成长值: 64820
|
本帖最后由 小乔 于 2017-6-1 16:44 编辑 & U# j. p& J& H6 D
. E E9 p% I3 T, i
" n2 _' P/ [0 j @6 v, S0 y
1. What is the Ethernet frame size for 802.1Q? I' `7 o/ d# ^. R8 J
a. 64" Z$ |% I3 {& a, J5 [5 W
b. 1287 [3 `: h3 `) m2 w' @! C4 Y
c. 1518
: ?. d) u( R% c xd. 1522 **6 I- x: i4 A$ F0 K7 [9 \" |2 q
Ans: D( L8 a9 t) e4 I4 B [2 T
————————————————————————————————————————————————————————————% E% g& Q) o1 B2 }6 M& \0 j
2. How will the traffic reach the core switch from AS switch to DS core switch?2 w, c) D8 T8 y, t) O8 b% k
(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)0 E3 v9 O1 O/ v: L/ D
a. ASW1 to DWS1 to core
- }$ V' E( a; L e% j, `' jb. ASW1 to DWS2 to core **/ C$ g# a8 M; ~4 v& D
c. ???$ L' E6 Y3 u9 _
d. ???) k' v9 `. @) g- X' E9 g
Ans: B
7 @7 d7 X# ]: P* }————————————————————————————————————————————————————————————
1 [. H( I& j/ p6 P% ^3. If HSRP group number is 45 what would be the MAC address?
% b) M2 F. h" r3 A(Basically conversion of digit to hexadecimal with group of 16.)
/ A* s% I8 t- ^( A/ n- E* N1 l" sa. 00-00-0c-07-ac-2D' {5 u. [# N+ F3 E- r5 L
b. ???6 h* _" k. k+ P0 P, o7 H) b& ?' o
c. ???
]8 I2 d0 C# K0 _d. ???1 b* A1 ?% G" Y; T* v
Ans: A
4 i' Q4 L2 |, S" C+ kExplanation:
! ]0 \2 E9 `, g) n$ d! g; I( j00-00-0c- 07-ac-2D
9 I* f1 v) X! B9 kCISCO_ID :HSRP_ID:GROUP_ID1 q8 G6 `. M3 O, t- [
2d=45
" r0 n3 `2 R6 f' D1 F$ z————————————————————————————————————————————————————————————# K( y- p- e) ?7 J4 A: I% l
4 A question on EtherChannel misconfiguration…….
1 q! ]& e; g5 D" na. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **, d* k) A1 E' ^
b. ???4 f }/ g6 y4 B" y9 s, H, {
c. ???
8 p1 V" B& N9 V+ w5 R$ Id. ???) y3 x" V- S" H' f
Ans: A
9 _$ U# `$ \4 [ O; U: g————————————————————————————————————————————————————————————
* S3 q4 ~) U1 }! {4 a6 p* U& I5. Select a valid VRRP configuration from a list of possible configurations. V+ u# ]0 _" u6 l T
a. vrrp [group-number] ip [ip-address] **
1 K* Y7 r$ p! u% T2 ?) v% Zb. vrrp [group-number] priority [priority] **9 l( ]- s |% W; D3 `8 F) Z, S7 V
c. vrrp [group-number] preempt **
w& \3 }8 Y" s2 ?d. ???+ u( a. C$ ^2 U( A, j! O
e. ???9 w3 y. @. X; _; G3 b D
Ans: A,B,C5 u9 Y! B: j. ` y, ]5 H
Explanation:
4 }: C. V8 U9 G5 b2 w% mYou can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.
1 Y9 @8 b' ^; ~& v" M————————————————————————————————————————————————————————————
0 N3 i5 G* Y" j. T- ` C2 Y6. Private VLANs (PVLANs) have two secondary VLAN types.2 s3 T4 ^* r. i g7 U0 L( J
a. community **
& j# z" ]8 n4 ?7 gb. isolated **
' R9 P* R" R, q9 I- I' Mc. ???
0 Q2 n- s7 X3 q, `- gd. ???
Q7 `/ B' y ^9 T8 q! x5 me. ???; e+ x, C* A; L, g1 Y' }
Ans: A,B
5 v h# g! Q8 X. c: d t, _____________________________________________________________
+ H& |$ x1 s0 H4 N1 o$ f2 z9 x% X8 s7. What types of SDM templates you can use in switch? (Choose three)
" N+ D+ v2 D$ a2 d$ w9 b& wa. Access **
( M3 N( T$ a8 L% @- Pb. Default **3 x; J9 ]6 g V/ k1 Y: C Y% [4 \
c. Routing **
+ I+ m, g4 Q! U, D1 j# ?# C* ^, bd. VLANs **
[5 R9 T: b! z' J% T3 Pe. ???
_- ^+ u% C* S, ?: ^1 y& b+ H9 L% cf. ???
