设为首页收藏本站language 语言切换
查看: 7365|回复: 132
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(5月24日更新)

  [复制链接]
 成长值: 64820
发表于 2017-5-24 11:47:04 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2017-6-1 16:44 编辑
( A  k3 F8 F+ Q6 j8 u
8 ]# a6 C9 q; J! t) ]( p
: r/ R) U* ~1 X# R0 C; c1. What is the Ethernet frame size for 802.1Q?
  [) O% m/ q3 c5 P5 Q, aa. 644 Z+ }4 K: `$ |: N- F; ]
b. 128
- l; E5 W5 C$ Nc. 15187 E3 y% o: K* F) L8 E
d. 1522 **
; w% ?5 Y; z2 }) b4 C3 aAns: D, A" e9 Z+ H, u) E. X# o
————————————————————————————————————————————————————————————
; I" Z% m. @6 B4 c7 k% g% o2. How will the traffic reach the core switch from AS switch to DS core switch?1 S* N0 Y3 L- P3 m- w
(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)0 t* c; q5 |. R; H# T! ?3 u
a. ASW1 to DWS1 to core
! B+ b" x; c( {b. ASW1 to DWS2 to core **% d! e! w* N! e5 B2 Q
c. ???
  z. l5 S1 B& c4 ed. ???
8 D+ W) A8 C% |2 r1 KAns: B
8 s' \1 T/ E$ w5 q/ h% h6 m————————————————————————————————————————————————————————————1 `- {! }; b! m- k+ G. g7 p$ u
3. If HSRP group number is 45 what would be the MAC address?- Z( n2 G: m5 T( O1 d" h
(Basically conversion of digit to hexadecimal with group of 16.); B+ ^. a/ R; a; b+ D2 {+ w5 c7 C
a. 00-00-0c-07-ac-2D- r" x% F3 x) s: `! k
b. ???2 G# n0 p0 }4 d. Y/ g
c. ???
, L* d& i( J$ J+ b5 ed. ???" y# a$ W# Y- G7 o
Ans: A
+ U/ w  _4 o& j9 U; r2 aExplanation:/ o' Y3 \8 U2 J, \( a# N$ v1 g, u% J) D! c
00-00-0c- 07-ac-2D
) e; i( q$ E; J1 CCISCO_ID :HSRP_ID:GROUP_ID
' x. l: S2 f# s  M2d=45, N2 c( l' J5 E$ A8 W9 d
————————————————————————————————————————————————————————————) @. T4 g4 G; K: c* {
4 A question on EtherChannel misconfiguration…….
, {" j$ ]+ B/ q" M) ya. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **3 E% I, O5 J) y
b. ???
8 i/ Z4 t. b, K. dc. ???
. ?& x0 t' a9 C  y: t3 N4 Cd. ???8 L! h0 o! U+ V( R# |, L
Ans: A6 {8 W  ?$ j6 ?0 I
————————————————————————————————————————————————————————————8 m4 s. U, m2 T* x, E/ l" Z8 M
5. Select a valid VRRP configuration from a list of possible configurations.9 e# l, x" c* R! q& V' y
a. vrrp [group-number] ip [ip-address] **5 T+ a1 @% A# X$ W% p+ |' S
b. vrrp [group-number] priority [priority] **
/ q, {7 U$ H' Fc. vrrp [group-number] preempt **
# k9 m+ U. d4 {! q8 x0 ]d. ???
; J5 e5 |& a5 ~e. ???( R% G' S5 p' H, `; J& q" R- Y
Ans: A,B,C/ o7 o4 N. a- g+ X9 P
Explanation:! Y  g! K. s3 N
You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.
6 a: S' `1 h  [7 ?3 W  ~! Y————————————————————————————————————————————————————————————
. p! r/ ~8 [& w- Q1 g6. Private VLANs (PVLANs) have two secondary VLAN types.5 A! R2 u, z6 [
a. community **
4 z# J2 d8 J5 o4 P5 Zb. isolated **
5 J1 [1 R1 I" `c. ???9 Y8 Q9 w" V+ B4 [; i
d. ???% h& k: d3 T5 U* K2 o
e. ???
) ~1 H/ V! u+ s1 hAns: A,B
  r0 N2 ^- G  c% B: U____________________________________________________________  R" L, |, ]. X
7. What types of SDM templates you can use in switch? (Choose three)% H6 G: G/ _- f6 x) i: X$ n
a. Access **0 p6 g5 I2 J' u( [7 w
b. Default **
, w8 o  T' m  _0 uc. Routing **! W- C% e, D0 z1 M) N
d. VLANs **
# u) Y5 c6 e  L9 n: a- q& r5 u% ue. ???
0 x7 u+ }; O3 U3 ~/ h! m! e" p& Kf. ???3 H, D) O* d, s4 [# V
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)  l# z6 k2 P4 B" y
Explanation:
( c! ?- h4 H4 `% S8 \2 J! G$ V' ]+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
# w/ k7 ]( N) a+ Default – The default template gives balance to all functions.& x4 m( U6 u, C1 r. h; v( J/ r9 k
+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.4 ?; e2 f6 t+ G, U' R
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.
