设为首页收藏本站language 语言切换
楼主: 小乔
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(5月24日更新)

  [复制链接]
发表于 2017-6-1 13:47:26 | 显示全部楼层
非常感谢楼主分享
回复 支持 反对

使用道具 举报

发表于 2017-6-1 15:43:48 | 显示全部楼层
11111111111111111111111111
回复 支持 反对

使用道具 举报

发表于 2017-6-2 09:01:52 | 显示全部楼层
% g* K! l" j( p& \
非常感谢楼主分享新题,
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:37:04 | 显示全部楼层
謝謝 對我很有幫助
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:38:17 | 显示全部楼层
6666666666
回复 支持 反对

使用道具 举报

发表于 2017-6-2 20:15:00 | 显示全部楼层
推推推推推
回复 支持 反对

使用道具 举报

发表于 2017-6-2 21:11:27 | 显示全部楼层
1. What is the Ethernet frame size for 802.1Q?: ^( a$ d  B2 k8 c. x- T# ~& M% f
a. 64- H% [2 D( r4 s- D, y' O
b. 128% r. {" o- L4 B- x& W5 x$ y: s5 ^
c. 1518, T4 V, S" B5 m' v  d( v& ]# X! I
$ M6 N+ S- v: \! c: T6 f5 @d. 1522 **3 A/ H) |7 p+ I: Z/ [0 F6 I6 I
' J& k% B! z; i: JAns: D! T: v- a' K/ D" ~, R7 C
: E' V" m9 p: N————————————————————————————————————————————————————————————% x2 D3 i1 {% M9 Q% K/ _7 A1 @1 N) N6 j+ G: x
2. How will the traffic reach the core switch from AS switch to DS core switch?
& E8 O) o. a& e/ k- ]0 H(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)
% T' W7 `4 d8 [5 Da. ASW1 to DWS1 to core" |& U& h: U( s" P  P
9 F& d3 K3 ?6 X7 hb. ASW1 to DWS2 to core **
. N9 c( m: d& o$ uc. ???; Z9 ?9 K6 D8 J  W/ `0 I
d. ???9 G( v6 J/ w1 B0 w) |- c* H9 b9 X; E6 }2 X  `4 ?) r( y. M; k
Ans: B* H" h2 i+ G- `. ?4 e
————————————————————————————————————————————————————————————# q& M0 M% [6 K$ k9 p7 m- V. l& u" q$ p. y- [
3. If HSRP group number is 45 what would be the MAC address?
) A9 n9 \5 C  w7 i(Basically conversion of digit to hexadecimal with group of 16.)% R  g. J6 O% a( f
a. 00-00-0c-07-ac-2D
$ i6 j9 e8 o# J# xb. ???
) L8 v7 U/ w# n% vc. ???7 j" n; L6 `4 ~0 _, k9 a# X' w+ D* T; v
d. ???1 T, R% o" e9 f1 h2 }% J( b- h' L) w/ K( z+ O
Ans: A2 M+ A' l5 F% O3 M
9 T! C/ F8 G7 }. L: _& s0 p- fExplanation:4 e1 T% S) S* j" c  i4 M: u
+ c. |7 f+ F  n6 ~; V" L1 d) m7 W00-00-0c- 07-ac-2D1 E+ L' Q% e6 O1 f, L' e) F9 R  H. X5 C  Y
CISCO_ID :HSRP_ID:GROUP_ID
7 B! s* |8 n% W6 @2d=45$ @$ @5 I2 L; c% _
————————————————————————————————————————————————————————————
4 w* C: B: }. b; n! N( r; k$ R4 A question on EtherChannel misconfiguration…….3 y: }) c# ?  @3 A. ]. ~" [2 Q, B9 X$ e; p. [" m# z
a. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **
: a7 [, j9 h- ~4 }b. ???/ J9 {" l+ U5 L2 W; r* x/ Z8 r2 W/ \1 l4 B% G
c. ???# B# S' n8 F$ q4 |! C/ n
d. ???
8 E/ {- ^" N/ j4 zAns: A7 o$ P, J3 n; W  V; j1 I7 r) Q0 u! \' V# T3 w* M7 o
————————————————————————————————————————————————————————————
( H1 u1 Z* y# B3 @6 k7 n1 P5 }% n5. Select a valid VRRP configuration from a list of possible configurations.. r$ h! ~; u9 W) _. f7 @0 G1 E* B
# d. ?, O, x$ {a. vrrp [group-number] ip [ip-address] **0 M$ N: h2 K  v  ]' j' s) |( _; F+ i' k6 n+ d
b. vrrp [group-number] priority [priority] **
4 M+ L- d8 g" ?' [/ fc. vrrp [group-number] preempt **
; b- v$ n$ x% dd. ???7 K  ~( |- S' W3 [* F  ^" t6 E* z2 z9 n; @* p7 r
e. ???- z+ e5 \6 ]( G, m; Q
Ans: A,B,C
& g, \# `, C, o. V. N& o2 y2 jExplanation:* W5 F6 ]6 Q; x9 K
You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones., I& j  ~+ W1 j9 p
3 p$ \; z5 A' z9 y" I# x————————————————————————————————————————————————————————————
* ?  q. Q- Q& w! M6. Private VLANs (PVLANs) have two secondary VLAN types.7 C3 ^0 P2 y/ t: y9 W  Y
a. community **4 o& E) F5 c% M" ^/ p/ ^: I/ F3 T. M/ J' S* W1 U
b. isolated **
# e1 G& q# m2 i8 J) d- r7 vc. ???; }$ |& X: W6 V) i
d. ???
% J4 a3 `1 a# H" z; je. ???) Q4 a6 Z* W% H. N/ b9 }5 j5 W* A0 r' a: \+ t
Ans: A,B
  q4 P" W; a0 a! Q/ p$ x+ t* ?____________________________________________________________) Q3 ?. o3 \/ @$ c# p6 b
7. What types of SDM templates you can use in switch? (Choose three)) g% d1 H  o+ H5 B, I. c7 B9 w3 t7 m( `2 s
a. Access **- @3 r* E7 L, g8 G* c
) }" h4 o8 k7 n* Vb. Default **0 z  i  r8 ?9 |! b6 X* t" F5 Z( U9 j+ }7 E3 s
c. Routing **# e5 r3 K  X7 v9 _
1 T; L1 J3 P9 @6 P1 E* g/ {* ld. VLANs **) b6 C" d' F1 I5 Q# t
e. ???8 c3 N# u9 m) ^7 _$ \9 |) }! @6 E9 i5 S4 F3 A; A( w. E, T" F4 w
f. ???