# e4 c% M! P+ a; y- B3 y1 ?' A- R" M+ ^Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam) P5 b w) ^) @+ H4 T, A
Explanation:
, b* R8 C0 n0 }9 w5 y8 X* _( |7 q4 u+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
: a8 j& x& O5 q: Y+ Default – The default template gives balance to all functions." \. n! K" P3 Y
+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.3 p3 N" Q, Y; Y- y# \
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.
& k, [. \2 \! g____________________________________________________________# x. O w& e5 ?, G6 F# N2 R' C9 r
8. EtherChannel – what is the process to configure EtherChannel.# \3 i4 X" X+ l% \: v6 w2 ?
a. shutdown both interface ports **
2 y4 j P2 ~ o* Tb. shutdown the interface on one side only3 w- c0 T& ^. J1 i% B* \. ?
c. ???
$ k2 u. U2 l# X6 C- Q0 |d. ???
$ M3 e+ R8 g' x: \: W MAns: A$ n' `; T8 n& }) E" P
____________________________________________________________. ^& V+ d% \' H) V; r8 q
9. A question about spanning-tree port-priority.4 A, r5 f6 y6 X$ z1 t- b
a. 127 **
6 W: @0 o+ x: a8 K2 w0 C+ c7 @b. 129
1 D! Z% D+ D5 z$ t) V$ e2 Q; Ic. ???
" U5 W, G& b: v7 Hd. ???5 [% B' g5 f4 g+ N( `
Ans: A
) n# H9 h6 O. N. M# n+ \& G____________________________________________________________' @) x' u# M( t& K O2 W
10. Question about EtherChannel based on STP EtherChannel misconfig……0 N6 e Q6 W0 z, d
a. (config)# spanning-tree etherchannel guard misconfig **
" L0 f1 u; B0 j! i5 \1 eb. (config-if)# spanning-tree etherchannel guard misconfig
# g8 `. g4 n% i- x, Zc. ???+ K' S" m p* C" Q; Z! }
d. ???
/ V8 n/ @& {* g$ g, dAns: A* Y4 P2 X4 ^( a
________________________
9 h) [; h2 B2 j% q/ z$ }* H' X
, O" p/ ^2 f5 K( X- [' D
) j. D- Q3 ~# n7 B___________________________________4 Z. W/ X9 V# X# e+ m7 K7 A1 L
11. If HSRP group number is 37, what would be the MAC address?, l" R, t! V( |0 j
a. 00-00-0c-07-ac-25- }9 a( Z1 v3 ^" \& z6 v1 L: i5 V4 c4 E, h
b. ???
, _, P3 `, _0 |9 f( Y9 Jc. ???) x6 r0 i* ~5 W9 H& d9 S
d. ???
& l: o3 o: I4 [+ ]' y/ X3 D' KAns: A+ Q: V( H. ]- m" d# {: @
____________________________________________________________
5 a' ~) m& g1 a# g1 Z7 ?12. What is the default value for spanning-tree port-priority?. e2 U I5 ?# ~8 l) b% G! {
a. 1283 y; h( y8 L/ E5 M9 X K# f
b. ???0 S1 }/ [& A4 B: f' g( E; ?
c. ???
2 ^2 K; _$ T3 v0 `: l' w3 v! [d. ???
+ b3 ^; C7 J& s1 b& K/ R4 J7 yAns: A
' ~% w8 ~0 v' J____________________________________________________________
; P! d s1 a4 i" P13. Which information does CDP supply from connected devices?4 r( O& m) ]/ s& I4 \% A
a. hardware platform, interface ID, hostname
- N8 x1 o! D) Y/ J; cb. ???2 e+ O. O( h. G) V" I3 Y
c. ???% l' ]7 c3 M* ? f
d. ???
9 G9 }) c/ s$ M \& b$ F; W) zAns: A: n8 W# j& C# f% s5 _$ D a
____________________________________________________________. Z' ~4 C) d: V2 f( _8 C- i5 z
14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?; P0 C( ]& C3 O1 T5 z! c) I) A3 x
a. errdisabled
" p& J0 N; [% Y; h$ Sb. shutdown0 f" x* ]# o, E7 E _1 W
c. ???
3 M7 M2 |- N; Y6 _5 {% y, {2 Bd. ???) y9 F- `9 k9 h8 Z
Ans: A
+ ?5 w" @9 z' `% E, r6 Y9 U% ]! ?! j0 I____________________________________________________________' V2 `1 D9 \5 z! c0 A" t5 s
15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?* F& S3 V" m6 O
a. isolated- E" T3 ] f3 J) h; J- `* w% j
b. promiscuous
7 w, b0 f- O. R3 p9 i( gc. ???
( I& S5 c% h/ `! w. Kd. ???
1 a5 _1 m, H- V7 L8 d2 A% S* Y* qAns: B/ p* ?, H* h% J- m& l7 y8 s
____________________________________________________________
" |9 E5 w4 u; X7 n16. A question with an exhibit.
