成长值: 64540
|
4 q& |7 J- C# M. c. j: Y* U0 @
1. What is the Ethernet frame size for 802.1Q?
1 p( u. N+ ~0 @4 `. ?a. 64
R4 z$ w h! }3 j/ E6 S' q5 S* Pb. 128! _ p S% ?) z
c. 1518, y6 l1 g* b. {* g
d. 1522 **
5 ], Z ^/ J4 o; NAns: D
( F# b5 B0 X, g# v4 }5 F————————————————————————————————————————————————————————————5 \7 c( u- u2 }+ z
2. How will the traffic reach the core switch from AS switch to DS core switch?
1 l U& h0 ?; T" a9 S. X- E9 Z- Z2 S(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)3 l9 P4 j/ h+ h: F9 D9 ^2 T! T( t
a. ASW1 to DWS1 to core
2 N# D$ O3 P- t1 wb. ASW1 to DWS2 to core **
@) O/ U3 @2 k# H4 xc. ???: G1 u6 y( c- @" ~
d. ???
3 [) W* i% m; P M r% _Ans: B
2 H* V# d2 ]3 \! U! s# ?————————————————————————————————————————————————————————————2 s1 [$ l8 n2 o" u J. c+ ~
3. If HSRP group number is 45 what would be the MAC address?0 z) S+ I9 w- u/ i5 q
(Basically conversion of digit to hexadecimal with group of 16.)
, M, c! J, ~! L# O. Ia. 00-00-0c-07-ac-2D
* p% A8 A* R- _% m3 J1 Y! `b. ???, o+ F( \! R- Y5 j o
c. ???
- r4 g% w, H0 bd. ???* O* w$ T5 k3 O# W8 Y9 H
Ans: A
, X0 K! ^1 }5 ~4 w2 A: F+ jExplanation:" b+ v% R7 n. O e0 \! o" S' _
00-00-0c- 07-ac-2D
( b3 H N1 N# \ z6 cCISCO_ID :HSRP_ID:GROUP_ID/ k- Z. n! A) E
2d=45
9 ^3 B8 @! O$ X, [; K————————————————————————————————————————————————————————————# G; ]/ R+ x+ o
4 A question on EtherChannel misconfiguration…….7 i7 `$ [. d% U9 l3 ?$ S
a. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **9 I% G \ x, S! u4 ]% K
b. ???
. {5 ~5 \8 N% Q& g! v! ^% Q, zc. ???
* ^- a+ l5 o( ad. ???
& T' D/ M+ y( G3 XAns: A" a N$ W7 i0 a7 H9 g
————————————————————————————————————————————————————————————
. J* M5 t) T) H' V. ~5. Select a valid VRRP configuration from a list of possible configurations.4 ]2 G; B4 t. I
a. vrrp [group-number] ip [ip-address] **3 k: b* a+ p- c9 M: x1 \
b. vrrp [group-number] priority [priority] **7 f/ Z$ I# p* [8 x6 M: @
c. vrrp [group-number] preempt **
' X5 V' Q4 W& t/ [d. ???
$ S3 W/ A! v+ Ee. ???5 U x8 F7 F& c m2 n
Ans: A,B,C
8 p* o" `0 D! p& ?# Y- e( P- ^Explanation:
5 o( b% w' R0 J9 w- Z% k) ?You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.
2 I8 p: D" C% A( N5 {! S5 t# w9 y————————————————————————————————————————————————————————————0 S# d8 @( g; N$ I# q( E+ A4 _
6. Private VLANs (PVLANs) have two secondary VLAN types.# d6 p% y; ]) h0 t' y' }
a. community **0 d: v0 f# d8 y; X* M) K/ q
b. isolated **7 w2 W- c6 N. e7 I3 Y( C
c. ???
! O t2 V; C" a1 G& bd. ???
1 s7 B( T# D( ?# _% d. {( R( de. ???( c+ G2 A1 S) [
Ans: A,B Z; D1 [" [3 g3 ?5 Y! b
____________________________________________________________* A1 _* P, }$ L& ~2 j6 n
7. What types of SDM templates you can use in switch? (Choose three)$ R. [: S2 }7 s% d |) P; r
a. Access **
+ ^6 p1 i. m' ^) K. _b. Default **
6 Q% l9 g$ Q% [( t0 f" dc. Routing **. g" Q, N' F1 B4 B5 `& Z: f
d. VLANs **
. [) C) N. \; ~! V2 L( Re. ???" x$ P7 G( N$ z2 x1 o% [
f. ??? i) o0 K6 ~- H1 y
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)/ O3 ?) Y) [7 P" D; ]+ o
Explanation:
7 f; w9 X" a/ ^2 y+ B8 |+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
) P7 C6 g- a+ |. J+ Default – The default template gives balance to all functions.; ^7 b% O4 a: E A* ~0 A8 Z4 }
+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.
# U. _; `" ]- c( x+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.8 q8 J5 o6 w$ o& j3 {, {
____________________________________________________________
8 r" ^& v/ ?/ G8. EtherChannel – what is the process to configure EtherChannel.
