设为首页收藏本站language 语言切换
楼主: 小乔
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(5月24日更新)

  [复制链接]
发表于 2017-6-1 13:47:26 | 显示全部楼层
非常感谢楼主分享
106# 2017-6-1 13:47:26 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-1 15:43:48 | 显示全部楼层
11111111111111111111111111
107# 2017-6-1 15:43:48 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-2 09:01:52 | 显示全部楼层
% S/ V! _" ?% l1 D
非常感谢楼主分享新题,
111# 2017-6-2 09:01:52 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:37:04 | 显示全部楼层
謝謝 對我很有幫助
114# 2017-6-2 17:37:04 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:38:17 | 显示全部楼层
6666666666
115# 2017-6-2 17:38:17 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-2 20:15:00 | 显示全部楼层
推推推推推
116# 2017-6-2 20:15:00 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-2 21:11:27 | 显示全部楼层
1. What is the Ethernet frame size for 802.1Q?
! t" [5 A) k) b; J4 o0 W0 Za. 64
+ S2 E0 h/ T' Y8 V0 z+ P4 _4 N2 Ib. 128% r. {" o- L4 B
+ w8 l/ G. x& N; N( d/ ~4 Gc. 1518, T4 V, S" B5 m' v  d( v& ]# X! I
3 O- A& v/ H# v3 t, Hd. 1522 **3 A/ H) |7 p+ I: Z/ [0 F6 I6 I
! h" v5 n5 C- k0 I& `Ans: D! T: v- a' K/ D" ~, R7 C0 C- h/ r0 X5 P4 _( c% d/ f* H
————————————————————————————————————————————————————————————% x2 D3 i1 {% M% D6 H" c/ T' G  o( N1 G. i; `
2. How will the traffic reach the core switch from AS switch to DS core switch?
1 X0 ~4 N+ H9 \7 |7 U(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)
& n2 E/ [) x, c( B+ w. Qa. ASW1 to DWS1 to core" |& U& h: U( s" P  P
; T+ ^- {, S8 \1 C7 rb. ASW1 to DWS2 to core **: d1 a9 k8 X/ U- ]
c. ???2 G+ Q3 A+ J. E. z0 L% W
d. ???9 G( v6 J/ w1 B0 w) |- c* H9 b
5 S" H, B( |0 J# ^Ans: B/ R4 c9 R% ]- a7 D* {
————————————————————————————————————————————————————————————# q& M0 M% [6 K$ k9 p7 m- V- h+ x  j0 ?0 `+ j7 y4 g/ Z
3. If HSRP group number is 45 what would be the MAC address?0 J% A( X! [- v1 Q4 T
(Basically conversion of digit to hexadecimal with group of 16.)$ v; K& ~0 X4 A6 C5 V$ R
a. 00-00-0c-07-ac-2D/ c3 c' O+ L! K9 s. Z3 P
b. ???1 T* s( |# m1 X! P! I/ ]
c. ???7 j" n; L6 `4 ~0 _, k
+ A' r" M& V$ h7 Od. ???1 T, R% o" e9 f1 h2 }
' z6 f$ ]7 N$ [7 x. gAns: A2 M+ A' l5 F% O3 M
- k( J6 I7 N* h* ~- U' f2 _! o) A$ qExplanation:4 e1 T% S) S* j" c  i4 M: u$ x5 X. D6 U- W2 ?5 a" \
00-00-0c- 07-ac-2D1 E+ L' Q% e6 O1 f) B! `; ?2 A% n) E3 i
CISCO_ID :HSRP_ID:GROUP_ID1 m$ O1 w! X3 p% q$ D* a* @
2d=45$ A4 z2 {. c9 c' F
————————————————————————————————————————————————————————————
" D% n; s0 U- n* b3 I4 A question on EtherChannel misconfiguration…….3 y: }) c# ?  @3 A
! W& U9 x: S- S3 aa. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **2 z) T. T" T: g& w' ~1 K
b. ???/ J9 {" l+ U5 L2 W; r
3 j" [7 g1 }1 w5 ]; s) _* ~c. ???
* Q- H" `2 u5 j7 {6 `$ D" e! ud. ???  \$ [: F8 o5 S' z$ x
Ans: A7 o$ P, J3 n; W  V; j1 I7 r
: L8 L/ f& k$ ?2 v————————————————————————————————————————————————————————————$ I# ]: M* W  {3 Z1 m3 g3 L
5. Select a valid VRRP configuration from a list of possible configurations.. r$ h! ~; u9 W) _. f7 @0 G1 E* B
5 J9 }& t2 m$ w" l$ `a. vrrp [group-number] ip [ip-address] **0 M$ N: h2 K  v  ]' j; Y6 X7 o7 f4 c3 `
b. vrrp [group-number] priority [priority] **
" N. ?" ?- y1 q" P! X- H8 `  gc. vrrp [group-number] preempt **
9 c5 o% t. z0 l1 x7 cd. ???7 K  ~( |- S' W3 [* F
" n' p) S, {) {! U: k! P; ^e. ???
( K& q: H$ X$ o; ?1 w8 D+ N  }Ans: A,B,C7 f: f5 n" \5 G/ H$ ^/ L
Explanation:
, `: K0 d8 A/ O. I- H6 YYou can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones., I& j  ~+ W1 j9 p* H- {  L$ ~! L3 F/ R( Z
————————————————————————————————————————————————————————————6 E4 y, s. ?& A2 Z0 I