- v, g& L3 u0 W' c- S" q! o1 u2 FAns: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)
( J$ t4 u* H, BExplanation:6 a& J( `( K/ w+ Z3 @+ v
3 K0 g, ~/ d$ a) B* D+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.7 |# X; m  a+ ]3 I& J
1 n" g4 g; m8 D, |+ Default – The default template gives balance to all functions.8 y! e' A8 [9 _# f: k" g( X+ V/ S0 a0 z- w2 e+ H/ r* x  ]
+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network., W' {' ]0 N0 O- k6 d- B$ _9 d* J
1 C: j+ }9 c1 V# l2 x! K% o- F* s+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.! w, }. u" b0 |& V+ k5 u$ \$ }' U$ l5 j1 |0 u/ h  |; J2 _; }
____________________________________________________________2 E- l) H* ?9 O: w  c
8. EtherChannel – what is the process to configure EtherChannel.. T" }/ Q) E: T) w
* U4 P+ |( \' M$ Ba. shutdown both interface ports **" @6 T+ t9 n% L  s, R9 h, }
b. shutdown the interface on one side only0 `% p# b7 O- T# \" f/ C3 B1 Z* `8 ^* C" K& C0 R
c. ???; G* s, C3 C2 n% i' S  \: t3 \& d1 P
d. ???5 f: Q, k9 }" l
# R  k) ~% R  I0 lAns: A; e. [1 T. y& d; y6 V8 i+ p, ?$ H
____________________________________________________________) o$ y9 O/ y2 j& M( z; u) A' Q; _0 H- [) s* w7 B, a
9. A question about spanning-tree port-priority.: k, a- u. G- C/ h1 c- y2 e+ h
/ I# u' @; s9 A8 O, Ga. 127 **
0 ^. f- j% F( z+ _; Ub. 129$ b; m+ x( ]- N# R% a7 k* w: o6 }
c. ???4 P3 E- q0 T, H8 }" I7 u2 k5 x8 e8 _7 Y- E# p- C8 F
d. ???1 A- q' b, j- w3 ], U4 i' K+ `0 m( j! T, Q7 u1 N8 t" e
Ans: A" V4 w' P! ]3 N9 c
____________________________________________________________1 y0 k. y, d3 S- Z1 S
10. Question about EtherChannel based on STP EtherChannel misconfig……: F& F; @; r$ E8 r3 @  Z
! D) x% w" Y' n; Sa. (config)# spanning-tree etherchannel guard misconfig **
3 y4 h3 k9 m) v4 N0 _" v* O. sb. (config-if)# spanning-tree etherchannel guard misconfig% D5 x! V" `4 s6 ]9 N+ x; A1 n) S6 J0 T& Q+ c% _5 i" t
c. ???
+ p; s: F+ b  O/ Kd. ???- u0 P& H$ o- g' L0 r- t& u6 l" ~8 c6 }
Ans: A+ V6 A! L% N3 j, s& H
________________________' `- F1 ^* j: `5 {9 b2 _2 Q/ q& |+ q$ h: ~9 ?, o8 H' k

: o* s( D5 w* E# M3 a
- d) g, Y4 [+ W" J; l___________________________________
6 Z5 g4 c8 p- V- `. }4 {6 E2 D11. If HSRP group number is 37, what would be the MAC address?: z0 a  C; U% x  {! O2 V4 Q
" d' U7 @$ I0 Ia. 00-00-0c-07-ac-25: ^0 S; X; [5 q  w6 E$ \! L$ Y  e6 v. m' O0 U7 c7 P! t
b. ???" y; E# m" n% T7 I, C& K3 ]  {: K6 K; w8 n* {9 r" F
c. ???' u! o- C' J7 o2 p  K: }- r9 K0 I1 h8 @# t  \8 G8 F8 W5 r
d. ???, [8 |) _: I/ I% o& `4 y, v0 a6 K
Ans: A! ~* k3 k8 O) V& l, K4 n- t- h1 v& L& l' ]
____________________________________________________________) X6 B1 d" C' D8 f
12. What is the default value for spanning-tree port-priority?) L0 U' f2 {, _2 a6 v7 i7 a/ P- t
& R0 c& w, N9 z9 Y; U* Ka. 128( s. O+ U* S$ [
3 K# B) o, O* ob. ???$ b' t  Q2 V' B  D6 T9 }/ @
" x; @" E1 I# p4 tc. ???; D9 O1 y) r1 F% a! D) U1 {6 m+ O* j7 B2 z6 y
d. ???) M7 j0 p8 P/ B# p& `5 T
7 v/ q9 R( |0 B2 y3 I! |Ans: A; w/ G+ a2 J, B4 T! a' E
1 }! Z& b7 P1 H____________________________________________________________! m$ u6 w3 F- l/ p& i
! j) [: f) t  B) S; r13. Which information does CDP supply from connected devices?
% W& m+ Z9 V6 Q0 d0 S' S$ _a. hardware platform, interface ID, hostname
  k8 b/ j- U3 y) Vb. ???
8 g# m5 I3 y/ X. {2 r- U+ ~% tc. ???: P( @- s$ b  N+ e* @6 T- K5 ?, O7 e( z- g  R5 r; o' P% c
d. ???1 C+ E8 i) ]- u. p8 o' i0 A1 C& Z; }
Ans: A, g# \: b/ j7 X7 J& T' k, ^9 Y- C( |3 {
____________________________________________________________7 w  U: c2 {6 S/ d
14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?, j: s# a8 L$ K! `2 L! r  C9 C
: s( o7 L" k2 S! Ga. errdisabled$ C. v# c3 U6 O
b. shutdown$ ?4 W3 ?, |( H
$ ]4 s! \$ {8 S7 Qc. ???5 \, q4 E( a* {5 c$ D" e
; G9 v! x: c  x7 S2 c( J6 ]) C* w% @d. ???
+ j* B+ M) q* QAns: A# Q4 _9 B) G9 H0 ^' w# F1 V4 H( ?
