设为首页收藏本站language 语言切换
楼主: 小乔
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(5月24日更新)

  [复制链接]
发表于 2017-6-1 13:47:26 | 显示全部楼层
非常感谢楼主分享
回复 支持 反对

使用道具 举报

发表于 2017-6-1 15:43:48 | 显示全部楼层
11111111111111111111111111
回复 支持 反对

使用道具 举报

发表于 2017-6-2 09:01:52 | 显示全部楼层

5 z6 H$ ~4 q, _$ h- k3 Q2 O非常感谢楼主分享新题,
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:37:04 | 显示全部楼层
謝謝 對我很有幫助
回复 支持 反对

使用道具 举报

发表于 2017-6-2 17:38:17 | 显示全部楼层
6666666666
回复 支持 反对

使用道具 举报

发表于 2017-6-2 20:15:00 | 显示全部楼层
推推推推推
回复 支持 反对

使用道具 举报

发表于 2017-6-2 21:11:27 | 显示全部楼层
1. What is the Ethernet frame size for 802.1Q?4 P& @+ }4 A, j! c
a. 640 a3 U9 S7 O" o5 p
b. 128% r. {" o- L4 B
$ C0 l1 D* @. p$ |+ ^& n6 j3 Uc. 1518, T4 V, S" B5 m' v  d( v& ]# X! I
" ?" d5 H/ N3 O% n+ S; T; ~d. 1522 **3 A/ H) |7 p+ I: Z/ [0 F6 I6 I6 E3 d2 P3 g0 p! m- X  Q) c  W, Y: ?
Ans: D! T: v- a' K/ D" ~, R7 C
9 @; t% V- ~1 g' Y( w0 H  O0 }/ T1 F————————————————————————————————————————————————————————————% x2 D3 i1 {% M
. ]9 h" U: n# x* @* n2. How will the traffic reach the core switch from AS switch to DS core switch?
. n/ d0 N9 I' P1 e; n(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)
- y5 @# Y+ {! e( N  z  O2 Ta. ASW1 to DWS1 to core" |& U& h: U( s" P  P
" E/ o$ B; l% A4 ], a' @1 ib. ASW1 to DWS2 to core **! G) k: j; p7 i, q5 G. \, N
c. ???
3 q8 `! M( N$ H% V- l% ]; c: L; Vd. ???9 G( v6 J/ w1 B0 w) |- c* H9 b
9 w- d& B# ^6 ?Ans: B
1 ~9 S8 ?( i0 }% G# L& c1 O% g4 [————————————————————————————————————————————————————————————# q& M0 M% [6 K$ k9 p7 m- V9 E0 T3 X( r2 r; g; v
3. If HSRP group number is 45 what would be the MAC address?7 e  f# O2 Y3 W# Y# ^/ m& s
(Basically conversion of digit to hexadecimal with group of 16.), f1 A4 s8 p$ f
a. 00-00-0c-07-ac-2D
1 b# }* O/ P7 Pb. ???& y+ ^' j# y# Z: I5 l0 h, D
c. ???7 j" n; L6 `4 ~0 _, k
+ n$ S* |9 V+ x$ `, [d. ???1 T, R% o" e9 f1 h2 }; j5 p# |2 `+ [* z2 y, F7 g
Ans: A2 M+ A' l5 F% O3 M! ]3 z" v0 {# l7 G0 ^( M% Z2 R0 y
Explanation:4 e1 T% S) S* j" c  i4 M: u4 y: z- C; A, t# e$ y& i/ R0 h
00-00-0c- 07-ac-2D1 E+ L' Q% e6 O1 f- ?/ X# z6 D, ^% |' {5 S9 c$ v$ n; @
CISCO_ID :HSRP_ID:GROUP_ID% N1 \" l& e0 i" K5 X  y3 F( x
2d=458 r) M. P$ G8 k0 t/ g# O
————————————————————————————————————————————————————————————* _8 {( [$ _6 P2 @. ]4 `) j
4 A question on EtherChannel misconfiguration…….3 y: }) c# ?  @3 A
! R% ]1 E6 E* [$ {a. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **
. x; J6 N. }6 g0 S2 ~b. ???/ J9 {" l+ U5 L2 W; r( c9 M2 m0 K; c2 L: Q( N
c. ???
% H# O' C% V# x7 J8 u1 jd. ???! d% U% N2 x0 m# a; @
Ans: A7 o$ P, J3 n; W  V; j1 I7 r- ]' D" k( W! U- r- c+ Y
————————————————————————————————————————————————————————————' n; F3 v7 ~# L1 J
5. Select a valid VRRP configuration from a list of possible configurations.. r$ h! ~; u9 W) _. f7 @0 G1 E* B& \2 U" Q" w" `. ?) q7 [; H' [
a. vrrp [group-number] ip [ip-address] **0 M$ N: h2 K  v  ]' j
  J% T8 s1 t- E& @2 u/ @" vb. vrrp [group-number] priority [priority] **# |: {9 o7 u. M0 B7 }/ m
c. vrrp [group-number] preempt **
0 Z- Z  K/ x! b3 ?2 q0 y" Jd. ???7 K  ~( |- S' W3 [* F. s, j  l  k6 {; H/ [
e. ???# B; _" c$ K: ]
Ans: A,B,C
( @) @7 z) Q' t/ a1 LExplanation:" r. O: ?( {2 d: U- R, f1 u" b. u. t
You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones., I& j  ~+ W1 j9 p
6 {( W) v1 f2 f7 r/ r————————————————————————————————————————————————————————————% X4 _! }% v- a! |- ^$ ^
6. Private VLANs (PVLANs) have two secondary VLAN types.2 V, y7 x6 s  C. G, a
a. community **4 o& E) F5 c% M" ^/ p/ ^
$ m; m$ |% g+ J6 ]b. isolated **
" w, Q; T0 A4 E! j5 b% ?8 l- lc. ???
' n* [/ @* g# @' g, {d. ???