5 f' V: Z2 i8 s2 `" V4 z____________________________________________________________
* ?# N9 m6 G  ~# o) u8. EtherChannel – what is the process to configure EtherChannel.
, |& p" Y, Q5 ]a. shutdown both interface ports **
( @" M! _! L$ H3 }" H+ vb. shutdown the interface on one side only( X' D9 ]7 Y) {
c. ???
2 i* n$ k7 q- u, dd. ???
8 d$ w# y0 c; x( WAns: A
& `) \. u# Z1 V1 u____________________________________________________________' `; |& s5 k9 X. e, F( \
9. A question about spanning-tree port-priority.
) W, v: F! C' f& ca. 127 **
7 J% l) I& E; l6 {5 K6 [b. 129
7 L) t( P. M$ _( F8 N: ^$ ]c. ???
8 Y2 Y/ o5 `2 N: v3 Y' Jd. ???4 l* o% Q9 K9 Y. ]& x5 i5 P
Ans: A; i$ N8 `& }! F, }/ `
____________________________________________________________
9 _; ?0 x/ n" z) A10. Question about EtherChannel based on STP EtherChannel misconfig……
0 O: K3 s- C. j+ z7 n; N9 Fa. (config)# spanning-tree etherchannel guard misconfig **0 j, X+ e  g, P% I; k  Z" Q/ E
b. (config-if)# spanning-tree etherchannel guard misconfig
6 V9 E4 Y5 Z8 @) g* R* @& cc. ???+ M$ l) F- a8 v& q2 p
d. ???% d8 a1 h) o8 L) Q
Ans: A
7 V. F- z; Y& m________________________% e1 K9 X  r7 N# z) L* W
* `% h! L6 r3 h5 s
/ e+ i& m/ B8 |
___________________________________* O$ H# ~' r2 p/ r; j: Q
11. If HSRP group number is 37, what would be the MAC address?6 ?7 s' F; w' C) O
a. 00-00-0c-07-ac-25
" e( U7 E8 d, f0 T* Fb. ???
* N: }7 L# W/ p/ q$ Gc. ???
4 v" i. f; c% Y# id. ???/ \- e. z9 p) a
Ans: A
- s  f9 t- R4 g) A____________________________________________________________3 j: R- O0 U. g; z  f8 n
12. What is the default value for spanning-tree port-priority?
# l7 ]( }% A. I$ ?/ s5 ^( Fa. 128' @' x' @; t8 l& q
b. ???
9 B7 @) q0 ^% `8 Uc. ???
. u- B% W5 n; h5 o! b7 B) ?d. ???0 c" g5 o8 o4 G- b( b
Ans: A
! y3 w/ A+ O, `/ J  }____________________________________________________________
# {$ T5 ]6 R$ E13. Which information does CDP supply from connected devices?
1 s3 C  \6 x( ?1 U% X9 r  [5 ]- ka. hardware platform, interface ID, hostname2 r; h1 d" D. b- z: v4 E! ?+ E
b. ???
3 m7 ]2 r! I, ?2 y! Q5 G& |c. ???
0 x, r* x9 g7 f* ud. ???6 z& Y; a3 A3 C4 H
Ans: A
' o( G- Q2 S6 I- y' h____________________________________________________________" k/ J* j, @9 F  R
14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?+ N% ]  `: m: N2 }% t
a. errdisabled$ Q  V( F# `; I
b. shutdown6 Y0 f3 F2 ^# ?8 F1 m% M$ B' T, Q  P
c. ???3 T" P+ u  [- I% _
d. ???& c  u9 ]( q- F3 ]
Ans: A
6 `) W# C* {$ u7 m; o, R6 @! C" G____________________________________________________________3 m1 V! ^, K- g+ \0 k" U
15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?+ K& i6 K' C7 }2 U
a. isolated
/ J4 N( u; {. I7 o' H, xb. promiscuous
/ b; i- K) }* [" rc. ???- h' V5 X& V; G" w4 ~
d. ???) k$ W" O, g, {+ J4 O
Ans: B/ y1 H) r6 H9 X6 {% x$ b
____________________________________________________________) p8 k  e8 A- R& L& c- b3 ^! V
16. A question with an exhibit.
9 X. t' b: Z: t( DThere are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.
, W3 k! r5 W* l0 [a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.1 Q! i+ L+ W& D3 J% @( K1 [; h
b. ???
  P! E1 V# S  F* Fc. ???
' q  {; `: C! i( Bd. ???' z- W! M7 m5 n
Ans: A. P+ N) l- ]: ~% C
____________________________________________________________: t% N& c! p) C* y
17  Which option TPI 802.1Q tag?
2 y* D, e4 o0 H8 l* b+ R& Ya. 0x08067 o- Y! j( a3 z+ V
b. 0x888E
1 `1 b4 l! m3 D( G5 c" P" qc. 0x0800
5 |( D& I# x* _d. 0x8100 **4 z0 h% @+ U( l& o0 T
Ans: D: Q$ g- I% P& V1 Z
____________________________________________________________
. T% h, ~  h) e6 F4 |18. MAC address filter?