* l* \- e' S) M( L____________________________________________________________& }6 c# A- _9 E0 z' x- Z
. B" {+ o, T0 G15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?* A0 y; j$ B  q4 p4 F1 ^
a. isolated6 T; N- b, u: K+ y! ?: T4 C2 A
5 }0 b7 ~+ q: A4 H7 o5 p3 y7 x9 tb. promiscuous: k; Y# L; W) R2 c* X
c. ???$ V; ?6 W6 d# N* ]2 v
d. ???- j. L- C% f; R1 ?. O) i+ W/ W$ U" U* F9 X( W3 Y+ a0 j* L! m
Ans: B
1 O, \+ k3 h( C* i; C& g( M____________________________________________________________# J8 I* b$ ^2 `5 D& p
2 Z' M  p7 U1 E$ t! T16. A question with an exhibit./ k8 m5 y3 |3 y0 S" h0 \( e3 E6 k4 R5 l* H/ m  v* W
There are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.2 t0 O5 r3 {! o- x% }2 h$ z" D: I
a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.2 @' O$ f6 e5 Q+ ?5 [8 u9 `
b. ???$ @( r! z; t' D( T1 P3 U0 P9 T# C) G* I# M
c. ???# U/ |0 z6 o% A# F8 [" b4 U3 A8 e% n
d. ???, Q( C, t) E8 v" L5 s
" V' y6 X7 T. R% i7 T& vAns: A* Z5 e, E5 ?  p2 ^! U! I5 x
" j+ m6 H$ d" L4 J2 f$ X____________________________________________________________$ n6 r$ |: O' `: s* _/ z9 f! M5 r" Z* m
17  Which option TPI 802.1Q tag?' ~2 u6 M) s' G1 O. L
a. 0x0806
- m2 j7 I8 u$ \+ `- q+ Q7 sb. 0x888E  `7 c, m' X( e: \4 M3 d
c. 0x08009 n9 N/ e; m: `$ Y0 g; ]. H3 u+ x7 u5 q. Y* d
d. 0x8100 **6 G! R0 z8 A/ i1 A4 D5 G* x; |
. K$ w( ?$ x9 k5 i9 ~: h9 P. JAns: D6 E( Y+ d5 O7 a' V: |8 e! A0 ]$ R1 ~; ~" i
____________________________________________________________9 g- H  Q: V1 n" }$ s9 V* n- t5 c+ _% m6 K
18. MAC address filter?! K& i6 S4 C- v: Z5 E+ j; @! Z3 S/ [( h
a. CPU-destined( r& T! c  E+ O6 g( {4 X& k4 ?6 S& H/ L' Z! t" c
b. router9 b& i0 y6 v- R7 s" b: o( g- g
) C, V. S1 V2 F7 |4 Fc. unicast **" }5 G, Y4 M4 k- b8 H
. R& I3 y, O0 m$ M6 h( wd. multicast
8 `" n; N- E' u5 x3 \Ans: C
% \% P' M4 p2 ]4 g7 s9 a5 Y0 H____________________________________________________________: Z' I& v% s; ^: z' f: b
19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)3 T$ Y6 |! E5 v, _$ Z9 Y! n7 {
a. trunk port will be immediately# s* ^8 t! ~1 u6 e) }
b. trunk port can be portfast mode
# `& `  @) r( H6 Oc. BDPU turn this port to err-disabled **
' ?3 a4 @6 M, |% Sd. ???
. ^2 N! v8 B8 ^Ans: C5 V2 K% \4 r6 g5 G) K/ q9 Y; p" D
____________________________________________________________
- U3 h& ~& u5 Z' ?8 x- d20. Question about root guard…." [- Z( H5 A' r* M; I9 T: B
1 I% |' ~0 k$ Sa. Prevent unknown switch be a root port0 C8 C& s/ M5 f2 t# F# ^1 f% f
" E2 b* U: a# t0 `9 p; v# V& q7 wb. Root-inconsistent **, i5 Y. t6 r7 o
' N, Q/ ~$ z1 R! N# o: ?; C6 @  [c. ???3 f& g. J4 W, |
d. ???
* h2 [* ~. F! o5 Q# JAns: B, v* G" ~! V9 W! S( W
____________________________________________________________
7 x& C; `9 |* S$ x+ ^21 Question about Loop guard configure……..
  \0 V2 V* T3 m; m9 \1 Ea. (config)#spanning-tree loop guard default
) ~% {3 |: D9 ^) _  @b. (config-if)#spanning-tree loop. q( M* {- R+ z% {( E3 F' X; t
c. (config)#spanning-tree loop-guard default
5 E+ G) h( b& kd. (config-if)#spanning-tree guard loop **
  S" f" V0 \) z, N/ x6 S, Te. (config-if)#spanning-tree ??????% v/ w: O* }  @) S
) J9 l5 u/ ~3 ~7 L. }Ans: D" Y0 m4 K/ a7 a3 E; d1 @% d
____________________________________________________________% I( o) p/ n2 e: N7 E
, F6 u6 O8 `) s5 p( e22. VMPS question – a dynamic access port is member of which VLAN by default?) j  t7 K/ P+ f$ A' {4 d: l
a. VLAN 1 is the default VLAN **
& q1 Q* u* G3 x' {/ G1 Ob. none until the port VLAN is determined) }# m6 C& L" M4 k& r% w5 k9 \
$ L4 O, N4 t' dc. ???6 n- L2 C/ D4 s, A/ p* J( m
d. ???
2 b; j. p. \$ t3 [2 [$ sAns: A  L) h( u0 t7 F. j+ r0 ?9 l0 @  }7 m* p% L9 c5 l- M