3 @4 w8 F" b7 D4 P+ l1 fThere are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.; h& e3 G& y, ]5 r3 S
a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.* O( G% @6 e" U- b7 m6 d8 [
b. ???, n$ K& o+ l3 S; v
c. ???- a- c2 p; X+ N- t/ \9 F
d. ???' i8 h6 w+ d6 _. D! Y) v. m
Ans: A/ o9 ~! c. V3 C5 H0 g
____________________________________________________________0 O$ o9 h) f3 N) k3 t
17 Which option TPI 802.1Q tag?8 X9 f) V. k0 y* H# C
a. 0x0806
E5 U& W! t! H/ H5 B9 [' e5 gb. 0x888E
; H$ t: G9 k Y6 L: nc. 0x0800$ R' U9 c2 Y6 Q8 N+ _. U
d. 0x8100 **
" \( c; _9 O. ZAns: D3 c5 }. [% a! p) ~0 i
____________________________________________________________
1 x$ y0 F5 ^* @) J' w' j; q# C18. MAC address filter?2 Y: r+ u; v* Y' o2 k0 q- `
a. CPU-destined
( s% B4 ^" H( Xb. router) I; [9 z2 d; x* v q4 U
c. unicast **
! f' {3 v* c( ~, [3 I0 \% U1 J1 [% b0 Hd. multicast5 ]6 O& @2 m3 Q) ]/ t( z' w, M
Ans: C3 ^# r8 P+ {6 m5 T1 Q! A4 F1 J
____________________________________________________________8 Y; ^8 A6 |& {3 B( x6 v1 D
19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)# \% G& V$ I# D0 G- Q8 l
a. trunk port will be immediately' R' f) j, P+ t2 r+ w: u6 r5 j
b. trunk port can be portfast mode
5 X I* S( \) A0 ?" g; Bc. BDPU turn this port to err-disabled **
0 w7 e; O; `. `4 S; ?& ~7 a7 Nd. ???( ]( D# v$ ^+ _9 J
Ans: C8 j4 W* Y8 H* C' }
____________________________________________________________1 w8 s6 M3 ^8 a: P3 c
20. Question about root guard….4 ^) L6 C6 u9 ^
a. Prevent unknown switch be a root port: z- X8 T& b; G ~0 {. X3 J1 \' {
b. Root-inconsistent **& ?% e3 u' K' H
c. ???
, k2 }( L9 V0 U4 n6 Cd. ???
- x# a- j. N- c0 w5 A. w3 W% f3 OAns: B' W9 R- r( e0 i4 q9 h
____________________________________________________________+ d! \! w: F4 M7 [0 z% k2 H. K
21 Question about Loop guard configure……..
$ e5 W. I2 C, w+ Pa. (config)#spanning-tree loop guard default" c3 J$ n8 m9 F" f
b. (config-if)#spanning-tree loop
' I G& i; } O) Z/ _- l% {0 v" r9 ec. (config)#spanning-tree loop-guard default% d& N8 s$ I6 f. j$ a- o
d. (config-if)#spanning-tree guard loop **
- o# d' i: {! k7 H& ne. (config-if)#spanning-tree ??????. R6 \ g: z- I, O2 z% i8 G2 R8 U
Ans: D3 W& v# n& `! h/ f2 i8 [
____________________________________________________________
3 q8 D Q' c) C' J2 t2 W1 |22. VMPS question – a dynamic access port is member of which VLAN by default?2 m3 H* { Q4 L3 Q
a. VLAN 1 is the default VLAN **
9 `$ e7 H( p7 s3 d. m! pb. none until the port VLAN is determined D% W+ h% `/ _: I% H
c. ???
. n9 @8 K+ D4 G0 c& \" {d. ???
$ V1 v5 W, _$ \2 H& d& E" g$ t) VAns: A
0 ?2 q0 ~; P5 W4 ?/ S1 U, f. w, j____________________________________________________________
/ G6 p; q; P+ ~7 k5 S23. Question about the behavior of an access port when a tagged packet is received.; T7 c7 H0 d* k$ T y/ I
a. packet is dropped.
V- r$ Y5 Q7 t2 ~5 C8 u3 O: Db. tag is removed and packet is forwarded on the VLAN of the access port. **7 |9 D' q1 x, A' S
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.* ^; W: i6 z" a Q
d. ???
0 x# x# k" n/ k2 V# z2 rAns: B: k' v4 R' a" h7 e; a# j
____________________________________________________________* ^1 w* y+ _' d
24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?: z. V! }5 N* H4 `$ [% M
a. ???+ [8 L% v" S; r- M# L
b. GHSRP$ L1 i$ N3 \& n4 [
c. MHSRP **: ~2 m/ G* Y: v7 M3 c
d. GLBP1 e) g8 y: g$ i/ v# t
e. ???