- a2 C! Y; b8 F2 L/ E) g/ u) y, \a. CPU-destined
4 N- K0 o+ u+ I" V! Y, ^4 H# Kb. router
2 M0 q: U# ^  s) kc. unicast **6 U  j6 ]# ?/ T! b' F& X! a) S
d. multicast
& E, v- J# B9 j0 ]% |% GAns: C
. e! F) v5 \+ J: B; D& N____________________________________________________________
& O- W) P  o$ @$ c% d2 K0 a19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)' r, O/ ?. \- s
a. trunk port will be immediately) i+ v  u; ]$ u+ D
b. trunk port can be portfast mode# W! J% w3 y1 x# q" a
c. BDPU turn this port to err-disabled **  j& X( p' Q2 O3 ~/ c
d. ???4 c2 A# k' H1 [, j0 w
Ans: C
9 @7 O# j* e4 S5 U' C- G- |7 k# [____________________________________________________________
8 Y* Z; V+ Q, r20. Question about root guard….
4 m6 y8 g4 }# K3 Ea. Prevent unknown switch be a root port
; }& R" N  u- T! Q$ `b. Root-inconsistent **) I) }$ `. e& f4 z$ m+ R
c. ???
6 M' a# }# S- K$ kd. ???
, d/ z# v7 ?( J& Y  @+ F% Q4 U  t2 wAns: B- V5 H  ^# [$ @& h0 n* P4 D; p
____________________________________________________________
% ]4 }' K2 \- s, u" p21 Question about Loop guard configure……..7 S; X4 ~7 ?/ C4 K1 B; H- _
a. (config)#spanning-tree loop guard default4 ^2 |. y: S4 R& m: w; t- N4 ^
b. (config-if)#spanning-tree loop
3 i4 B, ]+ f. [% cc. (config)#spanning-tree loop-guard default
. U% r. b2 t0 C6 i6 S& H6 P* |d. (config-if)#spanning-tree guard loop **
$ N) J& g' P3 T- O+ J9 te. (config-if)#spanning-tree ??????! b- k: q3 B- ~
Ans: D7 P8 Y* U) N( k! C9 S+ P) r9 \4 x7 j
____________________________________________________________
# t3 K/ n) j; }+ r3 B8 m! }22. VMPS question – a dynamic access port is member of which VLAN by default?
- Q( G, N: }7 w8 `7 p" l7 n: ?" T- ea. VLAN 1 is the default VLAN **7 P" n5 g+ v$ m
b. none until the port VLAN is determined
- }/ J9 i% z# \* wc. ???" D' S8 V* ~" }: M0 j
d. ???
. t& O0 X0 y* G) O/ c5 I: AAns: A
, V9 d2 k$ Z: B1 F5 o: n! S0 f____________________________________________________________% z( }9 N0 T! a2 U4 q4 F
23. Question about the behavior of an access port when a tagged packet is received.6 ~! m; g( M* n
a. packet is dropped./ H& m* Z/ d4 r! M/ G; Q
b. tag is removed and packet is forwarded on the VLAN of the access port. **6 _7 q0 b3 H& s3 g
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.
( _( ?$ {& E  [# ed. ???
1 C4 S/ U' f0 f# fAns: B
# g: S( x1 H/ u- P____________________________________________________________
. i; N3 E( m' H2 n24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?
2 Z' m8 e6 w9 T" C# la. ???$ Q; s4 o5 g1 I* b5 l/ D# t! p
b. GHSRP
% T. Z5 ~/ l8 A! Jc. MHSRP **: r9 U5 A! j  f( ]  l. B. q& F7 i
d. GLBP$ n" N: s% V' u1 \5 B8 R' _' u" ?
e. ???
/ Y1 }3 r. Y/ l' qf. ???
+ i5 h3 V) d2 W5 g/ LAns: C
6 n* w  U& [% \0 w. [4 p____________________________________________________________
5 E# i5 G. M8 |) ]; S  r" q4 {3 U& D# j$ D25  A question about RSPAN.3 H2 a7 W4 h- L/ n: f( ]# T( i
a. vlan 4029 remote span5 b- M1 T. W' |2 w: h
b. vlan 510 remote span **- e- W. \4 K9 F, I* l1 ]
c. vlan 510 span8 n7 x1 ?- |* T: \: ?: i0 v' U
d. vlan 4029 span
( c2 T7 @2 d. L( `. |Ans: B7 ?( t2 ~0 \3 ~! w1 o2 Z
____________________________________________________________
/ j, |# t0 z3 F+ s5 |8 [# n26. A question about configuring spanning-tree port-priority based on a diagram.1 _! O& B  P# d# X* I) i+ J
a. (config)# spanning-tree port-priority 127! p6 C3 {0 n% k! g
b. (config-if)# spanning-tree port-priority 127 **2 [" N$ |" e6 P$ F1 R' P) }
c. (config)# spanning-tree port-priority 1297 \. s% c9 |2 T' A
d. (config-if)# spanning-tree port-priority 129
" {8 G0 {* ?3 PAns: B
% G- ]8 V5 d7 R8 w9 }____________________________________________________________
8 k/ l) p' R! m0 N$ k  F27 . A question on EtherChannel misconfiguration.+ Q& }' u' A, F1 `  Y
a. PortFast
% C/ [) @# o' P5 G/ I( @b. PAGP3 O1 H' f9 ]5 S% d
c. LACP
/ R# ]0 t& i! w! z0 L8 U# hd. STP **6 D7 ]0 _! Z1 _3 x- v# Z9 ]' \
Ans: D
& ^: Q7 Y: J' g+ L____________________________________________________________
1 z( P5 f9 e  m28. A question on local database for consoling to network devices. (Choose two.)