____________________________________________________________2 e8 e3 i/ y( I) E
23. Question about the behavior of an access port when a tagged packet is received.
: Q# K+ f5 O, L9 J5 }* ga. packet is dropped.3 |$ ?; c  V  \  I- [- o) a
" ~7 M& s* ^, Db. tag is removed and packet is forwarded on the VLAN of the access port. **
1 B1 w4 @' M& i; ]0 C( {1 yc. tag is removed and packet is forwarded to the VLAN mentioned in the tag.2 ~) `8 A/ v. m/ v, v
d. ???% E9 @( D4 [1 Z/ S1 ]
: J! k; ~2 a0 [8 m  @/ X3 V) D) k% PAns: B8 Q: u) h; ^% O. t3 Z: e. V
____________________________________________________________0 [+ }$ D) _" i
24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?' ^+ k  L4 z2 _7 w$ F* s+ K; ?" Y2 I
a. ???' k8 _2 g3 k& P9 S& Z, j0 o2 s$ M& }( w. c! a
b. GHSRP2 Z7 q/ a4 U" L$ B6 a
c. MHSRP **
8 u7 d7 {9 _: f' V8 R5 J: `d. GLBP
+ o7 x/ K6 b- o& [5 he. ???+ {1 [4 O, I& t  _* a0 N* D9 G1 }2 N% v, V8 O9 ~  P! \
f. ???+ ?" |! y% u4 ]  @8 E4 `
2 b9 u  I  K, _& p9 u, uAns: C4 S' B" ^3 o" o; D% i' x; Y8 @+ R0 f
____________________________________________________________
/ l- I" w9 e2 H/ M) J* ^8 m3 [2 G25  A question about RSPAN.7 F0 a) n7 d3 ^8 H* c: N4 u
& D, c7 [: {$ c- }/ K% O% E7 aa. vlan 4029 remote span( }: o8 @! c6 M+ a& x$ u' Q
0 V4 i( q  m; T% G7 Ib. vlan 510 remote span **5 U" U7 v& \5 Q( A) G6 y
& j3 B- Q% s% o, pc. vlan 510 span
, i; h, y/ g# Y$ {' T2 od. vlan 4029 span* r3 p# c' z% n0 D" |5 H
' d6 {, V, b) K6 @Ans: B( h* \) i4 T0 k; v; U2 M/ K7 J  N
____________________________________________________________
8 P7 K& E! d+ u4 T! q9 Q26. A question about configuring spanning-tree port-priority based on a diagram.+ y/ T$ l. A7 K+ g+ C6 ?+ N) p1 W( W2 c! p  |
a. (config)# spanning-tree port-priority 127; p* f( \/ ^0 f# [
. S( p" T1 m$ H2 e) {' h5 Vb. (config-if)# spanning-tree port-priority 127 *** R# L6 e4 U  r! o6 B6 T
c. (config)# spanning-tree port-priority 129; b8 |: V% k1 t0 m
3 N+ Q0 ^* t# M7 X' [d. (config-if)# spanning-tree port-priority 1296 }' v& D. C0 B( m6 |3 O1 |1 Y
Ans: B, {2 t0 B- Y& I( P$ f2 }% Y) h/ P& c
# @9 G4 w5 e7 g: L% y4 e) l____________________________________________________________- M6 S: K3 G, @+ X# @. F! f) l7 q% K% t4 t$ o. w# F. ]
27 . A question on EtherChannel misconfiguration.3 C& l; ~2 K' [# z* W
a. PortFast
  i+ X1 [7 z3 I1 V# X( U! ^, L- S3 bb. PAGP
0 S8 ]# a, s0 e" h6 Zc. LACP
2 D! k# U/ u0 h+ O4 C( q  Ed. STP **6 Z* _4 A# v2 }- l' X. [* g" N+ G# {
! r$ V1 @6 e- L  o" DAns: D2 L  |9 U2 c1 t4 O& v* r0 z7 P8 Q8 S
____________________________________________________________
  F0 W* @4 a; {. @; W28. A question on local database for consoling to network devices. (Choose two.). H/ G5 W' g8 d7 d1 x  ?7 p7 h6 Z+ m: T# h4 y3 \2 V
a. Console is a backup authentication method **/ `' M; ^: T- m3 x' ^
$ ?8 u# Z3 z4 s1 Kb. Console is the only backup authentication method
6 p$ y8 Y) |3 kc. You can set user privileged levels **. W8 Y' L7 q( X; r
d. ???8 W. I0 X& o% R6 B" F6 k. O. a
+ ?" O6 |1 w! ]Ans: A & C8 d) h, D5 S9 y
- S% e6 x! O1 `4 D$ Q  G29. Drag and Drop – STP Timers( T: ?: r& Y& F1 z+ }: |
Hello
4 d) O0 S% h$ h7 Q# \- Z– 10 seconds9 Q! |# h3 t% u4 T9 y) d0 |" u  T3 H: Z/ c* W
– new BDPU$ c. a) q' s$ h* T+ L3 [' M
Forward; E7 v, N9 r1 `. s
– 15 seconds
- c9 b9 f1 A- e9 }1 O; o– listening or learning! t4 E$ G0 N+ A& p; h% Y1 A# y7 J! M5 {6 K9 G
Hold0 d; B# O& h; R/ g) g
9 j8 {: x" z" k% C$ M1 [9 l– 20 seconds2 a# P) t3 _! x) |3 e( _! l8 ^3 o
– time when BDPU expires
; P: \1 W/ u# a" ^7 i% O6 y____________________________________________________________
( h$ W+ H6 k8 c; Z* a) m+ _30. Three reasons for err-disable. (Choose three)$ D) V8 K( |7 ?/ F- I
a. storm control **$ Y0 D6 {$ Z1 ^$ T
b. security violation **
, X, F0 G; Z% }! k2 @" rc. configuration ports into EtherChannel. y1 I( Y& [  i/ F0 m
& d1 x$ E+ _, G* w6 V( {7 V) R  G, dd. BPDUguard **8 S; ~+ m/ ~8 v% u% h+ g& z! q& Z2 t: m9 T
e. ???; P% Q4 b; J( M* n8 B- |+ J. r& i1 M
f. ???) C% G% u" {/ S3 y6 X) D
9 r! L7 \4 A0 G; W" R4 bAns: A,B,D/ O/ N% ]- Z) l0 r8 }* G" k  ?# r! B+ V3 K6 b
____________________________________________________________, w" ?/ `3 R. i  S+ O% A" }4 e
/ N5 c0 S: |6 r+ a$ o' I& u% K31. RSPAN what happen after configuration.# d9 r! q1 Y2 F6 t
a. destination port is unusable for normal use **# J! @  w) W+ Y) C; P7 M" ?& u" `8 M9 U' G9 P
b. traffic in network is doubled2 {* ]# v$ w' S# C$ Y8 m1 \% C& v+ l! H$ o1 n2 g
c. ???, {  g4 Z1 _, ?$ B. J. _1 S  V9 K2 A7 o& ^9 ]3 v4 |& b/ i3 p
d. ???- ^/ y8 V4 [2 P# k3 _
Ans: A4 i+ E! @: a) \% ~9 I
) R6 j* u+ f% S: ~& N2 O5 `/ u" O# r____________________________________________________________" F3 r" J: H/ ^% H0 R5 q: {. M* D/ T4 A+ K8 w" P4 v* p
32. A question on local user database for login to network devices. (Choose two.); I& P# R2 x. \& m! |, W
a. Local user dbs can be main and also backup authentication method **: b4 c. o- H7 P, Y$ M, v2 h" e) I. u9 c  @/ E
b. Local user dbs is the only backup authentication method/ \+ T/ Z, q4 u, v& [/ V9 D$ Z3 c2 M) l9 c
c. You can set user privileged levels **
5 y: A7 K5 Q9 I% v0 T+ f6 bd. Local user dbs is used after 3 unsuccessful logins via RADIUS server
9 \  L% n& O+ S# E# L  Z, ne. ???  H! a8 R" N, L& r2 o6 O9 a; E+ e
Ans: A,C9 m) Q, W" y4 u- v
  ~7 J  j+ a7 g9 ~/ W) u____________________________________________________________
$ P) w# [9 ?/ h- @% W33 Which switchport feature will block the packet with unknown MAC address from sending it via port.5 q, B( {/ v+ v. n7 U( `- p6 `! `; {1 p