& J" @8 }! `& }9 H2 Ba. shutdown both interface ports **) `$ n- T' {) z9 Q2 Z
b. shutdown the interface on one side only
H$ v3 b1 S0 ]0 G5 X5 ?c. ???7 o; j3 c2 d5 z/ G- ~% C/ T: ?1 F0 N
d. ???
) U5 ]! v% H& u) t4 QAns: A* |& k! U6 n5 m: w
____________________________________________________________8 Y# S ?2 f" `: J. U& h' f
9. A question about spanning-tree port-priority.
. ?) h" ~5 c @' Wa. 127 **( Y4 [2 p: {! E' ]/ u
b. 129) A# n8 n. {0 K X, l& w4 n$ {2 N% j
c. ???
0 v& ]+ u2 Z+ _0 `4 J% }- Bd. ???
$ b* n; H- g' I: j1 CAns: A9 a8 G1 L! n( N9 m3 Y9 D: C
____________________________________________________________
$ @0 N* A2 [; s( U, E- Y# Y. ~1 y8 s10. Question about EtherChannel based on STP EtherChannel misconfig……
- R) g+ T6 ~, M, g% wa. (config)# spanning-tree etherchannel guard misconfig **
- K) Q7 w* A; A! Vb. (config-if)# spanning-tree etherchannel guard misconfig6 g; @. L6 ]. w. m* `! D
c. ???
# T9 W! n* F0 ~# ]1 x( [& Ed. ???
6 p, m7 F7 r4 e4 K E, vAns: A
6 j) T0 s2 Z* k# S7 M________________________9 A4 K& N, D% a5 {
6 q) f8 L3 b0 {( c9 q46 Question about voice VLAN.- W# z0 H7 B' ] d
a. Disabled by default **
; X, A# p. W, U q/ R+ Ub. Enters on untrusted port
$ n3 H/ T# H6 ?# Q2 W2 tc. Default CoS value of 5 for untagged….. **8 l! q6 P) t, e( L5 c) R
d. Needs manual enable of portfast.
6 G/ w" {0 ?" q4 o5 JAns: A,C }9 E: k* W1 C3 _
____________________________________________________________
; O( [: Y/ O f: V, P0 e T5 R47 . Question about UDLD aggressive. (Choose two.)
% r5 G- R' V2 oa. UDLD messages are sent every 15 seconds. **
+ M* ^8 q1 p R1 T/ J- p( h; ^8 ub. UDLD tries to reestablish link once before declaring the link down.
; [$ Z/ U4 p* ?: O% t, V2 Ac. When unidirectional fail is detected, port state is determined by spanning tree.' X5 \8 B5 V( k" w
d. When unidirectional fail is detected, port is turned to errdisable. **
& d- u* N2 D j& A, F8 ye. UDLD sends messages four times the message interval by default.' O1 X) ?3 X; n; Y
f. UDLD automatically … message interval based on configured timers.& o9 g) q6 z/ f
Ans: A,D
& T J3 B, [4 W5 C7 T o. j____________________________________________________________
% h. v! J) H+ r1 \. f6 ~48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.
- k4 t+ l I2 }+ c7 RQuestion is how to make DSW1 the primary root for VLAN 10. (Choose two.)/ i( Y- B7 p2 j; A H8 N
a. DSW2: change bridge priority to 61440 (highest). **. r& S4 S+ `2 M) e" u
b. DSW1: change bridge priority to 4096 (lowest). **; z/ {4 K [/ t2 |+ n& s
c. DSW1: change port priority but in global configuration mode.! g2 _2 Q! C6 a
d. DSW1: change bridge priority but value is 0.
o1 U; j: e5 O% [, ]- _9 B) k* ue. DSW1: change bridge priority but command is priority root.
4 H5 g2 k; ]7 AAns: A,B5 {/ }5 {: |* o9 a1 [' n
____________________________________________________________" @- Z9 W) E$ p9 v0 s( X7 i3 B% I
49 . How to configure dynamic ARP inspection on a VLAN?
7 ]+ N7 c7 ^( `, G5 a& h( B- Ua. (config-if)# ip arp inspection vlan
4 @0 r; O1 q% G( u4 {b. ???
, E% e! v( |: T0 y5 ]/ kc. ???
. x9 \2 m% l! N3 n l2 {! D9 d4 Y8 s$ jd. ???3 e0 r K5 g4 c
Ans: A
- [) ?; g3 p- g, y- L' A+ j____________________________________________________________
Y1 v. _/ H' h2 h0 I3 _: M& k# `50. Drag and Drop – Port Priorities
5 E9 {4 O$ |. r8 V' O; EPort Cost
7 z. Y8 O \* B2 \' S– 8 default is being the interface value! o$ j. h u9 v) q3 ^
– range 1 – 200k (200,000)% i2 n' {9 H/ g1 E" e3 E4 `* t
Switch Port Priority
- I- ?' l+ z1 H) N– default value is 1282 S9 D, j8 {/ q& |+ o6 A' ~
– multiple of 16! j' q4 D# D/ x
Switch Priority/ N5 H9 [1 l! Q
– lower the better
& B9 b9 V3 f9 X1 `* M1 U% Q, |8 [– multiple of 4096. E+ [4 K. C; Q% b
5 W+ y7 P0 l6 c7 }2 ^
|
|