) J) n, F! M2 O" n. e3 w: Qf. ???
0 Q2 g4 p4 R. {6 {! Y& aAns: C6 H2 g5 W8 b! |1 t( _7 x# a
____________________________________________________________; o& F" A9 I+ }1 ]
25 A question about RSPAN.
( N' Q- m/ |" o$ C: Z* g9 x' l- }a. vlan 4029 remote span
- [" n/ ~* c7 t3 Ub. vlan 510 remote span **
; x/ g: ]8 e1 w' N: j+ uc. vlan 510 span6 \) C$ m0 u9 g+ E' R/ N" r$ Z
d. vlan 4029 span4 q4 b$ }9 Z" W. c- `4 U
Ans: B
" q$ c$ U( L$ S____________________________________________________________
' H& H8 s5 w( r/ R; s% u' S26. A question about configuring spanning-tree port-priority based on a diagram.
9 C, g& n* Q2 f+ s6 J. ^a. (config)# spanning-tree port-priority 1279 w. F* ~# J: f+ J" N* T
b. (config-if)# spanning-tree port-priority 127 **7 V p+ B4 w9 I# M' B8 W3 ~3 @
c. (config)# spanning-tree port-priority 129" x' A/ {2 P6 x% \
d. (config-if)# spanning-tree port-priority 1299 o: k$ d8 K1 h' a1 ^0 p; k7 W
Ans: B
" E8 x2 _- }3 ]____________________________________________________________0 y' {" y! J+ t8 g) X/ f$ J
27 . A question on EtherChannel misconfiguration.
0 ]/ ~, q! q& a, Xa. PortFast
( t! K9 A7 _1 ^ t* r5 vb. PAGP
! P) G1 N" u4 g, \c. LACP
2 @! p9 v5 q) P. ^. m. w/ o9 g0 z$ Ld. STP **3 U& h# L" \8 h9 X& Q9 c
Ans: D: U# {( J& G9 e/ p& l
____________________________________________________________
9 N3 s: o' x0 `* o28. A question on local database for consoling to network devices. (Choose two.)
% i' f" z2 G+ Oa. Console is a backup authentication method **' D7 ] i0 C7 J; O2 o& W4 F& [
b. Console is the only backup authentication method
1 C: e7 Y+ @* i" s# u- B* ^; V+ ac. You can set user privileged levels **
( q0 Q, Z8 q" J, e+ t ]d. ???9 }( G( G; ?6 ^" v0 K* {0 q
Ans: A & C
2 {- z# `3 F# z' c* t29. Drag and Drop – STP Timers
+ X$ C4 @- Z. v% f5 aHello, k% U8 L1 i* b/ w1 V4 P7 f
– 10 seconds
/ Y8 ~6 q/ M( t+ n' Y6 X– new BDPU# f$ H' C2 a9 P, G' |; w, L
Forward
' `0 P# ]! Y" ?3 E E9 J– 15 seconds
+ @( H6 ^% |8 W* x– listening or learning
P% g5 s/ Y6 ]7 J' z$ Y4 cHold
9 ?2 | X j% z' Z' G7 E. D0 N– 20 seconds
, K: \/ S' e/ t( h) i– time when BDPU expires
; ] F O, D+ Y) c____________________________________________________________
6 t, j% k/ R7 ]- Y8 a' T7 m30. Three reasons for err-disable. (Choose three)
. S6 k/ }# Y: H: a, E, X& h+ va. storm control **
! ~* G2 X ]: C( q# J4 Jb. security violation **
$ \4 _! u2 H( l! ]9 l' R# Kc. configuration ports into EtherChannel
. P- `0 k, Z8 R5 h5 id. BPDUguard **% ~. f5 M+ l) Z
e. ???
7 Y) m% r0 }7 v- H, Hf. ???
1 g% W' _% J# u6 VAns: A,B,D
J; w- F& `1 M* `7 F6 n6 F5 @____________________________________________________________$ ?: A: t9 T5 W1 n" p8 d& ?
31. RSPAN what happen after configuration.
/ y- i/ p0 L/ aa. destination port is unusable for normal use **
. u7 V+ e4 y) C6 X- _$ db. traffic in network is doubled
& j/ {0 `3 d5 ~c. ???
+ s. \# J7 ^5 }% e" ^d. ???
& w' y% r, U; S) ?7 J9 RAns: A
- I! L$ D( W8 e4 c( B3 j0 R/ R____________________________________________________________
/ F) i& `. u# o' A E0 j+ H3 j0 Y32. A question on local user database for login to network devices. (Choose two.)
' F( g! B g( Na. Local user dbs can be main and also backup authentication method **" a& F) g) T/ E* u
b. Local user dbs is the only backup authentication method. T; ^' a6 d0 X! j3 t& H: S( ]
c. You can set user privileged levels **! [& {' g) x) m5 i) |% g: e7 F! F
d. Local user dbs is used after 3 unsuccessful logins via RADIUS server
% y+ M; {, Z2 n% H z8 re. ???