a. switchport protect8 ~' v( f$ B1 {6 U" G7 C! N3 _, V; U8 Z5 _6 A
b. switchport block unicast **3 x, h8 H& E( f# Z
2 r8 i) Y/ F- }c. switchport portfast$ L" q+ E. w; L& S% |
d. packet with unknown MAC will be dropped4 R' N5 Y' H  V3 }
Ans: B# ?# }5 c  K6 ^" K0 w: u2 L- t% I
____________________________________________________________. D$ Z# o; f, t7 a9 C& n/ J0 h% |" @" h) z; l- c
34. What are the two ways to configure loop guard?
4 Q9 S: g" Y! Ea. (config)# spanning-tree loopguard default **$ s4 \4 F- o! o; H) X. w- r2 L& s5 w% @, K2 m
b. (config-if)# spanning-tree guard loop **2 R* |4 w8 ?% B( x* @( C
c. ???& E* k9 P2 C  R- J- \9 ?+ g
d. ???
( V' ?: }2 l+ j3 g# e9 L4 q9 S( \' Me. ???/ K* C, n5 k/ W3 t2 n& v3 j
. J* |! i) c5 f. T( z! RAns: A,B( b3 `3 S: ]4 ]1 Y: k* T7 F$ E/ U/ }- z8 v5 {. `0 V
____________________________________________________________8 a" U7 X$ J% X% `4 Q
% a: S$ M' `5 @; F. Q( Z8 x$ I0 Q35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
* O+ Q  A+ v8 J- x% ]2 H7 x: va. Intercept **
4 j* e7 B' l  n% Xb. Drops **; O9 \% ?8 ~: s8 D3 B7 U1 u
c. Log **
/ _# l" r  G/ B% Gd. ???- {# V; c7 l1 A. Z
e. ???3 \" }- J. k/ J8 ^
Ans: A,B,C; e: ?$ w$ P1 A: b; w3 z" m# x
( V, ?2 c$ T$ [- r) o____________________________________________________________
# N, {0 l  O1 p  ~4 P" j3 T36. Question about what are RADIUS server responses. (Choose three)* g. |- e& G: T$ o/ j. {9 T8 p! t1 t" x( w: V* X
a. Accept **
# D. b0 u* m+ \; d2 P$ {$ Mb. Reject **: j2 H/ U' i; ]  r
c. Challenge **5 H5 S  B+ B% ^' w3 `  `, q5 P) b7 Y2 H7 ?# n3 C2 e9 m- Y5 g
d. Get Password
, E) z# j/ V1 W' S6 v, }/ q- be. Cancel/ G8 H* f, z* r. t3 ^" }' W' e: c# W4 f% X7 I: U+ o
f. ???8 C8 w: ^( w$ E9 k0 p# W$ m( \( U: r) x- Y  v5 F' g
Ans: A,B,C; R9 ~( o$ J2 R* t1 `

) U0 n( a6 ~7 M9 F* R$ K, A0 V3 r2 ?/ B" V  M3 t6 _9 b4 s  {! P3 a2 P- N" g) n. r
5 u/ ?! t+ w( V# E9 ^! `+ ^% O& t. }* ~8 i! w! L$ R
4 o' H. V& z' z! n4 C3 v
37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
$ Y( P) S" R! E- Q/ za. Drop0 p% {2 k; h" y/ |6 R( f/ h( a  [6 i2 k: k" u; n4 W
b. Remove 82 and forward **. y, A7 ~& `, v7 S& Z8 S
c. Proxy ARP8 Z7 d2 b  V% P6 T6 R8 a; M$ Q4 ?- n) h, G0 t' y
d. ???& [- ^* S5 v' `0 A7 `" u
5 Q  @% A" g! Z' GAns: B5 E4 J. T* ?% q1 y% ^, I
____________________________________________________________6 P% w5 g0 k0 j
8 x( n4 l9 K( E% {38  Option 82 question with two choices. (Choose two.)
; ~& ?( k) z  x2 ]+ Ra. Layer 2 ingress **0 m3 N1 Z$ y. D! X# H
  V5 E7 _7 T! E& z" Pb. Layer 3 egress **
; i( j* E: e; K$ ?% @c. ???# D4 z! c5 }) P& s6 R5 p& f  n: _
& K# O+ i% u6 \( f1 _& ld. ???
1 y! j4 s8 i1 T+ b1 X. Q) cAns: A,B
; ^* ~$ ^) z- M____________________________________________________________/ M# B+ `7 F  [& l) J
& K' W: C* x/ _; H6 A7 s& \39 . Drag and Drop – Port Priority/Switch Priority/Path Cost8 o  f; T( r; V# \5 E2 K$ m4 m: b' H- s
Port Priority% \0 p$ _/ ]& h5 }' R1 }# s6 n) L- P3 X! A3 \
– By default port priority is 128" {1 Z! g2 a- H2 b* I* Y0 \, L
/ k  W3 H7 t$ y– Lower port priority most preferred path to root+ q5 i6 R1 ~+ x/ I+ d) Y8 R
– Value from 0-240' [: O+ N6 G. v
– Multiple of 16 <—– this was there7 x7 d' l2 n; C9 p+ }* q' e8 w
, w- |$ E/ ^0 l0 a$ N) ~' k" wSwitch Priority( H7 u5 r, r. z7 ~5 R; b2 C
9 u. X1 Z% m9 X– Lower priority is better to be root bridge* P; f+ [7 b3 Y3 ^6 v# |; ]
/ }, d% I; u: P# n* _/ z– Multiple of 4069 <—– this was there# o! G1 _: p9 I% m- x3 G
– Lower bridge priority is root bridge
6 P9 c3 x$ w4 G9 T! H, pPath Cost
' P5 D8 x$ k" \* X/ [7 b8 j– Cost depends of link bandwidth <—– this was there8 q6 ^  d' z3 \& U8 r1 u# `% z
/ N. V1 L, H3 _4 @5 H; ?– Lower cost value is better <—– this was there but it can be draged to any of them; ]& P. {6 r* T6 x2 H$ n
– If you change the cost on an interface of SW1 then only SW1 will learn the change
/ a. \$ v3 K8 Q$ U8 ?. A0 q– Short range — The range is from 1 to 65536.