" K5 R8 m! s4 w/ y& t! Ve. ???) Q4 a6 Z* W% H. N/ b9 }
1 p/ ~: l) F! Q6 UAns: A,B" Z. X0 n+ k. C% C
____________________________________________________________
; G* y0 P' L+ p$ E- a& f7. What types of SDM templates you can use in switch? (Choose three)) g% d1 H  o+ H5 B$ g7 M! ]; f8 Q" ~8 [
a. Access **- @3 r* E7 L, g8 G* c& b$ {" b: v/ u  `( q# `& [
b. Default **0 z  i  r8 ?9 |! b6 X* t" F
" G/ V9 X- R$ y" Q, Bc. Routing **# e5 r3 K  X7 v9 _
$ T/ v" U0 x9 V- Hd. VLANs **
2 a( d4 k+ C9 y$ c& ue. ???8 c3 N# u9 m) ^7 _$ \9 |) }! @6 E
# o# |* ~/ Z5 D, ]f. ???4 M- B! m, f" a) O: m1 u
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)
0 w, w; r, H8 h- G; ~& tExplanation:6 a& J( `( K/ w+ Z3 @+ v
3 J5 W3 N3 Q1 \0 E$ _$ S7 z+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.7 |# X; m  a+ ]3 I& J
( e0 I# ?; f( F  H9 `- A5 p+ Default – The default template gives balance to all functions.8 y! e' A8 [9 _# f: k" g
0 j% u6 {1 ?/ ~9 ~4 r+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network., W' {' ]0 N0 O- k6 d- B$ _9 d* J+ ]: S3 h$ z; K2 p: o5 F
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch.! w, }. u" b0 |& V+ k5 u$ \$ }' U8 u1 Y" c: }, a$ ~
____________________________________________________________
* K: L# v8 ]( P) \" B; l# n% A# h8. EtherChannel – what is the process to configure EtherChannel.. T" }/ Q) E: T) w
4 q7 ~2 t. K! ~2 b+ w+ m7 T2 L, Sa. shutdown both interface ports **; U( r3 `! d: s! O2 P3 X" A  I
b. shutdown the interface on one side only0 `% p# b7 O- T# \
# M: X) D3 R- ^( ?6 V- _c. ???; G* s, C3 C2 n
8 [. T# F. L8 P4 h) y1 }, ld. ???5 f: Q, k9 }" l2 z1 }; ]) k8 C! }
Ans: A; e. [1 T. y& d; y& P6 T0 N) R8 r, v$ y9 Y6 A
____________________________________________________________) o$ y9 O/ y2 j& M( z; u) A- @8 m. `! ]2 g4 Z
9. A question about spanning-tree port-priority.: k, a- u. G- C/ h1 c- y2 e+ h
7 B+ I( b$ P( @7 ?) v. h, I# Ma. 127 **
- H. o5 a' u& L4 l6 ob. 129$ b; m+ x( ]- N) t, j1 S/ e  L  z; l
c. ???4 P3 E- q0 T, H8 }" I7 u2 M* ~+ d$ o( R5 Y
d. ???1 A- q' b, j- w3 ], U4 i' K+ `: T7 R2 \8 r) C8 `
Ans: A
+ D6 Z' p0 B! s+ B6 M5 y2 w____________________________________________________________! K! H" S1 h) k6 G
10. Question about EtherChannel based on STP EtherChannel misconfig……: F& F; @; r$ E8 r3 @  Z
9 @& s* f! S2 d) M2 ia. (config)# spanning-tree etherchannel guard misconfig **
* `$ ~' O" L3 Q: pb. (config-if)# spanning-tree etherchannel guard misconfig% D5 x! V" `4 s6 ]9 N+ x
+ O: S+ L- H) `% |  r" g- q' Oc. ???
& O% r: Q% O& }# N# l! w+ ad. ???- u0 P& H$ o- g
: N( P* H/ a* k5 VAns: A
7 B  B' T" x# O" D________________________' `- F1 ^* j: `5 {9 b2 c) b4 z6 F# w

/ \6 Z& {: m& l3 v6 X& B, K3 v& r9 G5 m7 E; j. m
___________________________________
( `6 r, X9 Y1 |. U. B11. If HSRP group number is 37, what would be the MAC address?: z0 a  C; U% x  {! O2 V4 Q
7 f" ^9 R. k" H% A1 [& na. 00-00-0c-07-ac-25: ^0 S; X; [5 q  w6 E
- X1 U. `  Y( Zb. ???" y; E# m" n% T7 I, C& K3 ]
( a4 x/ b5 K+ @3 E+ h' y/ d! Ic. ???' u! o- C' J7 o2 p  K: }- r( x; |' H: ]+ d9 p; [7 F1 v
d. ???3 f/ R3 l# [$ Z
Ans: A! ~* k3 k8 O) V& l, K
0 ^- v+ n9 \( d; S____________________________________________________________3 Z* N8 y0 h7 b8 W: _
12. What is the default value for spanning-tree port-priority?) L0 U' f2 {, _2 a6 v7 i7 a/ P- t
. X3 L+ W( q' l4 ja. 128( s. O+ U* S$ [
3 |# |9 H" X% t9 V" F( pb. ???$ b' t  Q2 V' B  D6 T9 }/ @+ V8 |, L3 N5 R/ K
c. ???; D9 O1 y) r1 F% a! D) U
4 q7 j3 Q+ M" s  u+ z$ [9 E$ k; n. yd. ???) M7 j0 p8 P/ B# p& `5 T
  n: q- C4 l+ @# ~2 H7 tAns: A; w/ G+ a2 J, B4 T! a' E
( l6 |& L4 \. [! v# P1 N9 h7 m____________________________________________________________! m$ u6 w3 F- l/ p& i
7 C! M& m6 _) o5 n4 ?* ?13. Which information does CDP supply from connected devices?
! p/ V8 o# f4 M+ Qa. hardware platform, interface ID, hostname
' x, }& l& S$ f8 Ib. ???. Q0 J% w& g7 ]9 Y
c. ???: P( @- s$ b  N+ e* @6 T- K5 ?, O  ~+ y0 X3 ^7 T  ~6 Y
d. ???
9 y: I- v$ w4 C- s, B9 X3 ^- SAns: A# m- r" q( T* p7 L7 m
____________________________________________________________
7 P) f# s7 t; r. `- C, {" [  U14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?, j: s# a8 L$ K! `2 L! r  C9 C
. c7 E% l6 }/ e- U: ga. errdisabled; u5 E5 U/ d# y- T$ w$ D; D$ [) w
b. shutdown$ ?4 W3 ?, |( H
+ z. N7 N8 Z6 d; E+ n0 tc. ???5 \, q4 E( a* {5 c$ D" e
! p( d1 v% s7 |. t7 H  @2 id. ???