' l. @/ t5 a# I! |a. Console is a backup authentication method **
) F: n2 Q9 M9 w6 A: @( pb. Console is the only backup authentication method$ @. L/ Y3 _5 [- a8 @; G3 {9 A
c. You can set user privileged levels **- @/ O8 X% v- B6 N* F+ l: {
d. ???
3 j9 x: b7 H. r' VAns: A & C& P$ R! b) B. Y# A
29. Drag and Drop – STP Timers8 j, i! D+ m. T8 O
Hello' ~( W( `: Y# k8 ^! z' L
– 10 seconds8 I8 }. ]9 Y) k7 k
– new BDPU: I$ x7 y5 r+ T- k# q8 ?
Forward! R1 w5 D' H) s, L9 o3 M
– 15 seconds
8 u9 N3 ?7 x% I# E, U' n( `– listening or learning0 l# p9 F+ m% t+ M
Hold
0 |  P: f# r0 Z. K– 20 seconds1 S, P9 A7 x8 h. u$ _: g9 `
– time when BDPU expires  U5 @# p2 j! X2 C) U( R$ @% @
____________________________________________________________7 r8 E* r* ^  A8 M/ M2 c9 U+ J  l5 J
30. Three reasons for err-disable. (Choose three)5 X5 V" ]0 Z2 k( ^' F/ ^/ z( C9 C
a. storm control **
% Y& O; E$ x6 {' @+ Q6 Y' O  mb. security violation **
/ ~) E" O7 F; tc. configuration ports into EtherChannel
3 g* g7 G/ }9 v0 l7 _d. BPDUguard **
8 [. ~& b" }) ~, [# ~& U  K$ Be. ???
; R9 B# j5 C4 u4 Y# k* \! D8 Qf. ???
' C' `$ ?6 u; Z! x- I; I. Y# Z* i2 bAns: A,B,D
" }1 t) S7 k3 O% Y0 N____________________________________________________________
# d5 @6 e6 |7 W( L- f* G+ K" b31. RSPAN what happen after configuration.3 ?3 W6 U1 B! g9 ]/ Y$ s9 {
a. destination port is unusable for normal use **
0 H+ l$ I1 a! b  ^$ C* |8 ^. Wb. traffic in network is doubled. I, y  ^! b- v' p. a3 e
c. ???4 k# Y  K1 u" m& k. f1 Q
d. ???, }6 \6 q! H& U: w9 V/ U) X
Ans: A
* s& h' Z- e* r3 [8 Y____________________________________________________________
/ W0 A0 Z/ a9 R32. A question on local user database for login to network devices. (Choose two.)8 V* @% m: q# |9 Y" I
a. Local user dbs can be main and also backup authentication method **3 B$ ?2 g: ^# S9 y
b. Local user dbs is the only backup authentication method
+ l: }3 }- I& D' Pc. You can set user privileged levels **
: M: E  E$ {' A2 D" p1 u; H- d/ Hd. Local user dbs is used after 3 unsuccessful logins via RADIUS server
; h4 L, L7 q6 T) e( O* P. {  U* {+ ee. ???+ U' u% G0 A: i6 N7 s! b
Ans: A,C5 @' P' q( I0 r4 w# J# _# H
____________________________________________________________4 {& k9 \0 s4 }
33 Which switchport feature will block the packet with unknown MAC address from sending it via port., o4 X4 r$ U( S) W* ?9 W& I
a. switchport protect
' S, _$ T$ [4 j9 B5 ?b. switchport block unicast **1 U  J1 L/ J: F& F+ f7 M
c. switchport portfast
! c+ _6 O. O6 G$ o1 ]d. packet with unknown MAC will be dropped
% w  c/ N8 y6 T0 m0 kAns: B
2 h0 L% x, J- |: P0 j% r9 G0 J4 Q____________________________________________________________
( r2 W  d' g$ T* X7 ]34. What are the two ways to configure loop guard?
; z) x2 G* F' n, w# Ja. (config)# spanning-tree loopguard default **! U4 C/ ]+ @5 G4 |' ]) x- f( e
b. (config-if)# spanning-tree guard loop **
4 L7 D* N# _. t0 o( j) K3 Z0 _1 ic. ???
8 O) h1 S, x; S5 T* M, ud. ???7 l$ i$ k) M/ o7 S
e. ???