2 j9 O3 c2 G1 U0 A0 V7 u# B5 v; @Ans: A,C
$ @0 o! A0 O6 b# x! N. i' W! k$ s____________________________________________________________
; j R+ d" U+ I5 u33 Which switchport feature will block the packet with unknown MAC address from sending it via port.
/ m+ N, g- b/ ` ya. switchport protect) F% A, C7 J- P# S4 e5 ?
b. switchport block unicast **
) P0 D6 S: @! rc. switchport portfast
! {/ M' o# e3 ~) N1 m8 S! V" x1 _! x# {d. packet with unknown MAC will be dropped. F w4 P; y" b( ?
Ans: B
+ ?" ^# ~- p" C____________________________________________________________
7 s4 f% u2 \! ?8 \' P7 J34. What are the two ways to configure loop guard?
4 i/ P, C7 V* K; ^7 L5 Sa. (config)# spanning-tree loopguard default **) T) s& T; L4 f% M5 Z) p
b. (config-if)# spanning-tree guard loop **
- {8 @6 F5 D9 ac. ???) m8 R# N+ L. ~! U* k9 N
d. ???, h) e" `1 a/ c; N
e. ???+ e+ q, |4 d' g" k& J7 E) L
Ans: A,B
3 G0 q, H J4 M. T5 R& E. V____________________________________________________________& q2 p4 }: X6 \9 X3 l! y
35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
W9 r/ R7 T/ c2 @+ T! oa. Intercept **3 H I' I; R: O7 i
b. Drops **: Y& ]3 N- j1 ?$ x; U' N( ]: t
c. Log **: C5 |+ |0 Y: N7 ?* q
d. ???
0 y% v: h' N! u- q6 C' Xe. ???' r z8 n- { R' U# e7 }
Ans: A,B,C) R* N1 n$ `3 m7 b1 K
____________________________________________________________8 U+ Y- G* `! Z( N1 g- x; |
36. Question about what are RADIUS server responses. (Choose three)
# j2 Z% k4 d( W5 Y za. Accept **
j3 N* h' f- j& @! m( Cb. Reject **# W0 H4 [) S8 v3 a/ z( G' r
c. Challenge **& Z. u$ l; A$ R
d. Get Password4 `4 S% }. w/ s
e. Cancel w. H' Y: s r
f. ???+ C: K; i4 z7 a6 a0 [, e3 V! t
Ans: A,B,C/ J0 j; q4 y3 ^. ]" h7 {1 D4 l
5 q5 @2 ^! Y& o0 b! q, X( v
; P; P. u* |: U. y% e6 F$ H: j5 e# [& H: G& G2 Z: I. \. S6 [
% p; G9 G9 ]6 v3 g9 o
37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
, g& _4 K. T, B9 T! Wa. Drop# \+ w" p1 `0 E( [, Q. }6 m8 a+ @; P
b. Remove 82 and forward **
5 Z" s9 \" Y, Hc. Proxy ARP
2 n" |8 p! T* Q0 o/ a% Td. ???8 {* E0 V6 B+ H8 \; E
Ans: B
* W, @4 |% l3 {3 n( @____________________________________________________________
8 G0 u& L. n9 Y+ ^9 {/ g38 Option 82 question with two choices. (Choose two.)
}( _5 F7 z% r: c8 xa. Layer 2 ingress **
1 I l5 f3 j9 C% @2 L( a0 t$ ], y+ E0 Vb. Layer 3 egress **
1 L8 c- m) v5 R: V: }7 l$ ]c. ???
" i( p$ Q% o- P! A! G& \* [' \d. ???7 U! K u2 X4 Q
Ans: A,B
# x( `, s) ~% X' b1 i4 x2 ~; U____________________________________________________________/ j! y8 v8 h* k
39 . Drag and Drop – Port Priority/Switch Priority/Path Cost1 X" s5 W- ]) |' B! Z+ m
Port Priority0 A6 z& O8 a, P* {( m0 ^, B
– By default port priority is 1282 y' X# H% I+ F1 W4 E; a
– Lower port priority most preferred path to root$ G1 s6 m; a: K2 Z( B0 J
– Value from 0-240
2 H! Z, I9 l3 `4 y+ l, c9 B. N e– Multiple of 16 <—– this was there
* N; X. ?( f2 m" u- fSwitch Priority
' a6 l! q% r. w& ]1 g- k– Lower priority is better to be root bridge( L6 V" |' }6 \+ E6 M2 x
– Multiple of 4069 <—– this was there
, f _, ~( Z% i+ d) t1 f2 {– Lower bridge priority is root bridge4 k/ h; t% c( @
Path Cost* O& {' Y! [: b+ Z7 w: c; f Y
– Cost depends of link bandwidth <—– this was there
+ B' [1 A- u6 }5 D– Lower cost value is better <—– this was there but it can be draged to any of them
8 ~. V3 F/ r" V3 Q– If you change the cost on an interface of SW1 then only SW1 will learn the change% A1 b) s) f/ I& q
– Short range — The range is from 1 to 65536." v: i5 N# E) Z0 f. x5 s1 ?