1 q2 ?. ^6 U# O9 gAns: A# Q4 _9 B) G9 H0 ^' w# F1 V4 H( ?$ r9 L2 L3 t8 l7 ]
____________________________________________________________& }6 c# A- _9 E0 z' x- Z
; E5 R; I, q! `2 R+ E7 w8 |, i; Q( O15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?
& Z* l2 W! |) O9 R( p, da. isolated6 T; N- b, u: K+ y! ?: T4 C2 A
+ Q5 v4 `* f* o2 \b. promiscuous! @4 y3 i( g: f3 x( ^
c. ???
2 J# c) ~9 v7 R/ k& s  p, a5 _% ud. ???- j. L- C% f; R1 ?. O) i+ W/ W$ U" U9 ]8 p+ V+ e  f1 Z
Ans: B6 p/ g3 z0 B; P9 K
____________________________________________________________# J8 I* b$ ^2 `5 D& p
- t" P+ Y5 Y6 A: B* @16. A question with an exhibit./ k8 m5 y3 |3 y0 S3 k5 q$ Q8 @1 K6 X+ W
There are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.$ {/ s2 a4 p* C  q' F: @! E( @/ S
a. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.7 s5 B2 W1 B' _- V' O# t+ [
b. ???$ @( r! z; t' D( T1 P3 U
+ }* b$ I0 v1 Y( x9 T: Yc. ???# U/ |0 z6 o% A# F8 [  Q6 `# p7 X; G- H6 B  U- E
d. ???, Q( C, t) E8 v" L5 s" N+ V& k, y. L! r' m, \
Ans: A* Z5 e, E5 ?  p2 ^! U! I5 x
4 C2 G5 y0 h6 X! C* N- M3 @____________________________________________________________$ n6 r$ |: O' `: s* _. E+ I1 B! y8 }9 _
17  Which option TPI 802.1Q tag?' O$ O5 p2 n  z0 H* U: G
a. 0x0806% O" L& L0 E& d. d- I1 w
b. 0x888E
2 V; K7 x4 A% J  k1 ic. 0x08009 n9 N/ e; m: `$ Y- U1 C# F/ A" `& h1 a* v7 [4 x
d. 0x8100 **6 G! R0 z8 A/ i1 A4 D5 G* x; |6 z2 X" R) }1 E' c) l
Ans: D6 E( Y+ d5 O7 a' V: |
8 l" u( o4 n- Z8 @2 i" Y____________________________________________________________9 g- H  Q: V1 n" }$ s9 V
# U1 x$ \5 ]0 a+ Z4 H  i18. MAC address filter?! K& i6 S4 C- v: Z
% P! s) ?! W" R" ~9 e: Sa. CPU-destined( r& T! c  E+ O6 g( {' ^+ ?3 m2 K$ m
b. router9 b& i0 y6 v- R7 s" b: o( g- g
0 @/ x+ a$ ^( W! Y7 {, ?: _c. unicast **" }5 G, Y4 M4 k- b8 H0 T1 u2 S8 n  r; p! t' q7 H$ T# W
d. multicast5 ~) o! g/ h6 V6 t, \$ }9 j
Ans: C- |" V# i2 O. }; A, H9 N& u
____________________________________________________________
& y4 x) N% O& R! u8 k9 j& Y5 j19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)4 B& |& Z2 c! ?1 W
a. trunk port will be immediately2 S& z2 @3 z  `- i: P
b. trunk port can be portfast mode2 f, ~# }7 g; s% z0 H
c. BDPU turn this port to err-disabled **
0 `1 Y" ?$ o" t7 v7 X, x: z* `d. ???
( d( Z$ N6 s' H0 r( m0 Q  n+ Z1 o, D# gAns: C5 V2 K% \4 r6 g5 G+ {# V  A" g" g$ d5 ?' L) J
____________________________________________________________
& r. b3 H/ X$ B+ m. Z20. Question about root guard…." [- Z( H5 A' r* M; I9 T: B( F3 I1 v  |5 J, L) n  L
a. Prevent unknown switch be a root port0 C8 C& s/ M5 f2 t# F# ^1 f% f: P5 L1 c: k4 y: K) D4 F% A3 ^
b. Root-inconsistent **, i5 Y. t6 r7 o
6 u9 ^) Y* j- p  |, v2 E1 Tc. ???
3 P4 K/ R2 H* U. d$ V2 P: Od. ???
: U: Z! @( q1 KAns: B$ i( D% |9 b. m
____________________________________________________________! _4 ^" m; v5 O" V
21 Question about Loop guard configure……..& a0 o0 L+ w; s" m. {4 P
a. (config)#spanning-tree loop guard default8 k$ E3 f! e! r. a* a: n
b. (config-if)#spanning-tree loop( j9 B2 l9 Z, [1 b2 \) n
c. (config)#spanning-tree loop-guard default5 E: |0 ?7 t; \8 Z) L8 m4 k
d. (config-if)#spanning-tree guard loop **; f4 ]2 m  y: E3 t  L) y
e. (config-if)#spanning-tree ??????% v/ w: O* }  @) S
2 @/ V4 y# o1 y  v8 }+ BAns: D) w' @, t( d# n
____________________________________________________________% I( o) p/ n2 e: N7 E5 B" U* w  x4 W  C: j
22. VMPS question – a dynamic access port is member of which VLAN by default?
+ w! [1 |4 j, f8 b( e! ra. VLAN 1 is the default VLAN **; m! \8 E4 |- ?
b. none until the port VLAN is determined) }# m6 C& L" M4 k& r% w5 k9 \3 H& s  R5 i4 ~+ O
c. ???" q/ a  D9 D& u
d. ???
3 l8 y. Y& x9 D  d. q, S& U* PAns: A  L) h( u0 t7 F
' A) |4 \* M7 o: w____________________________________________________________
7 M$ J. }5 }$ Q; F3 `1 a) K23. Question about the behavior of an access port when a tagged packet is received.3 M! X& a/ R3 ?6 k9 n! x7 L2 ~
a. packet is dropped.3 |$ ?; c  V  \  I- [- o) a
) L8 i; w, E- z- gb. tag is removed and packet is forwarded on the VLAN of the access port. *** ^. Q( b. s5 T1 A5 T! ]+ ]
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.# V$ {3 ~; M( s1 y( x  r# \3 X
d. ???% E9 @( D4 [1 Z/ S1 ]! E5 `+ u2 O; }7 c, C! E9 G* ?