) S/ Y# }7 F8 [* D1 c( z6 @Ans: A,B' _+ s& ^+ k8 f- u$ _
____________________________________________________________0 k8 w  h3 F# @3 j" E6 \
35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
6 |9 o0 E' }" B! o  Oa. Intercept **. D. Z, h: P2 d# e0 A5 w; ?
b. Drops **
" _( X% m! ]6 T) O* ^1 Xc. Log **
0 d3 `+ A8 Z% d" T7 M6 E, M  P) Dd. ???
2 Q. J8 Q' F' Z' w, V! @. g2 me. ???8 Q1 W5 b) ?, r* V$ k
Ans: A,B,C
0 o  y( z9 P8 j5 m$ z/ v4 Q2 i7 Y____________________________________________________________
7 Z! x- O, Q8 E" _. R! T& h- K( P36. Question about what are RADIUS server responses. (Choose three)- h, n$ U0 ]. ?- d: v% `, X& r
a. Accept **
; r) F' F( C9 o3 S. b# @2 J4 bb. Reject **
( b  M- f$ _  z- l7 J$ Q5 ]c. Challenge **
4 V7 r# |! j: p- \  Rd. Get Password
% D: N0 o/ n) D( O. Y/ {5 r- he. Cancel" m" h& B- [7 W: X8 K
f. ???
4 T# j3 f, F6 W0 `Ans: A,B,C8 E/ Y7 L* g3 `

$ `# I% l; \# t9 R% g- P  g9 W! }$ l: J/ |2 z1 d3 o& A
( g  R3 c' F9 W2 B* Z9 k
; H! _$ S4 f3 p% P5 {' J3 [$ ^+ p
37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
  v2 `: Q8 {( d' Va. Drop2 C+ T  x; l+ B0 x9 s5 R2 Q; E7 B
b. Remove 82 and forward **: C! j: ?. i+ u  \4 Q; t3 n* W
c. Proxy ARP3 H- y! |! K' s+ l
d. ???6 p9 `2 O' z, ~+ D) O( I
Ans: B
5 h9 k8 ~2 x3 [  H____________________________________________________________) E. G% J, |& U! O* ]9 T
38  Option 82 question with two choices. (Choose two.)1 H' J0 Z+ P+ [3 \' e
a. Layer 2 ingress **
% f; |7 g, E# H" ~# M, _; |! d( F" cb. Layer 3 egress **
: p& d' F8 z$ tc. ???
7 |) c8 L1 I0 K/ x: }2 ed. ???
& H9 D" w6 Z  Y" t6 R3 X% gAns: A,B8 @4 z9 d& a! s1 ~" m2 d8 ?/ L
____________________________________________________________% }! t  ?1 A6 L! z$ b1 v0 E
39 . Drag and Drop – Port Priority/Switch Priority/Path Cost
; B, W. |0 X0 M  y7 F( @6 L' N! c/ f' S. iPort Priority
+ q, M4 \' k) Q9 {- ^" W– By default port priority is 128
+ w- X# b8 e9 h  z– Lower port priority most preferred path to root
4 u! x' [1 I: J4 I. m; Y+ E( ~; M– Value from 0-240  f" E; B/ r$ v& n( s3 r
– Multiple of 16 <—– this was there: T0 [1 ^( I/ p4 N. Z4 D7 Q
Switch Priority
- A4 o* A7 }4 Q( o5 q4 y$ I/ p– Lower priority is better to be root bridge4 j* V; d7 o# \7 ^
– Multiple of 4069 <—– this was there
& G+ c5 k% @) F* e. I, B$ K8 V6 D– Lower bridge priority is root bridge6 A! b* Z3 I& u$ g
Path Cost
! F+ `- D* J( c) J, [6 o– Cost depends of link bandwidth <—– this was there. V. ?$ l/ _# _
– Lower cost value is better <—– this was there but it can be draged to any of them  p  y$ O" |; t9 Z
– If you change the cost on an interface of SW1 then only SW1 will learn the change
9 x+ J: G. [& f1 f– Short range — The range is from 1 to 65536.