6. Private VLANs (PVLANs) have two secondary VLAN types.
( ]' ^) o/ q2 p; _8 da. community **4 o& E) F5 c% M" ^/ p/ ^
, P, g: ]6 C2 J5 T$ F+ ub. isolated **
  ^/ J; ^5 d2 tc. ???% }! K1 `* y$ b3 W2 D' e0 Z4 L
d. ???7 B& p; H% k7 \* D% e# v4 k
e. ???) Q4 a6 Z* W% H. N/ b9 }
/ u1 _9 z7 b0 v  s" ZAns: A,B
4 P$ r+ ?9 v2 f% m. M9 V* a____________________________________________________________
6 k7 M) _3 C$ E7. What types of SDM templates you can use in switch? (Choose three)) g% d1 H  o+ H5 B
0 y6 U, ~; L0 [3 O( z  qa. Access **- @3 r* E7 L, g8 G* c
: [/ [+ c" ^, y# ]b. Default **0 z  i  r8 ?9 |! b6 X* t" F
; y8 \6 b  f# G7 r, T4 wc. Routing **# e5 r3 K  X7 v9 _
- p0 L! L) ^; A& j1 ?d. VLANs **  G0 W' C- q7 v. `
e. ???8 c3 N# u9 m) ^7 _$ \9 |) }! @6 E) }- i( i& y: g# z
f. ???* P( [; c& n% @- d" d
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)4 \& I- [- Q; z! @& S) [
Explanation:6 a& J( `( K/ w+ Z3 @+ v) h) d# y' |/ F/ t: O' L3 _
+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.7 |# X; m  a+ ]3 I& J. l* |, z' \! T( r5 z5 }8 T
+ Default – The default template gives balance to all functions.8 y! e' A8 [9 _# f: k" g
9 y0 R# @0 o4 T3 K4 N: z+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network., W' {' ]0 N0 O- k6 d- B$ _9 d* J# c+ `4 [9 E5 b7 Q
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.! w, }. u" b0 |& V+ k5 u$ \$ }' U1 f, d: j- ?' t: d+ c5 d2 y
____________________________________________________________3 x7 A) [- m6 s7 d1 X+ o
8. EtherChannel – what is the process to configure EtherChannel.. T" }/ Q) E: T) w
1 ]+ U3 N4 \, N& N, aa. shutdown both interface ports **1 Y* g7 w! U( X; ?# F1 [1 v
b. shutdown the interface on one side only0 `% p# b7 O- T# \
  T0 v. ^  P$ F1 f) l8 r, uc. ???; G* s, C3 C2 n/ i$ A, e: p- D
d. ???5 f: Q, k9 }" l
2 T6 c4 \0 X) y! m$ t# R9 ?/ H9 nAns: A; e. [1 T. y& d; y/ Y; B: U" |# D! N( U% b" A1 |
____________________________________________________________) o$ y9 O/ y2 j& M( z; u) A
/ t: y" g! `; K  d$ [9. A question about spanning-tree port-priority.: k, a- u. G- C/ h1 c- y2 e+ h
, @# G& Z0 R) q3 ja. 127 **# Q" ]9 p# w  R# }, |, E( Q% e8 h
b. 129$ b; m+ x( ]- N4 n  w8 M' a9 V( D# c0 C
c. ???4 P3 E- q0 T, H8 }" I7 u
& I# W3 X9 j* n+ V+ g9 sd. ???1 A- q' b, j- w3 ], U4 i' K+ `
8 j; q: T- |: Y8 {7 Z0 H% yAns: A; ]8 }0 a. I1 M2 N
____________________________________________________________2 l8 m1 S3 w* f  c1 r
10. Question about EtherChannel based on STP EtherChannel misconfig……: F& F; @; r$ E8 r3 @  Z
7 p$ ?; L  U: \& @* e( I. ~1 t: Ka. (config)# spanning-tree etherchannel guard misconfig **
( T; {) S' Y4 X- xb. (config-if)# spanning-tree etherchannel guard misconfig% D5 x! V" `4 s6 ]9 N+ x: ^) b8 }: f' g
c. ???5 `3 ^* U8 u0 R4 I- f
d. ???- u0 P& H$ o- g
; u  R7 }7 {3 s* t% m  Z; `Ans: A
9 J# ~% @! ^2 `! W________________________' `- F1 ^* j: `5 {9 b) c  }1 P  h3 O

+ W+ ~( J, W/ {6 _8 c' O/ N  @  p, ^7 s& e, H7 F
___________________________________
/ C  h$ B3 X8 X4 I$ c+ V11. If HSRP group number is 37, what would be the MAC address?: z0 a  C; U% x  {! O2 V4 Q, U$ h5 W; J7 `2 q  P; @+ w
a. 00-00-0c-07-ac-25: ^0 S; X; [5 q  w6 E
+ ?8 i4 d) w! c$ M& p) @( Qb. ???" y; E# m" n% T7 I, C& K3 ]
- A+ }* Y$ b" g( v7 hc. ???' u! o- C' J7 o2 p  K: }- r
9 F9 D7 D7 N9 U  i5 d: \2 qd. ???
3 i( ]4 h4 @8 jAns: A! ~* k3 k8 O) V& l, K6 p: A7 t4 _* A% W
____________________________________________________________
" x$ `/ _- A0 C12. What is the default value for spanning-tree port-priority?) L0 U' f2 {, _2 a6 v7 i7 a/ P- t; L% E3 D! t9 X& V) P) C5 k3 `3 D
a. 128( s. O+ U* S$ [/ t4 G$ Q1 H$ W+ S5 Z9 v- S: w
b. ???$ b' t  Q2 V' B  D6 T9 }/ @0 u0 t3 _' k( j* w: B5 Z
c. ???; D9 O1 y) r1 F% a! D) U; U  u5 O# G9 Y0 C: C/ r8 i
d. ???) M7 j0 p8 P/ B# p& `5 T" q, C1 w) V. \* x% O
Ans: A; w/ G+ a2 J, B4 T! a' E3 b3 K1 o( U2 G8 s4 s
____________________________________________________________! m$ u6 w3 F- l/ p& i
$ f$ W$ C4 Q. n" V9 `7 R' |13. Which information does CDP supply from connected devices?: J" j7 r: x" O+ x# |" v8 r, x
a. hardware platform, interface ID, hostname
/ }- R3 G' M2 M, V* ob. ???
& y' X9 z9 l' N9 ~, Sc. ???: P( @- s$ b  N+ e* @6 T- K5 ?, O( a9 r6 O3 d2 R( W
d. ???
1 ^' ]% ?  m! l1 R/ o' _) C6 }) T+ aAns: A
1 L; N+ B: u1 P' A! t: c# r: ~& @; [____________________________________________________________2 e+ q9 u- E2 M/ s8 `
14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?, j: s# a8 L$ K! `2 L! r  C9 C
! L( E2 q) T' L- g8 V* ya. errdisabled: j. I+ _0 k* I; p
b. shutdown$ ?4 W3 ?, |( H' j- b4 O6 L" E7 R& Y6 T) l
c. ???5 \, q4 E( a* {5 c$ D" e; |5 _  A6 w$ y+ c( n
d. ???
# \" D2 m6 J; R+ `1 s6 uAns: A# Q4 _9 B) G9 H0 ^' w# F1 V4 H( ?/ |' l9 _: o, f" t: d  L- r! _
____________________________________________________________& }6 c# A- _9 E0 z' x- Z
  U" ?1 b. u$ t4 N; c2 U; k# _15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?