Ans: B$ z% `* L$ r) `; f- C$ Q& u/ N
____________________________________________________________
+ }, E8 x" L$ ?% d8 p24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?' ^+ k  L4 z2 _
& s- f9 U5 d6 B8 xa. ???' k8 _2 g3 k& P9 S& Z, j& Z, G5 ?: Z  G, G( j
b. GHSRP
3 H' ~0 t" j: lc. MHSRP **; e* n6 c/ h% N6 e' I8 A
d. GLBP% a# E$ D$ C- V( F
e. ???+ {1 [4 O, I& t  _* a0 N+ p) p: O1 x) m4 f! ]1 b
f. ???+ ?" |! y% u4 ]  @8 E4 `2 X" g/ N$ {6 |4 S: s9 ]
Ans: C4 S' B" ^3 o" o; D
+ W' V# C8 t) s7 V$ W: w9 v____________________________________________________________
; O) {4 w; w6 v3 x' E% v, R! c25  A question about RSPAN.7 F0 a) n7 d3 ^8 H* c: N4 u
+ e7 |- {1 y% G6 [$ aa. vlan 4029 remote span( }: o8 @! c6 M+ a& x$ u' Q
+ {: i  `3 m: s/ bb. vlan 510 remote span **5 U" U7 v& \5 Q( A) G6 y
' U8 N% V9 K* o! |; Uc. vlan 510 span* w2 Y. j! u; m
d. vlan 4029 span* r3 p# c' z% n0 D" |5 H5 e: K- Y, p$ i* T
Ans: B# a! B& |7 F. b9 m8 H6 x" Q
____________________________________________________________
: J5 p1 o- i& `4 S26. A question about configuring spanning-tree port-priority based on a diagram.+ y/ T$ l. A7 K+ g+ C2 c% }& u2 {6 i1 J, T, g; \1 o
a. (config)# spanning-tree port-priority 127; p* f( \/ ^0 f# [
  ~9 F$ j& g! a. a7 ]# d' Db. (config-if)# spanning-tree port-priority 127 **7 ?$ `) Y9 M# U: c# ^
c. (config)# spanning-tree port-priority 129; b8 |: V% k1 t0 m% ^; i8 k8 I* F0 N# o+ E* a, [
d. (config-if)# spanning-tree port-priority 129* @# W8 u: i# M1 p5 d
Ans: B, {2 t0 B- Y& I( P$ f2 }% Y) h/ P& c
; V9 `" d$ g! l9 [1 R____________________________________________________________- M6 S: K3 G, @+ X# @. F! f) l
8 Z* H  C& {1 d" D2 {& R! I27 . A question on EtherChannel misconfiguration.1 Q+ I/ N0 Y& M& w
a. PortFast( {; H5 G/ Z3 R8 [2 t* H& K
b. PAGP
/ P3 u3 S% |4 E& k# i2 Oc. LACP
. O, t4 {9 h; S, B3 M; {$ N$ |) ?d. STP **6 Z* _4 A# v2 }- l' X. [* g" N+ G# {
$ P, M8 h8 ]. Q4 j' k) k5 XAns: D2 L  |9 U2 c1 t. t2 i9 A' o0 k) {$ V
____________________________________________________________& L7 N0 U. C1 G$ I
28. A question on local database for consoling to network devices. (Choose two.). H/ G5 W' g8 d7 d1 x  ?7 p- d) u1 B+ `! f5 e. B' A
a. Console is a backup authentication method **/ `' M; ^: T- m3 x' ^; A/ G/ N/ N7 |# Y- l
b. Console is the only backup authentication method
9 }$ O5 Y' D, S6 Cc. You can set user privileged levels **
9 e$ ?" f( w2 k6 s+ D( V1 Q4 a3 yd. ???8 W. I0 X& o% R6 B" F6 k. O. a
% B4 J9 _, ]7 G2 RAns: A & C8 d) h, D5 S9 y7 y; n6 g) O4 J# C. z9 ]5 {* d* d7 Z
29. Drag and Drop – STP Timers
$ D4 J$ p7 t/ j) MHello
5 Z  A" m7 e1 }7 S– 10 seconds9 Q! |# h3 t% u4 T9 y) d0 |
% a' Q9 ^' I+ z9 K! A6 M/ }– new BDPU
4 u  ]' X# {( M' C- E5 R5 NForward
* I. s9 g. T* h9 W– 15 seconds9 x7 E$ \& F$ c6 F
– listening or learning! t4 E$ G0 N+ A& p; h% Y1 A
4 _# {" A. Z( D3 _Hold0 d; B# O& h; R/ g) g  o  k5 M+ `0 B! b
– 20 seconds; Z  h2 ?  k0 T, f/ K( ~
– time when BDPU expires
9 W: g. T+ R7 U# Q- N____________________________________________________________% n+ ~& ~0 ?" f* x# {
30. Three reasons for err-disable. (Choose three)
0 p/ Y$ D- Z+ e1 d2 I5 A' ba. storm control **
, n  _# C( ]2 A, a5 O; Xb. security violation **3 R3 X7 J" H8 D: k2 Z" D
c. configuration ports into EtherChannel. y1 I( Y& [  i/ F0 m
- R( g5 ]2 x3 x/ m# V8 C- ud. BPDUguard **8 S; ~+ m/ ~8 v% u% h+ g6 e" n# T) U8 C# i2 O0 e. p
e. ???; P% Q4 b; J( M
6 v4 ], J! Q6 P5 }0 g' Df. ???) C% G% u" {/ S3 y6 X) D
2 m- L% w, }- N6 _Ans: A,B,D/ O/ N% ]- Z) l0 r8 }* G
# N6 `3 |7 Q6 m. k6 K____________________________________________________________, w" ?/ `3 R. i  S+ O% A" }4 e+ ~6 E+ E$ c' K' N2 K" h
31. RSPAN what happen after configuration.2 f9 t, q" z4 m
a. destination port is unusable for normal use **# J! @  w) W+ Y) C; P
+ S" q" Y$ q+ |! bb. traffic in network is doubled2 {* ]# v$ w' S# C$ Y8 m. A* ^/ `; |& H$ Q9 d$ g: k1 Z
c. ???, {  g4 Z1 _, ?$ B. J. _1 S
( f+ f' o6 }* M* _& \9 {+ cd. ???