– Long range — The range is from 1 to 200,000,000." a* q5 G8 S3 D5 V5 A7 o: A" j! x
____________________________________________________________- D, |' ]+ G! n. Z5 z/ f
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)' ]- l' y7 R9 D' i
a. deletes
& c( ?, E3 R; x, N* s: q. @b. logs **
0 E0 e5 s/ M' u, z5 n. ?c. accepts( ~* o' p% ?. q' g0 e; d [
d. intercepts **4 w2 L* @ G0 H/ l9 H
e. discards **1 _- ?- b& ]: o6 w4 s' N$ U& b' p/ x+ M
f. bypasses
& d1 ]+ ?4 _3 F8 |' QAns: B,D,E, M" f9 a9 r* j- @# o# u
____________________________________________________________
8 o: Z/ s) w3 z. W5 v( V) S41 . Which three features can be optimized by using SDM templates? (Choose three.) h: h! |/ R; J0 N" K
a. port security2 n, B- S5 V4 V9 j4 s# q1 p
b. trunk
+ }4 B5 P& |1 O2 c% ]( s( j! Ic. VLAN **
8 L1 y% ?6 y1 H [d. access **
: ]# ^$ y' ^8 R7 o" ^e. DHCP snooping! {6 h1 L3 t* Y8 k
f. routing **
* X* ^4 S) i7 c# j; u% l- `' b7 eAns: C,D,F
3 i9 Z4 \7 U' S1 E____________________________________________________________
8 Z2 W9 R- \" x4 U8 `42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
5 P, u; ?3 h o* ca. destination-MAC
+ J0 y: a: y8 @) rb. dest-source-MAC! m% I: O* E( W: o" {$ K+ C" H# j- l
c. destination-IP; p, T, v9 M( j( }+ R5 H: r
d. source-MAC **7 I2 D' z8 x# N* E
e. source-IP **7 B% V; F& L L- H- U9 a
Ans: D,E
( y b6 Z$ e( J+ k- n6 D2 c" h____________________________________________________________8 ~$ Z$ n6 d3 ^
43 Which command is used to verify trunk native VLANs?: u3 j# C j; L& F" \) ]
a. show access ports! p- f& Z5 G0 P
b. show interfaces trunk **% }. b: m, k; q$ ^0 n
c. ???
8 l$ q6 o$ g5 D( M- ~" J# |' g9 od. ???* q' q% C0 g X/ N5 E$ X; `0 |$ s
Ans: B: E* C. i* w# o9 {8 b* ? S5 H, b4 K
____________________________________________________________) j, `+ L: k. h; T9 w
44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)- M) y X9 K3 ~% C
a. spanning-tree vlan 10 root primary **
4 v* H) U2 s' v3 e* z D1 X3 db. spanning-tree vlan 10 priority 4096 **
x* S/ _1 m8 P6 dc. ???
+ T( u1 q0 a" [. fd. ???1 K( ?( m0 Q7 j* r$ S* j
e. ???9 m7 I. P5 E6 G! z7 M( G5 F) C
f. ???
! H2 g2 s: m- |( i( h( W" d" v) cAns: A,B
4 ?2 w2 C& d; }' k$ O; ?5 N____________________________________________________________
# Q1 f5 Z6 |; ~; v) V; w45. Which information does CDP supply from connected devices? (Choose three.)! S; @1 G! S, l; F$ T* @1 h' g
a. Hardware Platform **2 j. l" T7 |& {3 G
b. Interface ID **
4 z5 y+ D6 `( V2 c4 ]c. Hostname **
2 M/ Z3 ^3 {) V1 ], _( Md. Config Register
+ K$ w( Y% D* k4 _# kAns: A,B,C
1 B+ b! U1 z& h) {____________________________________________________________
& M6 r, N: Y7 d( c2 I( Q$ ^- m# s9 H2 ~
) [/ t# _! r) u# v' G46 Question about voice VLAN.
0 J& Q" q6 g5 E, `5 N, wa. Disabled by default **$ T) L5 K! @ Z# j
b. Enters on untrusted port8 X6 P6 `+ u# l4 K. p, L: j
c. Default CoS value of 5 for untagged….. **
' Z. @( v: j* d6 X: Cd. Needs manual enable of portfast.1 S2 K5 y" R1 t: q! T
Ans: A,C& s1 e: J! d5 @2 |3 P: n- s
____________________________________________________________
- A' u2 f# T# \ J0 O8 z+ u: s47 . Question about UDLD aggressive. (Choose two.)+ `; l, g2 e: v: Z5 l" Z
a. UDLD messages are sent every 15 seconds. **
0 G# K/ d4 G3 T: B! j# Tb. UDLD tries to reestablish link once before declaring the link down.1 k1 M( J- t6 m# ~: k
c. When unidirectional fail is detected, port state is determined by spanning tree.