6 R5 z. l" e- [– Long range — The range is from 1 to 200,000,000.( D; ~" e! `9 {) K' a; Z' K
1 ^; }$ Y3 Y, E! o4 U& `5 O____________________________________________________________8 N- g' R6 P0 a& n0 z
( |$ E/ X: W: G5 V8 D8 F40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)
' P' p& b: R) ?3 i9 D" g$ J* m1 a  da. deletes% m; p: s$ ~# v$ K; g9 p9 u2 B
; U8 {( H4 ?6 F, |& N) n* A5 }, Hb. logs **' N! q/ L6 {) x2 i4 `$ E, m! J1 i6 M
" a; Q# n+ l: b: f% c& cc. accepts" `' }) v9 n1 _' A
d. intercepts **( k2 t, M/ K! L9 [7 x
6 u1 q% o! _$ A8 X. C) T. ee. discards **
, J& J$ \" Y$ q" W: `f. bypasses
/ }) d2 t5 W; B: |! C% XAns: B,D,E* ]" R% F, q- g6 s
; q5 ?& i5 [5 j  [& N( Z) c____________________________________________________________
8 t5 V1 m  Z& f6 W: b8 Q41 . Which three features can be optimized by using SDM templates? (Choose three.): H; c& j7 c( F6 ~7 F
% a  s1 W% v5 Y( U, N2 Ha. port security
! Z" k5 [: g5 Sb. trunk3 x% c% I% W  Z9 i, A
0 p  D8 B' ]3 P' Z% {" Cc. VLAN **& b( u0 O0 a! @" i0 h9 `: K& Z8 c$ ?2 b7 z4 N
d. access **" i, X4 s5 N  o
e. DHCP snooping
6 D+ t) c2 O' E( ?# @f. routing **; h0 `# r, ]1 _% [1 c2 L  U1 }8 B6 M, e' B
Ans: C,D,F3 T; p5 k' w# m/ f3 j6 {
____________________________________________________________9 ~. Y# a5 J* g! i7 |' R" v
42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
5 E8 j; B, ^; b  |a. destination-MAC
. O0 F$ @  u: R3 `. M' \b. dest-source-MAC8 Q$ ]% }! I* h6 }1 `" U" z
! B) ]7 o1 I6 I/ l  f5 h$ xc. destination-IP& [3 I& I; b* T9 u6 D# p( w! E' ]. \! E1 E
d. source-MAC **$ I: z" I0 q) d. a% l+ s* |
4 J, L7 v% A+ o6 U3 Ce. source-IP **
3 S7 w6 L# u2 P8 S$ {" x$ G, SAns: D,E* b: I2 J8 X; K" s6 T& v
____________________________________________________________
- \4 n  z3 M3 ^# W2 O% K43  Which command is used to verify trunk native VLANs?0 y. t" B( |3 C5 l" d4 D# F* j
9 `4 N! A" ?; Q4 U/ {8 s+ r* Y+ Ma. show access ports
& `4 w) K9 i; ^7 }b. show interfaces trunk **0 i# w7 h  d# ?3 Q3 U/ P3 d# Y- H3 f# P
c. ???1 @1 X. A, x3 u" s
0 f: X$ h- {% bd. ???
" m/ a! T! M- f5 O! q& PAns: B
( s5 U5 |; j" J____________________________________________________________% i; p8 r$ r) S. @5 x! |$ u2 Z7 J( B
44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)! _6 b$ A# m8 ?! T7 e* ^: V8 O
a. spanning-tree vlan 10 root primary **) ?2 B9 @) P0 [' C( ?
6 \- U2 J' F' W, bb. spanning-tree vlan 10 priority 4096 **
" \% S( F; H) x& Hc. ???  _+ O& n: q* b& S5 w, A$ w( E) I) C* ~4 D9 }! d1 H
d. ???+ _) Y: A6 U. B, p, j0 i) ]: B. [  c( Q+ `$ G7 g* t) s, M
e. ???5 `4 Q3 S- P# P6 X  k
7 T+ S: f% o( @8 ~4 vf. ???
: ?0 i+ ?2 \+ q/ aAns: A,B, D/ g; S1 V" G% s, z4 ?1 Z9 V6 z* v. x  P% N
____________________________________________________________7 j- Z2 `7 \7 S: [
# v, ?& m9 l0 b45. Which information does CDP supply from connected devices? (Choose three.)3 V5 e& A: |0 t0 E- ^4 F9 ?* J: }; n* S; z$ ^
a. Hardware Platform **/ q: m3 T1 f8 h. m' U4 a9 \
3 C. I. P  I9 A% \% c0 cb. Interface ID **" g. Z. s. B$ u; B: C. o
c. Hostname **4 E4 v: ~  q: C+ k2 R4 U# z
d. Config Register3 m% j& D' K' p9 V0 I8 B
5 T6 a. X" E, t! r7 y# P% G. QAns: A,B,C
2 ^: m9 Q2 f6 c  r3 K) R____________________________________________________________5 g8 J' ^  P# Y
7 f6 Q7 \2 H: G1 `- L, _. \5 L
) j3 I) r! w  X( {0 l* ?* i0 f, X0 `( X( v' L9 g) m: t8 [" z2 t4 S& Q$ J# X/ ?
46  Question about voice VLAN.
( f, A% D( n3 m! Y- \- }a. Disabled by default **8 S6 k- S( Q* H. X1 e% L
b. Enters on untrusted port: b3 v2 n) g. c5 k
  ?1 F3 T. V' O/ y+ L. f) k  I& ^c. Default CoS value of 5 for untagged….. **! J# v# A4 z7 w0 V7 O) |8 }5 h+ D
3 l" W9 C, W9 x* u* z) jd. Needs manual enable of portfast.. D, ?* C( n& x& W3 ]" x
Ans: A,C6 e& @/ \7 G/ O8 G1 {8 S0 l+ z8 w# M* U5 G2 k! i, B, ?' j
____________________________________________________________, K. h0 G8 _1 C/ ?- L: v6 H  W4 P9 \. R5 b
47 . Question about UDLD aggressive. (Choose two.)- S0 s  f* A4 B) T% D8 o0 v$ u0 W4 i- B0 V
a. UDLD messages are sent every 15 seconds. **
3 _( q# a* A4 u/ Kb. UDLD tries to reestablish link once before declaring the link down.