7 x  t5 r2 p' D' `# L+ N: y" o( BAns: A4 i+ E! @: a) \% ~9 I
6 E' Q) L1 m9 M6 E% Z2 R____________________________________________________________" F3 r" J: H/ ^% H0 R5 q
0 l" \0 n& g- S( A& |5 ]32. A question on local user database for login to network devices. (Choose two.). L' k% K4 o+ j1 M+ k( E3 T
a. Local user dbs can be main and also backup authentication method **: b4 c. o- H7 P, Y
) [+ u% g, F4 P0 a1 Tb. Local user dbs is the only backup authentication method/ \+ T/ Z, q4 u, v& [/ V/ e4 W% a7 B9 {: S8 @( N0 s
c. You can set user privileged levels **
& G; C/ f9 k. p  d8 md. Local user dbs is used after 3 unsuccessful logins via RADIUS server- y( N( ^0 `  t6 r) j/ ^
e. ???  H! a8 R" N, L& r
1 R5 ~; t9 _0 o/ S; q5 Y' j0 `Ans: A,C9 m) Q, W" y4 u- v
* H* e* P) v- U) [* }4 [9 a____________________________________________________________
4 ]8 k+ d0 Q' s( R" K33 Which switchport feature will block the packet with unknown MAC address from sending it via port.5 q, B( {/ v+ v. n7 U
$ _# `! |2 P2 A& N4 _a. switchport protect8 ~' v( f$ B1 {6 U" G7 C. ^4 M5 L4 r6 h8 ?! Y. [7 E$ D" @
b. switchport block unicast **3 x, h8 H& E( f# Z4 T# _% h2 E9 d# G3 |& Y
c. switchport portfast
: B+ X7 y  T* b8 D9 v, @d. packet with unknown MAC will be dropped
  s- Z% I! L8 G  \' MAns: B/ L0 e" g+ V2 ?; b  a
____________________________________________________________. D$ Z# o; f, t7 a9 C& n/ J' I2 g. }$ M( }* ^' H/ D2 O+ X
34. What are the two ways to configure loop guard?1 I) k4 e6 R! ]! A0 R5 ?
a. (config)# spanning-tree loopguard default **$ s4 \4 F- o! o; H) X. w- r2 L
7 _( _9 A7 B8 Z4 Tb. (config-if)# spanning-tree guard loop **
; j% D8 B% d6 C) Bc. ???
  X6 ^  ^/ @7 b( p' L' x" Ud. ???
2 r9 ~+ z# |, c0 b# g$ q$ V9 M$ pe. ???/ K* C, n5 k/ W3 t2 n& v3 j  x7 z- m; ~" U  \! O# m$ ^6 w
Ans: A,B( b3 `3 S: ]4 ]1 Y: k* T
1 |9 Y2 i" O$ m" T____________________________________________________________8 a" U7 X$ J% X% `4 Q
  [; V% Y- ^0 p7 v! y9 k$ A* O1 q7 D" \35. Question about action of DAI with invalid IP-to-MAC. (Choose three)0 B/ P0 i8 P3 V2 P! l2 `  z
a. Intercept **
  D% g: F& Y2 `" {8 K. Rb. Drops **% n( T& m( ^# m3 Z
c. Log **
6 {7 B2 D, O0 t1 M0 i* T3 V6 dd. ???
5 v* i/ v  j0 G( p: p2 }+ ie. ???
3 J$ a$ Q( z2 T' Y/ L! XAns: A,B,C; e: ?$ w$ P1 A: b; w3 z" m# x( D2 }1 z! V" v8 A2 t. p8 D7 v. z
____________________________________________________________2 O& w5 D) T! |
36. Question about what are RADIUS server responses. (Choose three)* g. |- e& G: T$ o/ j. {0 y5 `( x% K8 Q. \4 q: j6 D' G
a. Accept **8 P* H. y& [5 o& t1 t
b. Reject **' W6 A" U7 _5 s7 [# a
c. Challenge **5 H5 S  B+ B% ^' w3 `  `, q5 P. v* E% k/ \& F& G, u/ d  e8 |9 J
d. Get Password  G6 _) N) V/ i
e. Cancel/ G8 H* f, z* r. t3 ^" }
1 a  u1 Q5 p1 Cf. ???8 C8 w: ^( w$ E9 k0 p# W5 N6 Z) M; ~" M5 \8 A( |
Ans: A,B,C
% e2 }+ M* B8 E# G$ @6 q
4 @$ b5 f; L* s. F, A0 V3 r2 ?/ B" V  M3 t6 _9 b
& S' C2 ?* b0 a+ c  r4 [% C, {5 u/ ?! t+ w( V# E9 ^! `8 Q8 M* P1 \* H+ Y; r

9 m" r$ ?# c" s# a- p- h37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
# u5 |' u3 H/ \& L9 _7 X0 s/ ua. Drop0 p% {2 k; h" y/ |6 R( f/ h( a+ T( b8 j8 s1 H9 B7 x
b. Remove 82 and forward **0 b9 q5 E5 g/ c
c. Proxy ARP8 Z7 d2 b  V% P4 n5 ^2 _9 n5 e$ c( @% p3 Z8 ^
d. ???& [- ^* S5 v' `0 A7 `" u
/ Z7 q+ t( P4 ]2 A2 t* MAns: B
+ z4 A& s% X; m" O. N& Y____________________________________________________________6 P% w5 g0 k0 j% p  Q& y1 @$ V8 }
38  Option 82 question with two choices. (Choose two.)( A3 [, s! o+ R8 Y3 Y$ [; b
a. Layer 2 ingress **0 m3 N1 Z$ y. D! X# H" Y- J; Y* a# B. N# o% s+ X# {6 H
b. Layer 3 egress **6 Z  ^* D8 z4 Q! {- N; @) N3 N
c. ???# D4 z! c5 }) P& s6 R5 p& f  n: _
3 u4 u' C3 P4 l" M# b* U3 P* pd. ???2 a, {" E8 E2 P* R# ~+ W3 ^
Ans: A,B
# y9 a% l1 d5 g) P. t9 i( e+ r  r____________________________________________________________/ M# B+ `7 F  [& l) J
6 f+ \; }2 ]2 D! w# l3 e  j39 . Drag and Drop – Port Priority/Switch Priority/Path Cost8 o  f; T( r; V# \0 K8 W5 B/ E6 A# h
Port Priority% \0 p$ _/ ]& h5 }' R7 K7 A6 A* }# _6 u7 m, D1 E. p
– By default port priority is 128" {1 Z! g2 a- H2 b* I* Y0 \, L
1 ^" L1 N  [$ S; H) G9 j– Lower port priority most preferred path to root& m, s6 ?7 ]! s" m
– Value from 0-240
) Z. C2 T3 {; L. a' G– Multiple of 16 <—– this was there7 x7 d' l2 n; C9 p+ }* q' e8 w8 h, o: B7 s9 n  v
Switch Priority( H7 u5 r, r. z7 ~5 R; b2 C
4 j# q6 F& c' h. G. k- z. ?– Lower priority is better to be root bridge* P; f+ [7 b3 Y3 ^6 v# |; ]
6 _+ r/ w  f3 x; G% F– Multiple of 4069 <—– this was there
. m, s; s" m3 `2 ]$ n# u  W( M5 ]4 J2 F– Lower bridge priority is root bridge
! L" Z% f. m& R1 C' j5 W$ [) w6 zPath Cost
& e2 r$ c% u( J& L# S+ X8 K: y$ B– Cost depends of link bandwidth <—– this was there8 q6 ^  d' z3 \& U8 r1 u# `% z