# a- N! h7 b4 D4 {$ q) w4 f2 |. I4 wd. When unidirectional fail is detected, port is turned to errdisable. **" y( O9 c4 Q8 A) N
e. UDLD sends messages four times the message interval by default.8 @1 l7 P- r* C: l ?, H- ]- L% i
f. UDLD automatically … message interval based on configured timers.
/ X( r% X0 i- h0 r3 sAns: A,D
) E$ M4 P3 H. S: c% a____________________________________________________________9 ] i+ H" `0 p# k& S1 {* z4 B' y
48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.
# c- r9 x8 \! {Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)5 k3 h& m# `. k& ?0 a' g+ V6 c( Y
a. DSW2: change bridge priority to 61440 (highest). **
- {# c8 ^/ S0 t5 T3 i1 D8 Fb. DSW1: change bridge priority to 4096 (lowest). **3 |4 ~# W6 ?6 y! M
c. DSW1: change port priority but in global configuration mode.
0 u+ H/ r" W% Sd. DSW1: change bridge priority but value is 0.
2 n. L" a. d6 te. DSW1: change bridge priority but command is priority root.8 i& _( \' G5 Z/ U5 n: S9 C
Ans: A,B: G$ v7 ~2 {, B# A( b7 w O3 S
____________________________________________________________
0 _1 b% r b$ M49 . How to configure dynamic ARP inspection on a VLAN?
" K/ G, n+ e* t! D+ Fa. (config-if)# ip arp inspection vlan
) a @+ i, k4 s' xb. ???
3 _ Q/ a# C7 o* ^9 b% Dc. ???
g1 X2 v& E: Hd. ???: \9 Y) Q5 Z$ e u
Ans: A( O4 J8 r0 x, w0 J2 I1 q: O3 f4 S' ~% k
____________________________________________________________+ h! U+ T0 r' g0 u) ?0 {2 t. x3 f U
50. Drag and Drop – Port Priorities8 Y( ~% W; @( K [3 Y2 P( n
Port Cost
) g2 S) ?1 G& d– 8 default is being the interface value
$ V$ U# T2 e! X& y& W– range 1 – 200k (200,000)5 K, a; h# Y Z9 c. F
Switch Port Priority
* w1 h7 l; |" `1 a6 |– default value is 128" p8 Z% j7 }4 E% V* H
– multiple of 16
, _$ f) ?% _. ^7 e' \Switch Priority
5 e0 L3 q- B' E8 J. c– lower the better
z6 \5 I" f& O9 r* v# _! Y, N– multiple of 4096" H) E, h( J3 n; @5 j F
_________________________________________________________
4 ~8 Q* J# v0 \96. A question about the priority of a Stackwise switch.. m* C5 @# t1 o" p
(CONCEPT ONLY)
$ c0 ~* o" F4 ^: j- ra. Master member is selected based on member’s priority. **
' u+ _! A, |8 qb. ???
+ `& ^) r" K% \+ { X7 ?0 Uc. ???
3 W3 [) M4 a5 U3 ] F4 [d. ???& g8 L! o8 b* \' k0 _. E
Ans: A
( f3 I+ x! @) f0 I$ E# P9 [( p3 b/ `5 ?* b5 l C$ u0 r
97. What is the benefit of UDLD?% p1 w/ e1 w( a' z1 O
a. provides backup for fiber6 F. h8 D1 \& }2 L9 P
b. help in preventing loops **
- u- O5 Q/ v; { n1 wc. removes loops
& ~' l6 D0 m7 M! w" N3 d0 jd. determines switch path
6 g( \6 ]: A- P. l4 z P( {Ans: B
4 b2 e/ [2 M; [2 f, j4 e# B____________________________________________________________2 e& B- r4 Q& @" P
98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?* ?; T1 l A+ N4 i4 E
(There’s an exhibit that shows f0/7 receive BPDU.)- m* m+ Q2 u2 T- [! L
a. We have to configure shutdown and no shutdown.
+ b& e1 }' A- Q9 {" o. H6 d5 Lb. Have to use errdisable recovery.1 V7 R% p. A% H5 n6 \
c. ???
" @1 c* R+ t( j1 F8 Y4 x& _0 Fd. ???