% n8 g1 x9 A$ }% Kc. When unidirectional fail is detected, port state is determined by spanning tree.. x2 d" g1 L2 g4 p
- A2 O0 s# F9 i: V, z$ j2 Pd. When unidirectional fail is detected, port is turned to errdisable. **/ [4 V/ S& l) g' ^" N
e. UDLD sends messages four times the message interval by default.2 b, C; X, H9 S. q. M3 n9 N
f. UDLD automatically … message interval based on configured timers.! U' r3 s$ z) D7 }4 C$ X
Ans: A,D
! T( |: [" L# j( F* k  M$ x____________________________________________________________
# ~5 p9 F$ P* ?" f8 Y7 x5 s" t48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2." R0 m# p( b9 J* k: P
; @9 Q5 Y0 k) T3 X$ V5 h# EQuestion is how to make DSW1 the primary root for VLAN 10. (Choose two.)/ L$ \, K8 {1 d$ Q/ i, m0 R! K% [( ~; C
3 H% D' {2 S+ ]4 Sa. DSW2: change bridge priority to 61440 (highest). **
7 x3 T3 M9 l. g* H4 k3 w3 k! ub. DSW1: change bridge priority to 4096 (lowest). **' Y* `7 L% T$ P) x4 l* `6 ]: U
7 ?  z; ]; _- T8 ]c. DSW1: change port priority but in global configuration mode.6 W$ z, b/ A1 b
% e$ c% S8 ]  J' J5 H" [! td. DSW1: change bridge priority but value is 0.0 Z1 L: L! F/ B, s- n2 j7 G" p6 k4 m* J" B5 u
e. DSW1: change bridge priority but command is priority root.& o' m9 a+ x8 k/ a4 J" p: K+ T  ~' W# x
Ans: A,B
. \7 H. T- J) a( m3 h. K____________________________________________________________+ k: o/ U7 J6 d3 C7 T: r3 u4 j: {* k0 t" x% d8 `' }
49 . How to configure dynamic ARP inspection on a VLAN?$ |. p3 s* p1 s) f
a. (config-if)# ip arp inspection vlan
# {# E- K5 o0 k4 l, I$ z- a/ Fb. ???
7 V& Z  ~/ Q( h7 y9 `* ^9 sc. ???
* Z; l% Q1 V# S: V" yd. ???( E7 O& T7 D6 S2 l) A: n# H8 p4 m9 i# l5 f
Ans: A
8 y1 |) _( u( K____________________________________________________________+ k2 G7 b, o8 b0 I8 R+ q& {, d2 m7 U# R& s7 H! y" j
50. Drag and Drop – Port Priorities% p6 |/ N4 k% F+ \* {+ @
Port Cost: A0 e, _4 L3 |' r0 j/ T1 n
– 8 default is being the interface value" O- A% n9 c2 u& F2 ]0 _
* v1 x4 V  ?2 w% R+ m/ ^– range 1 – 200k (200,000)
0 m5 X( W& c. o) X6 c, BSwitch Port Priority) f: N$ u  P+ Z9 w- O* V4 W
– default value is 128
$ c! ~, N7 S* i" P/ W% d9 C  e– multiple of 16  Z! M( T# R) d$ b" h  P4 g& l( b' n- K; d# Y0 E
Switch Priority0 O: w) ?3 y( L+ j) u
– lower the better) g' O* a0 B+ Z
( J' E3 v4 @( a  C+ z1 L– multiple of 40968 U" y7 W0 w, J; a! t% Q& S
ldq_china,如果您要查看本帖隐藏内容请回复
, g9 O9 y! b) s3 t5 L, r% g" z_________________________________________________________# `8 ]* z; r3 M/ \2 d2 M* p
96. A question about the priority of a Stackwise switch.7 C% m* g* w* q- Z
(CONCEPT ONLY)6 G; [; B2 v7 \* \6 d! v2 C9 @# p5 N; w0 d1 f7 J& y
a. Master member is selected based on member’s priority. **# o2 T1 X9 I" d/ b% T
b. ???* D2 R8 d, h2 r8 `7 K8 t3 t' [  i3 x+ p' K7 M
c. ???
# H* O! h6 i8 N0 z# Q9 B* P8 b5 M3 ]d. ???7 m+ J: I8 I' a
Ans: A8 l& ^, Y. ?; @3 L: a7 W6 v/ R' W0 Q6 `- y
' A+ v: M: m% K7 r, ?5 e2 U; }4 ?, @- y+ O8 K* B7 Z$ D4 i
97. What is the benefit of UDLD?* X5 J7 R* H: n, q- L4 ?9 z/ P/ u" E. p7 p- l; ~
a. provides backup for fiber6 H4 @0 J8 k* E! j
b. help in preventing loops **. y1 P2 h% ]6 |7 Y9 j" Z6 j) d, {. i+ A( j8 a% G) p
c. removes loops( y- I6 C. L  ]& Q5 d7 z! N* r
d. determines switch path# @. B1 N; B4 D! q3 q8 C% p
* I7 s2 r- S! ~( \Ans: B) b: T# J+ }3 C* ?
4 e* L& @; W0 j( p+ x____________________________________________________________
1 m7 @$ Q5 i5 \5 |98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?7 u& A6 O9 p: m; i7 {& J
1 T( A( v( \  G6 S& c(There’s an exhibit that shows f0/7 receive BPDU.)$ [, `3 c; d" @1 H/ R% j) ^
a. We have to configure shutdown and no shutdown.! q' ?9 z, c( X. V4 [- p- N  \+ ^
b. Have to use errdisable recovery.