6 |, O7 K2 |7 h( S5 Y( z– Lower cost value is better <—– this was there but it can be draged to any of them+ o  d) K: l5 x
– If you change the cost on an interface of SW1 then only SW1 will learn the change1 l' l! u3 A2 s, E: ]* C8 B. s
– Short range — The range is from 1 to 65536.0 b: j% B) }$ o1 {$ _
– Long range — The range is from 1 to 200,000,000.( D; ~" e! `9 {) K' a; Z' K+ _! m1 Y5 e! y4 g6 O2 |8 @; _
____________________________________________________________8 N- g' R6 P0 a& n0 z3 F3 p9 u- M; E5 d
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)% W2 f0 @- f, s0 D  o) S
a. deletes% m; p: s$ ~# v$ K; g9 p9 u2 B
- I- B0 I# e: f/ Yb. logs **' N! q/ L6 {) x2 i4 `$ E, m! J1 i6 M# S0 a4 T- j. |% z7 a' s
c. accepts+ a+ P' l8 s) p+ G# D; l
d. intercepts **( k2 t, M/ K! L9 [7 x0 I7 M: d  Q8 ~! P
e. discards **
3 i: e9 _9 n0 v' }f. bypasses* O- b( z3 D& u) i$ O/ b: f
Ans: B,D,E* ]" R% F, q- g6 s
5 ^# X. I: H" Y; m3 ]____________________________________________________________
, {3 q4 v1 a. V" z41 . Which three features can be optimized by using SDM templates? (Choose three.): H; c& j7 c( F6 ~7 F
! g' j  A% p; r8 @- da. port security
( X" j! B% v4 V) o  a1 bb. trunk3 x% c% I% W  Z9 i, A
- m/ c, r$ J% x6 j% I. ac. VLAN **& b( u0 O0 a! @" i0 h9 `1 C  p8 x0 k' i6 d% J6 z" M, ?
d. access **
5 N4 Y7 l5 Z$ ge. DHCP snooping
' ]) Z9 a9 X8 p  B# V) \4 cf. routing **; h0 `# r, ]1 _% [1 c
* D) o' `5 u0 H) F9 t) KAns: C,D,F: w& T7 X) u: u
____________________________________________________________
  {1 ^9 n" i% n  n4 v42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
: @5 @4 x, M- L: \4 ca. destination-MAC
( i# B3 }/ a8 r2 C9 q' [b. dest-source-MAC8 Q$ ]% }! I* h6 }1 `" U" z3 }  F) Y1 U( Q+ @
c. destination-IP& [3 I& I; b* T9 u6 D# p. g! i7 X) y/ Z
d. source-MAC **$ I: z" I0 q) d. a% l+ s* |5 d! Q' @- d+ r, L% E; d
e. source-IP **  }" U$ I  p; ], L! A
Ans: D,E( @) Z+ b0 _( F( k% i
____________________________________________________________4 p2 D' L) b: J) C. @
43  Which command is used to verify trunk native VLANs?0 y. t" B( |3 C5 l" d4 D# F* j7 k& u4 u9 {; L# {
a. show access ports; {! w' H( p" z+ P7 _2 E$ _/ e
b. show interfaces trunk **0 i# w7 h  d# ?3 Q3 U6 v8 }, G+ o. D& C8 j, B  X
c. ???1 @1 X. A, x3 u" s( |( D: W6 C* w: `- P0 v7 m% R
d. ???
4 j. {9 h! b; `; s- E, |Ans: B( B* Q# Y+ s; w! s3 _5 P! g# l, L) O
____________________________________________________________% i; p8 r$ r) S. @
: c* o8 T* y- _( o. ?44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)2 B0 D- \9 h1 A0 D: K
a. spanning-tree vlan 10 root primary **) ?2 B9 @) P0 [' C( ?! i7 C( z6 M( n3 I
b. spanning-tree vlan 10 priority 4096 **
6 H9 q" m+ D1 e4 ec. ???  _+ O& n: q* b& S5 w, A$ w
2 {; l. H' T" q& ^d. ???+ _) Y: A6 U. B, p, j0 i) ]: B
6 ]* Q7 k) p  E) ie. ???5 `4 Q3 S- P# P6 X  k
, Z  Y2 L0 z" M* B1 Ff. ???& x2 Y- [9 L2 Z9 Q+ ?7 n
Ans: A,B, D/ g; S1 V" G% s, z0 Q2 q5 \& X7 r
____________________________________________________________7 j- Z2 `7 \7 S: [3 i( m& [' S3 p& S/ m) ^
45. Which information does CDP supply from connected devices? (Choose three.)3 V5 e& A: |0 t" ~& |% |5 o% o1 l
a. Hardware Platform **/ q: m3 T1 f8 h. m' U4 a9 \
: {/ _* R  f8 M, \' m& P' Wb. Interface ID **, {3 {) h9 H( X3 ~
c. Hostname **$ Y4 B# {/ z4 Q* _3 _
d. Config Register3 m% j& D' K' p9 V0 I8 B  ^5 U( i2 B( @. l8 e
Ans: A,B,C  B0 _* d2 w, G5 F9 o8 M/ w, |
____________________________________________________________5 g8 J' ^  P# Y
; \" e: _5 `. W, b: q
" j; ~& e5 W$ }( V" h/ J# N, X0 `( X( v' L9 g) m: t8 [
) n- Y. \' \) j( P, g& ^4 ?46  Question about voice VLAN." {- ^0 _7 u5 T0 r, w$ g4 ^! a9 `
a. Disabled by default **1 h) D+ H# I- g7 h
b. Enters on untrusted port: b3 v2 n) g. c5 k
3 G/ m1 G: [* y7 sc. Default CoS value of 5 for untagged….. **! J# v# A4 z7 w0 V7 O) |8 }5 h+ D
9 P- R" `4 n* |7 ?d. Needs manual enable of portfast.! s5 u0 `- _6 `1 m$ {$ ~* A
Ans: A,C6 e& @/ \7 G/ O8 G1 {
* p6 e% W' ~5 V( [9 \: P____________________________________________________________, K. h0 G8 _1 C/ ?- L: v$ W' C4 `* j+ ]
47 . Question about UDLD aggressive. (Choose two.)- S0 s  f* A4 B) T
! e! h6 O# y( K' S. ia. UDLD messages are sent every 15 seconds. **- i+ M& r+ W, \! u6 W$ v- U( e( w
b. UDLD tries to reestablish link once before declaring the link down.0 ?. I- z+ U4 |2 Y, i5 t
c. When unidirectional fail is detected, port state is determined by spanning tree.. x2 d" g1 L2 g4 p
& R& J6 S, s: s. ?) I' k& rd. When unidirectional fail is detected, port is turned to errdisable. **$ G+ ?# q) k  |- N8 B1 r  q! t7 x5 ^
e. UDLD sends messages four times the message interval by default.. o! u) m$ [9 f0 }; T
f. UDLD automatically … message interval based on configured timers.