* Y3 j% r5 s( i2 f: s# _& ZAns: A5 O1 T4 L% Z! F" V* e
拖图题汇总:
4 Q9 k+ U7 u7 {1. CDP / LLDP
4 u% w; o+ n) T qCDP
( P$ W$ G- q1 k- i7 H• Default time between protocol frames is 60 seconds5 [4 L3 u% L( \/ Y8 O
• Supports IEEE 802.2 and 802.3 encapsulation% @/ A! U* c! C$ u( y8 v/ E: H
• Uses multicast address 0100.0ccc.cccc
" }# x# o5 V2 |; g. T8 R# a2 QLLDP( v. I+ Y' d+ W+ X+ E
• Default time between protocol frames is 30 seconds
$ e a4 |! G' W• Sends topology change notification
; ^( v' v' g- C* [$ V• Uses multicast address 01-80-C2-00-00-0E
' |5 ?* W( [9 @, D1 j7 g9 ?==========================================================
" Q. a( _" u3 r3 O( w" N$ r' C2. BPDU Filter / BPDU Guard / PortFast
3 U' y4 P3 E! f+ `% p; ?2 F3 h2 dBPDU Filter/ d6 `4 e# |" t% w- M7 I: {) C
• Disables Spanning Tree on a configured interface5 j8 D. i5 v8 I. E% s/ p
• Protects configured interfaces from sending and receiving unauthorised BPDU frames {) ?; d8 N, q/ S, _
BPDU Guard
0 Q, ]% H2 n2 _; t• Protects configured interface from receiving unauthorised BPDU frames# o, E5 s/ G- b# }3 Q
• Shuts down port and places it in err-disabled mode
2 U7 t y: u" hPortFast
' n$ V5 Y+ }2 [2 {: t( H• Configured on access ports with a single host device
9 D- e1 k6 r% t U• Configured trunk interface goes immediately to forwarding state from blocking state
' J* Q" T9 S0 ]7 J2 M% ?==========================================================
r; `* @8 j+ ?3. MSTP / PVST+ / Rapid-PVST+* s5 b9 _) n7 r( R' {9 \ @
MSTP
5 U5 f1 u6 X+ j! q/ M2 E- G• Based on 802.1S2 F$ s1 W) |8 J% K
• Maps VLANs to instances. g0 _3 \1 O3 j6 r- D" r
PVST+
% W" k3 L/ M8 a S$ e• Based on IEEE 802.1D
3 V% Y7 ^% ^" Y• Default STP mode
) o8 l" }. L8 X+ g& m: tRapid-PVST+
! X- M2 ?# e- I0 n5 [# L$ l• Based on IEEE 802.1W+ S" f4 a3 l6 X8 m# ]' F" f Y
• Discarding port state
1 |! i! p/ b( m==========================================================
( v; S2 l* V$ o$ m: ?, I4. Forward / Hello / Hold
. ]( v' p/ I- ]2 XForward
, x7 D, c3 S8 H• 15 seconds
1 b! }# r2 Z1 e ^( j+ ?1 M• Listening or learning& G5 C7 a3 k* ~2 }: G
Hello
' [' I7 p7 F; M* t0 P. N+ F• 10 seconds
% q1 P0 _( X$ P• New BPDU
+ L+ z1 e, ]& j. a6 MHold5 F. q- ~' p2 x( l1 o" R3 h5 s- ?
• 20 seconds5 r+ e0 I6 N5 K& s/ f) W: f
• Time when BPDU expires6 f3 w0 V: k& ~, a$ ]$ x
==========================================================
8 h, V: A: r/ D% ^2 s5. Port Cost / Switch Port Priority / Switch Priority
( R" s, c+ J5 d+ ]/ P0 ]1 n ?. ?Port Cost+ r& k. Y4 z( w% U+ ^( w) j* U( s
• 8 default is being the interface value
/ t# h0 E- ^- [) m- E4 z• Range 1 – 200k (200,000)
( J* n9 K* |" i. `9 ASwitch Port Priority! I0 Z; E* U q3 g( i' d; I) P
• Default value is 128
2 B/ V. \- s/ Q2 j• Multiple of 16
) M! p* o2 O# B- k1 E$ J! pSwitch Priority% T& `! m! [5 F
• Lower the better9 S' T2 C; g! @8 @2 q' \, i
• Multiple of 4096
) K# J5 k, [8 J3 a- d0 q==========================================================
7 v, n4 v& m& I1 ^8 F3 ~# D! F0 s6. Guard Loop / Guard Root
" C4 i$ g6 |2 ^Guard Loop* _& ~1 ?9 \$ ?: ~7 X3 E# m/ h
• Detecting unidirectional switching links' O$ \1 U* Y( n z$ H
• Port self-recovery
0 m7 V. p% b# \8 dGuard Root( m7 x. D# `2 f; Y! C" u
• A better BPDU disables the port as err-disabled' W0 @; N) B0 |! {) F4 u- G5 z& V
• Protect designated port from receiving superior BPDU
. ~9 H" {" c2 U3 F
( C' x; T# V0 Q* w' g% p7 A. h% g
3 x+ R5 _* R7 d6 e7 g) x
8 W" O; g% _ k* {; s1 W. ^ |
|