4 M4 ]' J/ D* d$ k3 O) A5 [) Y) N– Long range — The range is from 1 to 200,000,000.
) c5 q& z  R' s+ c( Z2 }____________________________________________________________7 N5 p; [: \0 C7 X; l
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)
) c# p" x# s# w, v8 @9 p$ Ha. deletes
& m8 i9 H6 |7 P4 M6 ~+ N5 Rb. logs **
, T$ A$ c) j: |/ K0 z0 y) vc. accepts
0 \$ C- t) W: Y8 A1 Z, n3 {! Vd. intercepts **4 F+ a" M8 I. M4 E0 n6 u  {3 N
e. discards **7 q3 W9 I. D) }, z: h$ M( r
f. bypasses9 ]- y$ m. ?5 \' D1 W
Ans: B,D,E
2 h0 n% W- p1 Q4 X) q# }2 V/ p____________________________________________________________
/ ?, W/ e) `, K* y41 . Which three features can be optimized by using SDM templates? (Choose three.)  b: G8 }8 U( d" [- x2 ]9 {
a. port security, w! S3 f$ y4 ~0 J
b. trunk
6 v% L+ A! A( E$ l" `c. VLAN **! i" {; z9 {( E& c8 R
d. access **0 V4 X/ k: R& g* d1 E8 z
e. DHCP snooping$ V, v1 i0 `* x7 Y( b
f. routing **
$ i% ~. h2 D/ O! D: CAns: C,D,F
% z4 v. A. S2 R% A  E# f* \4 }____________________________________________________________
% ~& f, Q' Z$ h* w; t42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
1 Z$ B: W3 J9 K0 }5 ~  qa. destination-MAC; d2 u0 {' C/ {2 g+ Y
b. dest-source-MAC+ [4 E& L: R. D. H1 L
c. destination-IP) |  G8 D7 v8 J  a3 V
d. source-MAC **$ ~) P  c6 u! e7 u% x, v( e: c4 \
e. source-IP **  R: @" P5 Z; H4 n' V, L
Ans: D,E% }. H4 o# }7 l/ y- G2 U2 O* S
____________________________________________________________. G  P: q4 J) x1 B6 E' E
43  Which command is used to verify trunk native VLANs?
& U: i4 {2 J6 \" h" Ma. show access ports/ M- M0 j& R8 U: s  ]+ h: [
b. show interfaces trunk **/ a6 _( ?( C/ @" V9 J4 @
c. ???
$ m8 X# K8 p$ t  p8 P1 H+ b& zd. ???. ^  r( }( T2 ?
Ans: B0 x2 @% x4 d$ ?+ |
____________________________________________________________
' h+ V# d) W9 f# Q# y8 J& d44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)0 E$ Z4 }5 q; `& t2 I. i. d
a. spanning-tree vlan 10 root primary **
" M$ \% c; @, U# Nb. spanning-tree vlan 10 priority 4096 **
4 O: m( w& ^/ o5 J' Bc. ???
- E9 q/ o( Y+ O6 d6 {4 Hd. ???
3 r6 |/ e+ L3 M$ _e. ???
, e2 m+ h) O: j9 bf. ???1 t9 `& Y1 \3 u
Ans: A,B- W- r: ?- D- t, N! L! k! c+ n
____________________________________________________________
  r% p0 R3 R0 ~1 H2 ~45. Which information does CDP supply from connected devices? (Choose three.)$ ~/ o& \6 ?, V) Y7 e; P
a. Hardware Platform **
/ l- P, Z+ t+ U; f. m8 u! Cb. Interface ID **
, O) O3 E6 F- l8 E3 f* b4 Mc. Hostname **/ t$ ?; R! C$ H" S
d. Config Register: T. U' v7 g! z/ C5 k2 e9 U
Ans: A,B,C
$ q9 X2 X& F3 a____________________________________________________________
$ g5 l. ^6 b1 `4 h! D% f9 U6 t0 t2 e* E5 W0 m; ?6 ]( y' {% J
. p9 Q5 J6 {# s  j$ e
46  Question about voice VLAN.
7 R; R; T6 c$ s. r( [a. Disabled by default **
6 @' c& _  u' A% l; [( i  `9 q# Ub. Enters on untrusted port
+ I% J) Y5 [4 lc. Default CoS value of 5 for untagged….. **) K5 D/ A9 y) ?
d. Needs manual enable of portfast.; R3 L3 n2 }$ I8 F  o' O) J
Ans: A,C
2 k, K5 M& E1 X____________________________________________________________
0 Y$ x$ V" r0 T+ S& `& F6 S47 . Question about UDLD aggressive. (Choose two.)3 h2 a3 a8 q' _% m
a. UDLD messages are sent every 15 seconds. **0 j$ w: z( k) f) ~
b. UDLD tries to reestablish link once before declaring the link down.0 J' a& `. ^7 I4 ^$ o  w
c. When unidirectional fail is detected, port state is determined by spanning tree.
: o0 b8 c& h7 ?9 c# o# c9 Fd. When unidirectional fail is detected, port is turned to errdisable. **$ K1 ]( D; x; U7 V2 x6 ^" i
e. UDLD sends messages four times the message interval by default.$ g/ Y3 f) q; E, L5 V6 s) j" J
f. UDLD automatically … message interval based on configured timers.3 n0 E# l4 Y% E% g: a/ L
Ans: A,D) I1 v1 _8 C3 W' l) U; T
____________________________________________________________' t4 C. u0 d' h% A! n; h
48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.1 G0 N+ `2 F4 H) v7 v
Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)" v& J" W! p$ Q+ x% o+ A$ ^
a. DSW2: change bridge priority to 61440 (highest). **
+ n3 F3 }* \) k: ^4 R0 J8 N3 ib. DSW1: change bridge priority to 4096 (lowest). **$ l  E! ]& b* P  Z2 {
c. DSW1: change port priority but in global configuration mode.