4 Y/ M5 ]1 q! z+ Sa. isolated6 T; N- b, u: K+ y! ?: T4 C2 A
* y/ q9 y+ }8 @b. promiscuous+ S6 K0 D* o+ D: a& u$ j+ d2 |
c. ???
; s1 k! ]( P2 L8 Z! K& G( b" }9 I# cd. ???- j. L- C% f; R1 ?. O) i+ W/ W$ U" U1 H; X, P5 E( \; N4 n; I7 I+ Q
Ans: B  F! n$ i4 Y4 Y' ~) I/ b
____________________________________________________________# J8 I* b$ ^2 `5 D& p6 W: \2 Z7 Z& q- M# ^
16. A question with an exhibit./ k8 m5 y3 |3 y0 S; ?' R$ D7 g3 x- d
There are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.
- B1 M& ]1 |2 C# d& k' v' wa. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.
7 j7 ?9 c1 _. H- Y) W% Jb. ???$ @( r! z; t' D( T1 P3 U
; N* F2 X! L9 jc. ???# U/ |0 z6 o% A# F8 [  p, \2 o+ z; u5 S! ~
d. ???, Q( C, t) E8 v" L5 s
# D: t- F6 Y* i( L2 Z; B, ~Ans: A* Z5 e, E5 ?  p2 ^! U! I5 x
, A1 B) F% L4 z5 p6 H____________________________________________________________$ n6 r$ |: O' `: s* _
; D- y  ]2 A1 f/ S# b2 r9 v. j17  Which option TPI 802.1Q tag?
9 x1 Z* p$ R# I& _( j- f$ `a. 0x0806
8 A1 t$ Q$ W0 Y) _$ }b. 0x888E
2 ~) P, R  o2 ?) g/ b" x! sc. 0x08009 n9 N/ e; m: `$ Y
6 Q4 }: p1 Y# \: W. u1 f( pd. 0x8100 **6 G! R0 z8 A/ i1 A4 D5 G* x; |6 F) R) x8 e0 q; m
Ans: D6 E( Y+ d5 O7 a' V: |' ]; H+ g# R. u7 F
____________________________________________________________9 g- H  Q: V1 n" }$ s9 V
; ~8 Z+ @/ t. O( D18. MAC address filter?! K& i6 S4 C- v: Z! `2 [+ Z$ d) S# }/ N  M5 }3 N& ^
a. CPU-destined( r& T! c  E+ O6 g( {
) j+ I" @# R' Z5 [* }' D9 X, ~b. router9 b& i0 y6 v- R7 s" b: o( g- g
  b  h7 l+ w3 E/ Q' G5 H+ o1 [c. unicast **" }5 G, Y4 M4 k- b8 H- g" X  D/ X4 j+ X# {/ [1 f
d. multicast
  L3 z5 A9 i1 HAns: C, `% m' T4 s! k5 j
____________________________________________________________
* T& p; P( ?+ X9 i* y$ R1 b19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)
. @) ^: k9 j" }7 Na. trunk port will be immediately& h( ^" [& p  h$ o+ E
b. trunk port can be portfast mode4 [! m- X( B( @1 X: q7 t
c. BDPU turn this port to err-disabled **# r. U# o1 L" N( ]. i" p' y% [
d. ???
% E7 H3 J. s" P4 K8 TAns: C5 V2 K% \4 r6 g5 G/ o6 v8 s) z# r# M
____________________________________________________________
# C& p7 p$ N7 e  A0 ^- b20. Question about root guard…." [- Z( H5 A' r* M; I9 T: B
% g( R+ t  \3 ha. Prevent unknown switch be a root port0 C8 C& s/ M5 f2 t# F# ^1 f% f. {$ Z% \4 t3 K& _2 ~& _! z2 f& p
b. Root-inconsistent **, i5 Y. t6 r7 o
% A* |; ~- p4 }' u3 u" cc. ???
' j" ?$ y- C5 xd. ???) M% A2 v. e, c8 A9 A( p
Ans: B4 b& L: w1 B" M. Q
____________________________________________________________
/ t1 K) `# u5 d! ?21 Question about Loop guard configure……..
. N, N) c4 F0 f' Ya. (config)#spanning-tree loop guard default" x. X, G" N- u) c# E* T
b. (config-if)#spanning-tree loop1 K* T; M3 y2 {8 F* ~9 |6 W: H
c. (config)#spanning-tree loop-guard default
: Y) `" ~) `9 rd. (config-if)#spanning-tree guard loop **' C4 L7 {* {+ T, p
e. (config-if)#spanning-tree ??????% v/ w: O* }  @) S
" f3 G, l$ s3 K8 U6 @# C" o& qAns: D( b, O4 Z) u0 p, W4 t0 F
____________________________________________________________% I( o) p/ n2 e: N7 E
2 x6 B4 x- V% E% {6 n  `% w22. VMPS question – a dynamic access port is member of which VLAN by default?) I5 M* E$ p5 H( L2 \/ B
a. VLAN 1 is the default VLAN **0 \$ ~1 i: B2 c9 \+ ?
b. none until the port VLAN is determined) }# m6 C& L" M4 k& r% w5 k9 \
- X' ]& r5 g2 K0 l/ k$ X: mc. ???
5 |1 S/ Q7 M9 k) R, A/ |4 ^d. ???( ^6 \  ?; j% O' X, N
Ans: A  L) h( u0 t7 F" P0 t& F8 c. m2 ~- x. F4 K
____________________________________________________________
! N2 l% n$ x3 \3 o6 J# J+ A23. Question about the behavior of an access port when a tagged packet is received.