& @9 s1 H4 N3 z+ \% X5 ?c. ???' x' H; E; ^1 C5 F; U% f9 N) r: G2 w* |6 W
d. ???- K* A' x4 q5 @
Ans: A
& w* K7 f' }5 J拖图题汇总:
8 t3 L; [2 t4 v8 D- `- G1 Q8 M1.        CDP / LLDP
( e5 B% {4 o9 {' b% ]6 vCDP
& z' o$ _* @4 L5 R; R&#8226;        Default time between protocol frames is 60 seconds% m  |0 D5 Q# H- _
&#8226;        Supports IEEE 802.2 and 802.3 encapsulation% @0 V+ q! g0 n' D6 i2 H' G. C7 M) B+ l
&#8226;        Uses multicast address 0100.0ccc.cccc( |/ a, m! N( u3 K) Y2 z- J' \
LLDP! {6 S1 z0 M' B' g. u- }  |' i* [+ U5 [6 l2 F
&#8226;        Default time between protocol frames is 30 seconds: a; e! }7 _0 q9 a& L6 q$ Y# S7 e3 V0 E* N
&#8226;        Sends topology change notification
* H& y- {, J: g( p+ K  w&#8226;        Uses multicast address 01-80-C2-00-00-0E+ C# i* E0 d6 f& k3 [! Y& S2 I2 Y" @( L( ]+ @9 z# l7 v) Y' T! w
==========================================================6 |: r8 q  z/ f1 F( O8 z7 n
. l) D# I7 a1 A: U* A1 [7 T3 Y2.        BPDU Filter / BPDU Guard / PortFast
& `' A9 A3 O: J, q% m3 K1 R2 bBPDU Filter
  B9 S9 G: w% E&#8226;        Disables Spanning Tree on a configured interface0 V. a2 c; x9 A/ r2 c% n
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames# M7 u/ X" L$ i# v% X- P# G2 \6 Y1 P! K0 [* Z% A- _/ m1 Z. I
BPDU Guard- _' U6 g/ z  u' e& \# M' O
& K9 ^* Y, K* Z' j; r3 `6 R&#8226;        Protects configured interface from receiving unauthorised BPDU frames. z( q, Q+ g4 m6 `$ E1 _0 W' ^0 z( b" ?) E6 }7 K- U
&#8226;        Shuts down port and places it in err-disabled mode3 s; s' W! P7 w8 ~: P
PortFast( l0 i4 ~" b  [- t5 v' F/ F$ X3 b
&#8226;        Configured on access ports with a single host device
7 {0 D7 N* Z; J1 O" Y5 ~&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state
* i7 f0 M* S0 E# e2 Y7 l==========================================================( x* a9 \; v# c2 t  ^) P) q0 d0 e
4 Y" C2 p+ D+ |8 ~3.        MSTP / PVST+ / Rapid-PVST+/ D! `: n) P/ I; K- Z9 b$ L! h7 ^1 p4 X0 `! [
MSTP4 c+ j  D: @  D7 w9 m3 B9 z
&#8226;        Based on 802.1S7 v+ e' B- X0 b# B' g6 B3 C+ j
- X$ Z& F* F1 L: p5 G# P) ~8 v&#8226;        Maps VLANs to instances  u/ d, H+ \" R( r1 L# f; ~( g4 H/ Y# \- w
PVST+
" I: f7 Y4 Q5 B9 \&#8226;        Based on IEEE 802.1D% d  p4 U- @3 ]3 ]# D
  U& v# T$ Z4 p8 t4 u- l# p7 m* P&#8226;        Default STP mode8 [  Q/ Z6 {* z3 L$ O
5 V9 j/ A4 G- V" o6 S( tRapid-PVST+  g; O; ?/ V" [
# ]8 P& x% Y2 B  W  }6 d&#8226;        Based on IEEE 802.1W  p* u! g# _( }) W& ]- \
9 e# @3 |# }) S6 z$ l" \" P$ [&#8226;        Discarding port state
; L5 d# M4 j- i, q. G: m==========================================================+ k" p: r0 k$ I/ \8 H, H
& c& P  b$ s* `4 S4.        Forward / Hello / Hold$ Z0 K" J" L& Q; F( K
Forward; R. N, V; C  b5 F* L$ U- Z, e0 e3 t3 G$ @/ ?' f/ `6 C3 \  ]
&#8226;        15 seconds& _- `! @; ]! L/ F( R/ F! {. Q  u$ I, i; ]2 u
&#8226;        Listening or learning* J7 u4 \+ ~# X" l% s" H
* `! p7 U+ [( [$ Q/ E9 KHello  Y8 ]8 [& [* T: T2 i$ g! B8 @# q1 w( O6 [( n
&#8226;        10 seconds5 \% K$ h, |% E' i/ P$ B- D! U: P+ d3 }  _7 R8 w9 E* H" K
&#8226;        New BPDU
" t1 L6 R/ P3 cHold- E. u6 {1 L; x2 A- F$ D: F4 {2 ~8 T  R# y, Y
&#8226;        20 seconds
6 [+ C! ?  |  N8 C% p; }" a&#8226;        Time when BPDU expires
/ l7 p; R- [6 t==========================================================' ]$ I( j8 e! K4 H3 X+ D( S/ _
& H/ |+ q% f3 d1 P+ O. y# Q. y3 ~5.        Port Cost / Switch Port Priority / Switch Priority6 U9 Q" K- M5 Q0 h1 f3 W* v7 K2 S+ f" n- V! i7 k
Port Cost+ r, `9 t! T. e  B& t! Q
&#8226;        8 default is being the interface value9 v3 Q5 D6 N' N9 ]! d- I& `4 q' u( J! `9 [' ?+ ~5 c' H. N
&#8226;        Range 1 – 200k (200,000)' o2 \3 Q# Z+ f3 i* u/ s2 Y- r( p, v, p: D
Switch Port Priority" ?/ U! k- A, e; l( ^" D/ [6 H4 B/ S: y( j" S1 \2 ~: R# P
&#8226;        Default value is 128
+ D9 u4 X! \/ z. K5 r, j+ W&#8226;        Multiple of 16
1 z+ [) t& e' E# F7 N3 ~6 p; |Switch Priority+ Q: f% Y/ z$ K9 v7 b/ c* ]; x  [- P$ j) K( P( _% Y' L
&#8226;        Lower the better
) A( I$ c& x2 I6 J7 c# x/ b&#8226;        Multiple of 4096: b! x$ T* p! M  ?5 C) M) W  S! ^" g
==========================================================' R$ N& v: ?9 E: W8 ]
6.        Guard Loop / Guard Root
8 P( `  ?5 q8 l2 {9 [8 \7 U8 |  kGuard Loop/ k" @5 b, Y8 ]2 ?0 D
&#8226;        Detecting unidirectional switching links% C6 A+ \6 V1 o+ `4 @
+ c- x3 c! s6 o! I6 S&#8226;        Port self-recovery' a4 h. f3 y) h6 ^% L6 j7 x3 B1 Z3 K+ D. `
Guard Root; C5 @4 F: o, v( f/ Q
! s, P$ U6 }% u: S0 F4 z6 [&#8226;        A better BPDU disables the port as err-disabled) x$ R6 u3 q! {( J$ L% f* ~& X
&#8226;        Protect designated port from recei
回复 支持 反对

使用道具 举报

发表于 2017-6-3 21:28:55 | 显示全部楼层
CCNP交换(300-115)考试新题汇总(5月24日更新)
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-8-23 02:49 , Processed in 0.054246 second(s), 17 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表