6 Q/ U9 L/ W" o+ v3 r$ I4 b( I# ld. DSW1: change bridge priority but value is 0.
: _5 s! ?# {; [' w" y2 X/ e0 Oe. DSW1: change bridge priority but command is priority root.  O: `1 ?" U1 b$ S7 ~
Ans: A,B
% K2 k# Y9 d3 T____________________________________________________________9 s* O5 Z( ^$ {$ i# ?1 V" `
49 . How to configure dynamic ARP inspection on a VLAN?2 b/ p# t1 B6 B' l; {
a. (config-if)# ip arp inspection vlan& t" {; P+ w" ]4 h" @
b. ???
, N  [! _/ x$ C1 b; I; Z* ]c. ???% Y5 S5 c3 G# X- c) D4 m
d. ???7 I# j7 [7 Y) v9 A; g
Ans: A) ~" p0 Q( e8 j: ?/ z8 s2 f+ u" d
____________________________________________________________
' ?- B5 B+ [- q' R3 D- r; [1 V( N50. Drag and Drop – Port Priorities
  p, P1 v: F6 B- K( zPort Cost
9 U  E6 f- U$ k# Y, ]– 8 default is being the interface value
7 Q, O3 `2 I2 H$ |5 t– range 1 – 200k (200,000)
) T# K: m9 ^/ i# N; `  ?- w# hSwitch Port Priority
) q! d4 u3 @2 C7 |$ O: \+ k4 B– default value is 128
2 w# w) y$ K! R– multiple of 16
& H- N! N, Y) i6 M/ g5 }1 `Switch Priority
+ e8 i* u/ O, j– lower the better5 I0 X% a# g* [7 z$ `( X4 b
– multiple of 4096$ C6 G: D# Q: Q, G" I
游客,如果您要查看本帖隐藏内容请回复
_________________________________________________________
8 ^. ]* m  |: C) @. Q; h96. A question about the priority of a Stackwise switch.$ {/ M" g3 X. z; L
(CONCEPT ONLY)
+ ?  ]1 Z, Y' Z7 E8 }, ^a. Master member is selected based on member’s priority. **
0 F5 @7 T. u, h8 U7 H$ ~1 Ab. ???
/ d2 y2 l* m0 I4 e! m. Wc. ???* c3 m; @; @8 C- @( C/ O
d. ???
/ J- y* s& p. `8 g( ~" Q4 G! gAns: A2 f7 ?  t9 _; x* b$ P. ?
3 {1 L: Y- I0 m
97. What is the benefit of UDLD?6 @' Q+ N- _4 E$ Q; o% d: [# U
a. provides backup for fiber4 C9 T1 i$ Q! c) w1 X  m
b. help in preventing loops **/ ]& u+ W9 A+ _2 w4 x
c. removes loops
0 l  N. Z0 Q6 z* B6 _6 md. determines switch path7 A* t7 v1 F/ X7 X
Ans: B6 W+ H1 ]3 Z9 i$ A6 m  w* q
____________________________________________________________2 l+ C' o* D% I, h- @
98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?
) Y. M% T, C% r) M(There’s an exhibit that shows f0/7 receive BPDU.)# W  ~( f: g1 z+ C/ [* G. o
a. We have to configure shutdown and no shutdown.- n: i* U0 t" f' y4 p' L4 f& |
b. Have to use errdisable recovery.# Z( Y! \6 m( \1 D6 R' X
c. ???
5 B  E; R, N2 e. m- [d. ???
6 u2 L9 w8 P4 m/ U! Z9 d! @9 gAns: A. n# y3 |+ o% ^
拖图题汇总:3 p( p% }7 a2 ~( s) G
1.        CDP / LLDP7 G1 N) b+ C( t! G! @
CDP
! I$ @/ O0 k- e: J" p8 g+ _8 _9 F&#8226;        Default time between protocol frames is 60 seconds5 Q' v2 h" d" A6 x, i( p
&#8226;        Supports IEEE 802.2 and 802.3 encapsulation
/ k# A, N! ~' n) _&#8226;        Uses multicast address 0100.0ccc.cccc: Y" Y, }' s, A. m3 b
LLDP
/ e( |! J4 Q( J, h; a; @& f. h&#8226;        Default time between protocol frames is 30 seconds
3 [' S. O$ D) p0 m; M+ T% A&#8226;        Sends topology change notification' v( h& c) g: K9 j) v6 Z6 H+ Q
&#8226;        Uses multicast address 01-80-C2-00-00-0E
9 b+ E! Q5 H0 X6 m0 e4 z+ j# m- G! Y==========================================================2 ]  {0 \4 Z8 O1 I; V; u. |6 C$ `
2.        BPDU Filter / BPDU Guard / PortFast9 ~. n  ]" T: ?* m( ~! @5 T' k
BPDU Filter, E0 C. W' b/ P+ C  d1 z) h
&#8226;        Disables Spanning Tree on a configured interface. E6 X( ~) m/ [! }. d) e
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames, o  p7 D0 }. ?( G2 h6 O1 R
BPDU Guard  J1 G) V* ^* a+ B2 N
&#8226;        Protects configured interface from receiving unauthorised BPDU frames$ ~" m8 N5 h% j  R( Y
&#8226;        Shuts down port and places it in err-disabled mode
4 D# p) ]* E$ N) l7 ]! j: iPortFast
1 _  f6 {1 T) @. O&#8226;        Configured on access ports with a single host device
6 }% H/ `. e$ F- _& k- Q&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state
  R- I8 ~. n# b==========================================================& v5 ~, s, o- V' N9 e$ ]
3.        MSTP / PVST+ / Rapid-PVST+
/ ~% i2 `( I2 d; }MSTP# {& T) M, A' S# w% u
&#8226;        Based on 802.1S
2 w7 {  P  h2 u: Z1 E0 Z( k/ c&#8226;        Maps VLANs to instances" I  c' X" R- v1 |; ?