0 ~$ D: U. X8 _& @Ans: A,D
: r0 }- ]/ k- |) Z____________________________________________________________
$ b2 U. m% _! z48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2." R0 m# p( b9 J* k: P( U1 J' Q- F; ~/ e2 b
Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)/ L$ \, K8 {1 d$ Q/ i, m0 R! K% [( ~; C
# Q" o5 }: L9 m/ Y. S4 {' F) c+ aa. DSW2: change bridge priority to 61440 (highest). **4 G( `+ [, g$ d
b. DSW1: change bridge priority to 4096 (lowest). **' Y* `7 L% T$ P) x4 l* `6 ]: U
+ B" N/ `; L+ }8 I- \  g& N3 U" v% @* {$ k7 Fc. DSW1: change port priority but in global configuration mode.6 W$ z, b/ A1 b9 T; b0 ~' y9 ~7 y7 @, C% x
d. DSW1: change bridge priority but value is 0.0 Z1 L: L! F/ B, s- n2 j7 G
* t+ ^: L; h7 q3 e! d3 ve. DSW1: change bridge priority but command is priority root.& o' m9 a+ x8 k( r! `. R$ k& S) T. {2 y: }7 R
Ans: A,B8 d" O0 y0 `+ f. K9 b
____________________________________________________________+ k: o/ U7 J6 d3 C7 T: r
' D4 Q9 z! z0 M6 z! O! x49 . How to configure dynamic ARP inspection on a VLAN?4 O5 T& m/ [( [% L" k
a. (config-if)# ip arp inspection vlan
8 h! K1 [; T2 i$ M" u3 ?" db. ???. S7 W, j5 d2 T( m/ Q
c. ???
6 r! r9 Y; a" w: C! i& O7 R! h5 Cd. ???( E7 O& T7 D6 S2 l
, ^5 O. ]& l, o# sAns: A
6 L/ y  R3 z) Q4 Q2 y' J# X7 h. K1 e' ^____________________________________________________________+ k2 G7 b, o8 b0 I8 R+ q( ~3 P, u  `) `' t1 d
50. Drag and Drop – Port Priorities
9 s7 F% j2 a5 O1 Q8 C. s" CPort Cost" }' e8 _/ Z5 E- m
– 8 default is being the interface value" O- A% n9 c2 u& F2 ]0 _3 L( [% J9 L- p6 R
– range 1 – 200k (200,000)' m% e) L, @( ^  Q8 h9 i- k
Switch Port Priority1 y5 b' l  w! R; {6 z7 T+ t% q9 W
– default value is 128
% I2 g: T- p) M+ i– multiple of 16  Z! M( T# R) d$ b" h  P4 g: Q3 x6 d! h) j7 z8 P% ^
Switch Priority
. K! k6 ]3 c) ^* ?1 @% q– lower the better) g' O* a0 B+ Z
" Q, q( u/ b; ]– multiple of 4096
1 C6 y& U. }- J7 Y/ s$ ~ldq_china,如果您要查看本帖隐藏内容请回复" s, e( e. F" F: M+ N( c% E
_________________________________________________________0 ^0 B7 z" i3 A3 h
96. A question about the priority of a Stackwise switch.
) T+ R& y. o2 L; E( @9 x1 K(CONCEPT ONLY)6 G; [; B2 v7 \* \6 d! v2 C9 @5 z2 u- |( z/ c* T7 U. A; L& t' C/ p' o
a. Master member is selected based on member’s priority. **
% |% k$ {( g% e7 i* sb. ???* D2 R8 d, h2 r8 `7 K
, H( q1 w) ~5 dc. ???/ K; w$ a; a9 h) H4 l, Q
d. ???
- |9 a$ T3 o3 v0 D) [: W- t& vAns: A8 l& ^, Y. ?; @3 L: a- v) @$ f2 R: w' V& H2 X
' A+ v: M: m% K7 r, ?5 e2 U; }, L/ g" H' I0 c- X7 f( [
97. What is the benefit of UDLD?* X5 J7 R* H: n, q- L4 ?9 z
9 V3 v1 B: [( \. Ba. provides backup for fiber
) O% w0 ]/ x0 @4 j! Gb. help in preventing loops **. y1 P2 h% ]6 |7 Y9 j& Q, |# W8 X5 h/ \. M1 f! g, A
c. removes loops/ @! E% Y. n* J# S; ^" u0 e" d
d. determines switch path# @. B1 N; B4 D! q3 q8 C% p
. E/ T6 Q* U, y3 z* ^. lAns: B) b: T# J+ }3 C* ?
  a6 T4 B' P) B. H8 \( j8 P3 d# i____________________________________________________________0 U- O+ u  O# S. @* e
98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?7 u& A6 O9 p: m; i7 {& J# {6 a! N' M8 J1 ]' d3 J1 a
(There’s an exhibit that shows f0/7 receive BPDU.)