1 y. F' M# Z# V1 p  e7 V( C. za. packet is dropped.3 |$ ?; c  V  \  I- [- o) a
! ^! u9 [+ o4 ]1 u. s/ Yb. tag is removed and packet is forwarded on the VLAN of the access port. **" F4 v1 B$ G) Z2 h
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.3 c( c) b& m9 s
d. ???% E9 @( D4 [1 Z/ S1 ]2 L  q1 N0 p0 l/ |
Ans: B8 m2 @) E& K' k, T& ?4 {
____________________________________________________________( Q: P- T) l8 b
24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?' ^+ k  L4 z2 _/ ^& _5 v' ?: ?4 L- Q" Z
a. ???' k8 _2 g3 k& P9 S& Z, j
2 h; b* n; w' K0 \' e& `b. GHSRP
' n, S5 }0 f# k5 N9 wc. MHSRP **
) u' c1 l; i; u1 Id. GLBP
0 _& q; i! C" W8 re. ???+ {1 [4 O, I& t  _* a0 N
" |7 v0 u% |: x( l! G. A+ Ff. ???+ ?" |! y% u4 ]  @8 E4 `
' y4 ^% j7 _4 uAns: C4 S' B" ^3 o" o; D  n9 J. A0 u( _, e4 W. r
____________________________________________________________
( V- \3 K; d) B+ D1 a: \+ b3 ^5 P% Q25  A question about RSPAN.7 F0 a) n7 d3 ^8 H* c: N4 u
1 {% l  a4 l/ ra. vlan 4029 remote span( }: o8 @! c6 M+ a& x$ u' Q
. W' r9 x# t8 a+ X" [# ]( M/ a4 ~b. vlan 510 remote span **5 U" U7 v& \5 Q( A) G6 y
0 _$ a) `0 o6 L! ?; |# mc. vlan 510 span; z# `& C8 I/ C
d. vlan 4029 span* r3 p# c' z% n0 D" |5 H8 Q; c. }2 |+ j8 X% o: f, L
Ans: B% t( I: z% G' l' V
____________________________________________________________
) \( ]- n1 \5 \8 h8 i26. A question about configuring spanning-tree port-priority based on a diagram.+ y/ T$ l. A7 K+ g+ C
' V2 d* J8 M; A* `' Ra. (config)# spanning-tree port-priority 127; p* f( \/ ^0 f# [
  s  {. d' d8 a- b5 ub. (config-if)# spanning-tree port-priority 127 **
" c" ~8 N) R) Yc. (config)# spanning-tree port-priority 129; b8 |: V% k1 t0 m
9 j, o- `" X* N$ R  H* m% ~d. (config-if)# spanning-tree port-priority 129; y; v, ]* }) X' T# T5 b+ t
Ans: B, {2 t0 B- Y& I( P$ f2 }% Y) h/ P& c
5 I" L* i& e8 N____________________________________________________________- M6 S: K3 G, @+ X# @. F! f) l
% m2 Z* s/ E* [. j* l7 `# c1 d27 . A question on EtherChannel misconfiguration.# m- [* t$ Z: H$ Y: y' W6 O
a. PortFast9 G" b* r0 i, j- E8 q: H( \$ N3 z3 m
b. PAGP# P/ ~% P9 F9 ^
c. LACP# M" |- M1 ]3 d+ g2 F1 Z7 |
d. STP **6 Z* _4 A# v2 }- l' X. [* g" N+ G# {
$ {' b9 f. r2 v9 \$ F+ q7 VAns: D2 L  |9 U2 c1 t8 C( x$ v1 z( t# P& c6 V8 S7 p+ y
____________________________________________________________6 S1 u% x0 |5 v' `9 D
28. A question on local database for consoling to network devices. (Choose two.). H/ G5 W' g8 d7 d1 x  ?7 p
; [, K8 L% y  a  ~+ |a. Console is a backup authentication method **/ `' M; ^: T- m3 x' ^
: S5 {  z" R$ ^) y9 V) \b. Console is the only backup authentication method' Y% o: j* k2 s% U
c. You can set user privileged levels **0 W" p8 h2 y3 L% r  X
d. ???8 W. I0 X& o% R6 B" F6 k. O. a( @0 B4 T. p; X
Ans: A & C8 d) h, D5 S9 y, z$ m6 Q( M1 Z' ]
29. Drag and Drop – STP Timers; O& S8 _& \7 \) y, ?( j7 }! C
Hello! c( Y( }" L& H9 V- N
– 10 seconds9 Q! |# h3 t% u4 T9 y) d0 |, ^4 X4 y, u+ O, E" h5 `4 R4 G
– new BDPU
  u, g: x' Y, i* T- p0 p1 ]- z. pForward
0 B4 t2 C) D5 H– 15 seconds* }" \) m  s, Y# ^1 F
– listening or learning! t4 E$ G0 N+ A& p; h% Y1 A5 f, n! s( L" p' ?3 t. ~$ I
Hold0 d; B# O& h; R/ g) g
; k( G/ B7 G4 o+ ]– 20 seconds' b  C6 ?: [3 t
– time when BDPU expires
7 G! L- |8 K9 {____________________________________________________________" a2 {/ @: V0 N
30. Three reasons for err-disable. (Choose three)+ {9 M& s4 y+ L. ?8 C
a. storm control **+ v+ ?2 L) K% o  \. f
b. security violation **
9 v6 x* w$ p2 i  e) d% Uc. configuration ports into EtherChannel. y1 I( Y& [  i/ F0 m
) B5 F" v- V) ed. BPDUguard **8 S; ~+ m/ ~8 v% u% h+ g
, l$ [& a+ K0 f3 a4 ue. ???; P% Q4 b; J( M
5 L8 q6 X* q* |; W' E0 H  zf. ???) C% G% u" {/ S3 y6 X) D6 [* \# m' p. \* n2 E
Ans: A,B,D/ O/ N% ]- Z) l0 r8 }* G
% J4 u$ X# d) I3 _____________________________________________________________, w" ?/ `3 R. i  S+ O% A" }4 e
+ m  n0 h: N0 T31. RSPAN what happen after configuration.0 f0 k( l3 T& X. F
a. destination port is unusable for normal use **# J! @  w) W+ Y) C; P
4 \( u2 c" \% j6 eb. traffic in network is doubled2 {* ]# v$ w' S# C$ Y8 m" \4 R3 R" t: H7 a
c. ???, {  g4 Z1 _, ?$ B. J. _1 S
, N- K/ u% I' f8 ]9 `, G1 Dd. ???
