0 G( T- |6 ~! b& J! Z& G' N$ E' p2 i" K$ R
D. The switch needs to be rebooted before the SDM template takes effect.% W* [" |0 j) w7 ^
$ ~6 o0 E# l @. f4 E, d$ ]Answer: C6 D" t% h8 e7 X0 u9 g2 P4 g
6 J o+ D1 {6 f o# F4 pQuestion32:
! i6 [1 z3 q2 a* M+ c) iAn access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network administrator notices that not all traffic is
6 y9 L& t! i2 Dbeing replicated to the management server. What is a cause for this issue?& F$ E& q* p0 U A: ]! N" l( |6 a! A1 v
A. VLAN filters are required to ensure traffic mirrors effectively.( ]3 ^, N2 v- k
B. SPAN encapsulation replication must be enabled to capture EtherChannel destination traffic.! ]! D0 A9 d0 P2 f7 j
+ \2 y( B( A" ?0 h( d4 pC. The port channel can be used as a SPAN source, but not a destination.
1 v4 d1 a) F% W% |4 O: YD. RSPAN must be used to capture EtherChannel bidirectional traffic.! l' H0 O7 L0 h$ L a2 D
9 N, z2 u& ~! I9 GAnswer: C3 P& [+ _, w2 @$ {
: i" x v1 Y+ K" c# m% j |
沙发
2016-1-8 16:27:01
回复(0)
收起回复
|