PVST+
( p5 ~" P1 ~- I8 b; r; O2 T+ B: E2 \&#8226;        Based on IEEE 802.1D. {3 v! O8 E1 [& p6 u
&#8226;        Default STP mode5 k/ k6 z0 y, m/ u% p
Rapid-PVST+$ {. V' B8 P4 r8 W: Z
&#8226;        Based on IEEE 802.1W
; o2 r$ _1 t8 z&#8226;        Discarding port state
% Q5 X  ?+ \2 @6 X" ^/ L) o' r==========================================================5 K, W9 {- y$ K# l  X# J
4.        Forward / Hello / Hold* a' r! X5 y1 R
Forward
( z* ?1 C0 A! C3 U* n( w2 m&#8226;        15 seconds( j7 I+ I8 d# D0 m
&#8226;        Listening or learning% C. y+ C# ?2 e- C8 s! @
Hello
' A! L/ P5 c# M" r7 Q# e3 Z&#8226;        10 seconds: H" l( m, L( h/ H6 b
&#8226;        New BPDU& k* u  I, ?4 R! Z% p9 |
Hold
7 L/ r" C8 w3 f+ X4 F1 \&#8226;        20 seconds
3 z$ }; [/ s: C, J&#8226;        Time when BPDU expires5 E. A8 k+ Z" _. F4 v
==========================================================  A+ C% I+ u$ d3 U  Z1 F
5.        Port Cost / Switch Port Priority / Switch Priority
( \7 [& S( n* J7 v6 @Port Cost3 k, C* v! Q' ~: W' ^
&#8226;        8 default is being the interface value
) A9 y$ Y. y! y( h5 Z1 g) K&#8226;        Range 1 – 200k (200,000)) Y+ v- T! M  }! q* ?
Switch Port Priority! N; k% ]  m8 T
&#8226;        Default value is 128
  ^- e5 @. Q! G, ]0 _# i( ^&#8226;        Multiple of 16& C& U, S4 p- }/ u
Switch Priority7 ]+ q) |2 a# t, M4 L% U
&#8226;        Lower the better1 x& ]& B% p5 K5 @/ K
&#8226;        Multiple of 4096
2 D! c! x# F$ x+ |+ S==========================================================
2 ^5 x/ F  R" u- \# H' m6.        Guard Loop / Guard Root
0 g; I* O) O5 I, ]  CGuard Loop  W7 p7 \  K3 s2 \# x/ S* r7 F) F
&#8226;        Detecting unidirectional switching links9 Q2 I9 ~8 |  F6 c4 `  a$ C
&#8226;        Port self-recovery5 R: B' e: F# l+ N
Guard Root/ y$ Y$ C0 e1 g) a$ A. l) E# d
&#8226;        A better BPDU disables the port as err-disabled3 i' E- ^6 d. K' W1 m1 V" D
&#8226;        Protect designated port from receiving superior BPDU9 V7 h" M8 a. G& k- ~
8 D" B. D0 ~5 Y& P
5 k( z; i) I& r2 g" `, N' {

4 E8 H8 _* N" e) I
发表于 2017-5-24 12:11:42 | 显示全部楼层
DDDDDDDDDDDDDDDDDDDDD
沙发 2017-5-24 12:11:42 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:50:14 | 显示全部楼层
非常感谢楼主分享新题,准备考试了
6# 2017-5-24 13:50:14 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:54:55 | 显示全部楼层
很好很好很好
7# 2017-5-24 13:54:55 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:55:02 | 显示全部楼层
很好很好很好很好
8# 2017-5-24 13:55:02 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 13:55:11 | 显示全部楼层
很好很好很好
9# 2017-5-24 13:55:11 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:16:04 | 显示全部楼层
居然这么多。
12# 2017-5-24 14:16:04 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:24:52 | 显示全部楼层
之前不是发过一次
14# 2017-5-24 14:24:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-24 14:36:07 | 显示全部楼层
真是好东西啊,正在备考
15# 2017-5-24 14:36:07 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-8 20:14 , Processed in 0.332170 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表