+ v: U. T6 L/ A$ G: [Ans: A4 i+ E! @: a) \% ~9 I: T& A* I4 b( {6 U* h
____________________________________________________________" F3 r" J: H/ ^% H0 R5 q& A/ E1 O1 p8 j: H
32. A question on local user database for login to network devices. (Choose two.)0 i2 E* R9 j- [: e( z
a. Local user dbs can be main and also backup authentication method **: b4 c. o- H7 P, Y$ V9 K+ b+ a4 t( \! V% S: o
b. Local user dbs is the only backup authentication method/ \+ T/ Z, q4 u, v& [/ V
' M' Z5 C% X2 A% m5 vc. You can set user privileged levels **7 L+ z8 ]! \! W5 p# s3 q
d. Local user dbs is used after 3 unsuccessful logins via RADIUS server! T8 v# O, [. k/ I; |, r
e. ???  H! a8 R" N, L& r" D1 i0 ^! o; g7 o# I: Y2 Z
Ans: A,C9 m) Q, W" y4 u- v' c" e' g( }/ K; {9 O8 K9 ^2 `
____________________________________________________________9 \# l# d7 ?: s) f
33 Which switchport feature will block the packet with unknown MAC address from sending it via port.5 q, B( {/ v+ v. n7 U6 H( V8 Z1 ^- C
a. switchport protect8 ~' v( f$ B1 {6 U" G7 C
1 |- O" S. P' H$ g8 f4 Qb. switchport block unicast **3 x, h8 H& E( f# Z
* i7 U7 [! q# U, L8 oc. switchport portfast  |% s2 ]$ O2 j
d. packet with unknown MAC will be dropped
. H3 l2 q, U+ T" o$ F  v9 ZAns: B. ^* H: A) x/ D# s
____________________________________________________________. D$ Z# o; f, t7 a9 C& n/ J
8 i4 H2 e8 G! X34. What are the two ways to configure loop guard?
/ T" K% z: `/ X/ W1 A- Ja. (config)# spanning-tree loopguard default **$ s4 \4 F- o! o; H) X. w- r2 L$ Z, Q, M7 X* k! E
b. (config-if)# spanning-tree guard loop **
. w+ _9 o* @# \( gc. ???) i1 u1 }# Z1 F+ e) z
d. ???) g0 Y' s- h5 d# x- `* u
e. ???/ K* C, n5 k/ W3 t2 n& v3 j! u6 S1 m* s9 G1 o
Ans: A,B( b3 `3 S: ]4 ]1 Y: k* T
$ V0 o* f! v0 z. H2 M____________________________________________________________8 a" U7 X$ J% X% `4 Q
0 K/ D7 e( w. _1 Q35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
+ ^/ `7 X7 Z: L5 s+ T6 V  g" ga. Intercept **
: w/ a9 r. N3 }$ _& e) wb. Drops **
3 ]9 j" l- _' `1 a9 ~/ {c. Log **! S4 L3 `9 P: [- `7 _
d. ???# L! j, _1 s  l! l7 J
e. ???0 K( G3 q1 B) r4 {" r
Ans: A,B,C; e: ?$ w$ P1 A: b; w3 z" m# x6 K4 o! L8 w" n6 _
____________________________________________________________
- j+ J% R$ V6 U/ m* J! m36. Question about what are RADIUS server responses. (Choose three)* g. |- e& G: T$ o/ j. {: e4 v$ Z7 f% d# f1 ]
a. Accept **9 a, }$ n3 S+ O! \: G, C/ p' _
b. Reject **
* O# M/ z! O9 k) {c. Challenge **5 H5 S  B+ B% ^' w3 `  `, q5 P, M) g* W! k5 A
d. Get Password
) b7 `) B6 |+ k) @8 w' _e. Cancel/ G8 H* f, z* r. t3 ^" }3 s4 t8 Y* D3 l; z, N
f. ???8 C8 w: ^( w$ E9 k0 p# W
' \! ]  k; V" J4 FAns: A,B,C
  A9 a4 t4 ]6 S. S9 c/ {0 ^, |5 A: N( d1 _, _" f
, A0 V3 r2 ?/ B" V  M3 t6 _9 b
" {8 M: I! i$ q; _- \0 p+ J- {5 u/ ?! t+ w( V# E9 ^! `* D; ?7 d! x8 [* J

  X2 d* M- @! S. ?0 l5 w! H2 l37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
% `" w1 A. R* z! N( O* ra. Drop0 p% {2 k; h" y/ |6 R( f/ h( a
/ k& p1 I+ e  o4 Yb. Remove 82 and forward **
( h0 i2 \! _; y$ fc. Proxy ARP8 Z7 d2 b  V% P2 s9 o, c7 c: _3 ?" t: D7 A
d. ???& [- ^* S5 v' `0 A7 `" u( V1 m' R5 S; O1 Y
Ans: B
. ~# e2 i# g$ r" u____________________________________________________________6 P% w5 g0 k0 j+ h& T# ^% X  [" S: w
38  Option 82 question with two choices. (Choose two.)3 e) m, V0 a+ L6 j! d. |
a. Layer 2 ingress **0 m3 N1 Z$ y. D! X# H
* K3 r; g1 R: M% e: e+ W' f" Rb. Layer 3 egress **
7 h6 k) X: z, H/ z; b* b5 y1 ~c. ???# D4 z! c5 }) P& s6 R5 p& f  n: _
! H/ b9 @3 n$ l' Y  Md. ???
) J7 g8 d& N3 o% hAns: A,B( W* N7 z" X1 G" ?
____________________________________________________________/ M# B+ `7 F  [& l) J
$ N$ y9 J3 x7 Y7 ]3 T6 B39 . Drag and Drop – Port Priority/Switch Priority/Path Cost8 o  f; T( r; V# \
0 ~: l8 `- g+ _, CPort Priority% \0 p$ _/ ]& h5 }' R, G: \% K8 }6 w7 D# q6 }( S8 U, ^
– By default port priority is 128" {1 Z! g2 a- H2 b* I* Y0 \, L9 N8 X9 j- @0 W& d. k8 A8 n
– Lower port priority most preferred path to root& u- ^7 E. h4 G& y- t& H! ]( @
– Value from 0-240+ u4 ]  H" _0 m  |  f5 q3 }
– Multiple of 16 <—– this was there7 x7 d' l2 n; C9 p+ }* q' e8 w
/ a, j* I3 r& u" Y( ^: h2 G: O) OSwitch Priority( H7 u5 r, r. z7 ~5 R; b2 C" K3 p! n3 L. E' Y) ^. M; Y! F
– Lower priority is better to be root bridge* P; f+ [7 b3 Y3 ^6 v# |; ]" @1 v# x6 t' P6 H! X. E+ w
– Multiple of 4069 <—– this was there# y9 n1 Y! s# P! l& g
– Lower bridge priority is root bridge
! ^/ k" T7 ~) }4 g9 N3 sPath Cost& N0 i0 ?1 d* X8 M# s! N
– Cost depends of link bandwidth <—– this was there8 q6 ^  d' z3 \& U8 r1 u# `% z
+ ]- i1 U; X1 u$ L" m) v. [– Lower cost value is better <—– this was there but it can be draged to any of them. I$ {3 U, W4 u3 y  L% j
– If you change the cost on an interface of SW1 then only SW1 will learn the change3 t- t3 K* b: z% T5 c" d7 d
– Short range — The range is from 1 to 65536.. n. j/ g; Y" }4 l& ^1 ?2 Y
– Long range — The range is from 1 to 200,000,000.( D; ~" e! `9 {) K' a; Z' K
- |% }8 D  D2 S/ ^+ _9 m____________________________________________________________8 N- g' R6 P0 a& n0 z- I  l( s: C& p. b8 `
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)
1 c, M7 M5 A8 Qa. deletes% m; p: s$ ~# v$ K; g9 p9 u2 B% [6 E" w; E* e
b. logs **' N! q/ L6 {) x2 i4 `$ E, m! J1 i6 M- |4 K6 V( F0 ^8 o4 K- v
c. accepts0 w# H! ~; |8 \' a  j" V+ X1 U
d. intercepts **( k2 t, M/ K! L9 [7 x) }( ^. J8 \$ r5 V
e. discards **
# k2 k+ _7 d$ [$ m% }/ hf. bypasses, H% J( E8 l1 W1 b/ C' f% `( K- r
Ans: B,D,E* ]" R% F, q- g6 s9 W) q: t0 g$ f( O8 Q3 L: R% S# _8 J
____________________________________________________________/ j/ z1 e" d6 Y. |
41 . Which three features can be optimized by using SDM templates? (Choose three.): H; c& j7 c( F6 ~7 F/ E3 e" L: i+ y6 F1 H, \
a. port security6 z4 H2 j' \* [
b. trunk3 x% c% I% W  Z9 i, A$ `! B, R5 o7 \8 l& p
c. VLAN **& b( u0 O0 a! @" i0 h9 `5 M2 X0 x: e$ ~
d. access **
% j5 l: J" h: t$ \e. DHCP snooping+ g7 B  G+ {. z) H/ _
f. routing **; h0 `# r, ]1 _% [1 c) I) l; |+ j0 u1 g
Ans: C,D,F
! m: p5 q# O% Q" Z4 ^# M____________________________________________________________
$ }0 E" W! G5 |! K6 P( r8 Z42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)9 |1 P6 m' q* v  b
a. destination-MAC
; R  ?, E6 [! A. m6 G) ^, sb. dest-source-MAC8 Q$ ]% }! I* h6 }1 `" U" z
, n! @8 W6 h. N: Q% z% ic. destination-IP& [3 I& I; b* T9 u6 D# Q, |6 B8 j6 X3 F% Q6 S
d. source-MAC **$ I: z" I0 q) d. a% l+ s* |) F% K4 L- t" C. \1 `! M
e. source-IP **4 Y. k9 d6 _# K& V( W0 K. C
Ans: D,E
* L) E& \" w' a  X5 a5 W9 A____________________________________________________________1 I8 u: N/ {, D9 s
43  Which command is used to verify trunk native VLANs?0 y. t" B( |3 C5 l" d4 D# F* j
/ ]7 h0 Q  R8 X' Y2 m6 ^4 u; Oa. show access ports
' {# {2 N5 A; Nb. show interfaces trunk **0 i# w7 h  d# ?3 Q3 U
  p" I0 G# ^1 C- h" yc. ???1 @1 X. A, x3 u" s
$ L7 M8 e( o! Td. ???: X7 v' g+ ~5 ?  w
Ans: B" B* M# `$ X. h4 i  k  A( J
____________________________________________________________% i; p8 r$ r) S. @: U/ P' d" K3 E' S) m* t4 I
44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)1 t) H6 n, f/ {- C+ f* ~+ A, d
a. spanning-tree vlan 10 root primary **) ?2 B9 @) P0 [' C( ?: G: \! d$ r9 G* f. O( C2 y
b. spanning-tree vlan 10 priority 4096 **# L; E/ R! u, x5 z) C
c. ???  _+ O& n: q* b& S5 w, A$ w& G5 N0 l& d% h1 |0 @
d. ???+ _) Y: A6 U. B, p, j0 i) ]: B
- @. k* y; Z; n. I# Ae. ???5 `4 Q3 S- P# P6 X  k
0 D% e: c9 U: Cf. ???" `, ~$ i  i% I0 g5 T, @
Ans: A,B, D/ g; S1 V" G% s, z
7 B# u8 R' ?0 w5 n) Q! u/ a____________________________________________________________7 j- Z2 `7 \7 S: [- l8 `; u4 ~- C" L* c) p
45. Which information does CDP supply from connected devices? (Choose three.)3 V5 e& A: |0 t8 k* B# B$ G# C7 Z; u
a. Hardware Platform **/ q: m3 T1 f8 h. m' U4 a9 \
0 W+ E+ a! N5 V: l/ O: \b. Interface ID **
  f1 [, T( H% y3 K  p$ k9 _c. Hostname **
' H3 O* ?3 A: K5 N& Q% yd. Config Register3 m% j& D' K' p9 V0 I8 B, l) \* X) _* r6 V
Ans: A,B,C8 K+ v' d4 V" O( S% E9 C+ ?4 y; N2 v
____________________________________________________________5 g8 J' ^  P# Y: C$ N$ y% w/ U
: ]  L  m* }3 G( }6 ~" v
, X0 `( X( v' L9 g) m: t8 [2 u4 V4 C, F( w; {5 Z, t
46  Question about voice VLAN.
0 f( a5 @/ L: R) B/ W% W4 x. P4 Ma. Disabled by default **
( p" o6 I, q- q: f. s0 ~: v$ n: Fb. Enters on untrusted port: b3 v2 n) g. c5 k
' c5 S: G# T2 M" p3 Oc. Default CoS value of 5 for untagged….. **! J# v# A4 z7 w0 V7 O) |8 }5 h+ D8 `2 I- v+ p9 g  `; E
d. Needs manual enable of portfast.7 y2 p) m- C1 u2 _
Ans: A,C6 e& @/ \7 G/ O8 G1 {
! m5 V0 x, l) R2 e" J& M# U) g____________________________________________________________, K. h0 G8 _1 C/ ?- L: v" ~, T% L- v* W( T
47 . Question about UDLD aggressive. (Choose two.)- S0 s  f* A4 B) T
3 h+ Z: C% E* [- h' Xa. UDLD messages are sent every 15 seconds. **
; _+ n  N: e9 W2 Ib. UDLD tries to reestablish link once before declaring the link down.
2 P0 y: P9 y* _5 dc. When unidirectional fail is detected, port state is determined by spanning tree.. x2 d" g1 L2 g4 p3 e) O& q% O7 e$ n( U) U! U! @
d. When unidirectional fail is detected, port is turned to errdisable. *** x/ r/ {- G' b; K0 s
e. UDLD sends messages four times the message interval by default.# {, a" _; ]- w$ ^
f. UDLD automatically … message interval based on configured timers.
5 d1 L3 ^; D& n$ mAns: A,D" v0 p& g: r- b* F1 E$ E. b
____________________________________________________________
* ?9 n0 S3 G! U  j3 A3 H0 V48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2." R0 m# p( b9 J* k: P1 T: w, z# F" Q+ q" t$ S; g
Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)/ L$ \, K8 {1 d$ Q/ i, m0 R! K% [( ~; C- y: C- b* _) v5 I2 X& f
a. DSW2: change bridge priority to 61440 (highest). **
4 J0 F" T* i) l' Bb. DSW1: change bridge priority to 4096 (lowest). **' Y* `7 L% T$ P) x4 l* `6 ]: U/ i! ?6 m) T, Z  q7 ?( C
c. DSW1: change port priority but in global configuration mode.6 W$ z, b/ A1 b! Q4 l* v1 ]/ L$ M
d. DSW1: change bridge priority but value is 0.0 Z1 L: L! F/ B, s- n2 j7 G
# }" m0 x" h- `e. DSW1: change bridge priority but command is priority root.& o' m9 a+ x8 k4 D6 A+ o3 @4 o
Ans: A,B# o$ A  o/ l7 V
____________________________________________________________+ k: o/ U7 J6 d3 C7 T: r
0 }; e' ^% c8 I+ I, j$ Z: @49 . How to configure dynamic ARP inspection on a VLAN?: j' E# H: J6 |& _/ Y! w
a. (config-if)# ip arp inspection vlan' v2 c/ [  f( c: a+ v3 v
b. ???
: ?3 O9 |( O/ Y4 q  X. Dc. ???1 f9 Y2 s2 p$ l
d. ???( E7 O& T7 D6 S2 l
2 [1 X: n& ~0 y6 f! A' t8 bAns: A
* z; v5 C* M- g/ f  g____________________________________________________________+ k2 G7 b, o8 b0 I8 R+ q
: J# q6 `5 C# p/ Q" I5 A2 ?50. Drag and Drop – Port Priorities) X, v7 ?7 z* b8 |0 h
Port Cost$ _2 V3 M. M* m
– 8 default is being the interface value" O- A% n9 c2 u& F2 ]0 _* W6 ]$ ^3 s2 E+ b4 W
– range 1 – 200k (200,000)
/ j6 M% b" G3 h' [, i  ~Switch Port Priority" b* w2 F1 t, b& G4 `
– default value is 128) G8 H( g1 R5 |( l# s& G
– multiple of 16  Z! M( T# R) d$ b" h  P4 g( z5 B7 O5 x  z6 U
Switch Priority7 [, A; k  s3 f3 B6 [
– lower the better) g' O* a0 B+ Z* ~3 u7 {3 ]6 R- y# w& B) z
– multiple of 4096
) S3 p# w, K. r5 bldq_china,如果您要查看本帖隐藏内容请回复3 \/ B8 a/ a" K- G9 F* x% U
_________________________________________________________/ p' F& V/ h& o# @* I; i6 I% L# G0 e6 b7 _
96. A question about the priority of a Stackwise switch.( I' F5 T, o, Q
(CONCEPT ONLY)6 G; [; B2 v7 \* \6 d! v2 C9 @
4 j9 j9 x  o+ b! B- w; y6 o; q* Ha. Master member is selected based on member’s priority. **
8 R% J. I/ G( g5 m; {b. ???* D2 R8 d, h2 r8 `7 K
7 V( V! f1 k4 V8 z3 D$ R) ?c. ???
( B# w& f$ B. r3 Gd. ???" B" v& f. ]9 F8 W
Ans: A8 l& ^, Y. ?; @3 L: a( t. y: G7 E* `) U  u* f: X
' A+ v: M: m% K7 r, ?5 e2 U; }" Q: r9 p' T8 q* {/ a9 E( Z
97. What is the benefit of UDLD?* X5 J7 R* H: n, q- L4 ?9 z
0 s9 O6 O8 G& c8 U0 ^& N+ Da. provides backup for fiber0 ?, Q! ~/ M9 ~+ t" I3 ~  x1 j
b. help in preventing loops **. y1 P2 h% ]6 |7 Y9 j9 C' z# I; P1 p9 m* o9 o8 w
c. removes loops( W# x6 D, h* ]+ o
d. determines switch path# @. B1 N; B4 D! q3 q8 C% p- u4 O: Y& ?" _9 Z0 Z! e
Ans: B) b: T# J+ }3 C* ?9 _# d/ w& @8 C0 g9 O$ {& E
____________________________________________________________
8 G7 E) S& P7 y- \3 G5 D98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?7 u& A6 O9 p: m; i7 {& J
: V+ C+ A  n2 l9 c! g1 X(There’s an exhibit that shows f0/7 receive BPDU.)
5 f4 s  m- ^, }7 E8 N! Wa. We have to configure shutdown and no shutdown.! q' ?9 z, c( X( h: R* E) r  H' e
b. Have to use errdisable recovery.
/ O7 M$ _( i! D* T' dc. ???' x' H; E; ^1 C5 F; U
% K* f% g) x) z: [1 Td. ???0 r& e3 K. t, g1 A& t9 k5 [7 q# }
Ans: A
9 [& K) |7 X) ^- S8 b/ {. A拖图题汇总:$ J0 `. R% ?) ]2 m9 ]
1.        CDP / LLDP, L  u8 j, ^: a) a3 g( W* K! \
CDP8 d. F- a7 y0 L" c( }' C2 X
&#8226;        Default time between protocol frames is 60 seconds; t4 S" n2 D& r# H) i: N7 l+ m
&#8226;        Supports IEEE 802.2 and 802.3 encapsulation% @0 V+ q! g0 n' D6 i2 H
) s8 C% c/ W6 Y; _( H! m, S4 N&#8226;        Uses multicast address 0100.0ccc.cccc) v' n# ?6 S. V* }4 X* C' D+ d% y  j4 Y
LLDP! {6 S1 z0 M' B' g. u2 o* a) b3 ]/ ?' ]+ H! p- |! M0 r! c. o
&#8226;        Default time between protocol frames is 30 seconds: a; e! }7 _0 q9 a& L6 q7 A: C2 G9 ]2 u; D1 U
&#8226;        Sends topology change notification: ?) N- [9 l7 u! i" d1 B  r8 j
&#8226;        Uses multicast address 01-80-C2-00-00-0E+ C# i* E0 d6 f& k3 [! Y& S2 I2 Y" @( L
5 e  u1 |3 X1 C==========================================================6 |: r8 q  z/ f1 F( O8 z7 n
$ i0 i2 u( W3 P6 }; l7 [4 D3 p; x2.        BPDU Filter / BPDU Guard / PortFast
2 ]" k7 T; l1 S( Q% ?% yBPDU Filter4 W) j& c2 Z$ Y1 S5 L9 X5 n
&#8226;        Disables Spanning Tree on a configured interface4 X- D; _, Z/ a, O, ]' O) j
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames# M7 u/ X" L$ i# v* {% I! p) b4 D( S
BPDU Guard- _' U6 g/ z  u' e& \# M' O
! Y0 E4 z" s' Q; T- c$ o  o&#8226;        Protects configured interface from receiving unauthorised BPDU frames. z( q, Q+ g4 m6 `$ E1 _
! }5 d$ {4 u0 W* n( ?) @# y+ w&#8226;        Shuts down port and places it in err-disabled mode
; ]# h% a, @- `4 qPortFast
2 q/ O3 z) b  O# Z" L6 E&#8226;        Configured on access ports with a single host device5 n8 Z& B) ?" o$ r( o8 ^4 {1 j( V. e9 m
&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state
$ @3 v% p1 k! j& `==========================================================( x* a9 \; v# c2 t  ^) P) q0 d0 e
9 t$ N+ v' E9 R  x3.        MSTP / PVST+ / Rapid-PVST+/ D! `: n) P/ I; K- Z9 b
/ S: d( x9 U  [) a: v: d; bMSTP2 }7 s6 a  v8 n5 C
&#8226;        Based on 802.1S7 v+ e' B- X0 b# B' g6 B3 C+ j
( }. w* \: y7 S& f&#8226;        Maps VLANs to instances  u/ d, H+ \" R( r1 L# f9 L: D4 C4 F/ S$ ^* b
PVST+9 s6 t) a9 s- `- c# n# t0 @
&#8226;        Based on IEEE 802.1D% d  p4 U- @3 ]3 ]# D0 r" P" F/ Q5 v
&#8226;        Default STP mode8 [  Q/ Z6 {* z3 L$ O
& a& g6 f6 A( d% C1 I% X) r/ e1 [Rapid-PVST+  g; O; ?/ V" [* y' }  h. W7 v
&#8226;        Based on IEEE 802.1W  p* u! g# _( }) W& ]- \
: e* H; ]. f6 u: X2 X2 w/ x' w/ L&#8226;        Discarding port state/ r2 `  P& w' E7 M7 z8 I0 @' M
==========================================================+ k" p: r0 k$ I/ \8 H, H- ~( Z. o' ?' K; I5 }* y
4.        Forward / Hello / Hold: L5 Y( u( r& Y+ E; }& N3 Z
Forward; R. N, V; C  b5 F* L$ U- Z, e0 e
4 f) e8 S( O" r4 ?&#8226;        15 seconds& _- `! @; ]! L/ F( R
  D7 j; s9 g/ g8 e5 H1 v) R3 v: w&#8226;        Listening or learning* J7 u4 \+ ~# X" l% s" H
# k3 Y3 e6 i3 ZHello  Y8 ]8 [& [* T: T2 i
) v; X6 E$ _  U  ~&#8226;        10 seconds5 \% K$ h, |% E' i/ P$ B- D! U
6 N* k, `$ d/ @  l1 m% K% q$ j9 w&#8226;        New BPDU
0 A0 H% C; }, E# Y7 l* v) g( xHold- E. u6 {1 L; x2 A- F! ]0 I% F3 B5 e) x, W; j. u
&#8226;        20 seconds1 G' M! R/ u+ l+ ?
&#8226;        Time when BPDU expires
7 }' i+ ?& B5 X" H( R- z==========================================================' ]$ I( j8 e! K4 H3 X+ D( S/ _
0 _7 Z) n! K- }, {# y0 Q; W5.        Port Cost / Switch Port Priority / Switch Priority6 U9 Q" K- M5 Q0 h1 f3 W* v
/ Q& Q1 Y1 h7 Y- e& @Port Cost
0 H+ D& a/ C2 a: j. A&#8226;        8 default is being the interface value9 v3 Q5 D6 N' N9 ]! d- I& `4 q. R4 U% X- U; X
&#8226;        Range 1 – 200k (200,000)' o2 \3 Q# Z+ f3 i* u$ F" _6 Z; S# K2 O0 o
Switch Port Priority" ?/ U! k- A, e; l( ^" D! j8 E- a& c; S5 K
&#8226;        Default value is 128; r- I7 l4 S2 R' x& s
&#8226;        Multiple of 16( I% U0 F, t( b. ~$ b( @
Switch Priority+ Q: f% Y/ z$ K9 v7 b/ c* ]( w- X/ T; i2 X# u3 L; x
&#8226;        Lower the better
4 `. I. Z1 H! w. W. g4 F  C&#8226;        Multiple of 4096: b! x$ T* p! M  ?2 Y$ f9 g6 k4 P! ]0 N
==========================================================# g2 w, B4 x4 a
6.        Guard Loop / Guard Root* a0 u! x# H- d8 y) I1 g# ^
Guard Loop/ d) t* B. {: T# }8 D5 U7 e% X+ D$ ]
&#8226;        Detecting unidirectional switching links% C6 A+ \6 V1 o+ `4 @
+ v& X$ x8 W9 x* E" O- ^) v&#8226;        Port self-recovery' a4 h. f3 y) h6 ^% L
5 V, M0 T: j0 @2 xGuard Root; C5 @4 F: o, v( f/ Q$ }) i$ l. T5 K: J" Z  r6 O
&#8226;        A better BPDU disables the port as err-disabled8 t' R# l' F4 R/ V4 f
&#8226;        Protect designated port from recei
117# 2017-6-2 21:11:27 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-3 21:28:55 | 显示全部楼层
CCNP交换(300-115)考试新题汇总(5月24日更新)
119# 2017-6-3 21:28:55 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-8 20:33 , Processed in 0.115893 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表