6 _# J4 m) o1 O% `9 o. a- i: ca. We have to configure shutdown and no shutdown.! q' ?9 z, c( X3 Q7 i6 [5 n, k
b. Have to use errdisable recovery.7 r4 h% X/ D& p5 h6 a
c. ???' x' H; E; ^1 C5 F; U1 Y$ H& A  y9 M5 X
d. ???3 n4 D. c9 r0 ~2 ^, d3 H, e
Ans: A/ e( s5 R( H; A, w
拖图题汇总:
/ r! y! f7 t" J  w, o) J( [1.        CDP / LLDP1 o2 n$ p' q3 y8 c
CDP
6 `2 B% O* R  p: C6 R+ s3 r&#8226;        Default time between protocol frames is 60 seconds
) S& I+ C5 n' {- Y9 j&#8226;        Supports IEEE 802.2 and 802.3 encapsulation% @0 V+ q! g0 n' D6 i2 H* G0 u5 r" Z: M9 r8 a( m& G
&#8226;        Uses multicast address 0100.0ccc.cccc
: A1 k* N% |& `  a9 ZLLDP! {6 S1 z0 M' B' g. u
8 b) U6 g5 b. p' `&#8226;        Default time between protocol frames is 30 seconds: a; e! }7 _0 q9 a& L6 q2 P' ]" o& f6 R6 g" s+ P- a
&#8226;        Sends topology change notification( e3 _; g6 l9 @7 Y; X  N% C. ?
&#8226;        Uses multicast address 01-80-C2-00-00-0E+ C# i* E0 d6 f& k3 [! Y& S2 I2 Y" @( L+ f- p" o. D8 g! K4 b+ p
==========================================================6 |: r8 q  z/ f1 F( O8 z7 n& A* c9 ?2 }, |) Y
2.        BPDU Filter / BPDU Guard / PortFast4 s( C' ~) \7 s% @' W2 W* B; K
BPDU Filter1 B) k! k8 r. B
&#8226;        Disables Spanning Tree on a configured interface; K3 a& ]$ C, P9 w4 I! k
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames# M7 u/ X" L$ i# v! [+ b' C9 J' H$ l' l
BPDU Guard- _' U6 g/ z  u' e& \# M' O
+ }: [/ R2 V$ g&#8226;        Protects configured interface from receiving unauthorised BPDU frames. z( q, Q+ g4 m6 `$ E1 _9 k' x, W" G/ A6 D
&#8226;        Shuts down port and places it in err-disabled mode, Q+ v, R/ Z8 n4 O* K  u
PortFast
1 f+ U2 }) f$ V&#8226;        Configured on access ports with a single host device
! s4 S" y& o* J/ S&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state1 J& Q7 M5 b! w. }
==========================================================( x* a9 \; v# c2 t  ^) P) q0 d0 e' n% E' g1 i; `( I
3.        MSTP / PVST+ / Rapid-PVST+/ D! `: n) P/ I; K- Z9 b
7 e, }  e6 ?  u& h% R3 LMSTP
1 V7 {2 L  w5 A3 s# O) v4 u# G, t&#8226;        Based on 802.1S7 v+ e' B- X0 b# B' g6 B3 C+ j
+ U' |: ?: i- j/ |! G% G&#8226;        Maps VLANs to instances  u/ d, H+ \" R( r1 L# f: p8 U. |& d+ Q: P3 o! D# Z
PVST+
# s7 e  W4 V# ^. N&#8226;        Based on IEEE 802.1D% d  p4 U- @3 ]3 ]# D
; P. {) p5 e4 w8 L! Z5 j+ m1 v&#8226;        Default STP mode8 [  Q/ Z6 {* z3 L$ O
9 q% ]. A8 P7 zRapid-PVST+  g; O; ?/ V" [. d% k- K7 X& }+ D  o$ c! w% k
&#8226;        Based on IEEE 802.1W  p* u! g# _( }) W& ]- \
3 b- x8 L# R7 n. V1 l9 c1 v& q&#8226;        Discarding port state
) y: @6 }% U; a==========================================================+ k" p: r0 k$ I/ \8 H, H% `6 G; o* _! j2 X9 D& Z: G% h6 f
4.        Forward / Hello / Hold% X+ \% O/ y' ?7 g/ d! G
Forward; R. N, V; C  b5 F* L$ U- Z, e0 e2 s7 T* i/ \% U6 ?! d" v
&#8226;        15 seconds& _- `! @; ]! L/ F( R* Q8 {# w/ \5 ^4 F) y* F/ x
&#8226;        Listening or learning* J7 u4 \+ ~# X" l% s" H( T' R& E# o* z, _
Hello  Y8 ]8 [& [* T: T2 i
; R( a3 N% X6 C* \* c/ k&#8226;        10 seconds5 \% K$ h, |% E' i/ P$ B- D! U
. Y7 ?  s# @( f0 \1 a$ A/ u$ n9 e&#8226;        New BPDU7 U  q3 Z2 R1 O7 S, u7 b
Hold- E. u6 {1 L; x2 A- F
) B: ]* s" S# s  a7 y! ~&#8226;        20 seconds
' M. p, B3 r1 o! U5 B3 A8 ~# e1 w&#8226;        Time when BPDU expires
  a8 i( H8 \' G( H# V7 F4 N==========================================================' ]$ I( j8 e! K4 H3 X+ D( S/ _  |# v/ g& l# O3 ^8 g" q
5.        Port Cost / Switch Port Priority / Switch Priority6 U9 Q" K- M5 Q0 h1 f3 W* v
& o) x7 u. v! `) |! y  p/ }& z) DPort Cost
2 S9 n( Q8 k% F, Y' V! S&#8226;        8 default is being the interface value9 v3 Q5 D6 N' N9 ]! d- I& `4 q
* j$ J! P) t7 m3 a, u8 G2 I* {&#8226;        Range 1 – 200k (200,000)' o2 \3 Q# Z+ f3 i* u7 N$ O* U6 J! S: l2 S, e! C# s
Switch Port Priority" ?/ U! k- A, e; l( ^" D
' j' X5 `4 K" F+ ?&#8226;        Default value is 128
: `. I& U+ d' f6 e) `&#8226;        Multiple of 16
( d) f& {( Z6 a1 qSwitch Priority+ Q: f% Y/ z$ K9 v7 b/ c* ]
& x9 ?, o' I& W+ _9 D+ u$ R0 b1 X8 o3 z&#8226;        Lower the better3 I$ K* x% P+ v3 m$ o0 _
&#8226;        Multiple of 4096: b! x$ T* p! M  ?
) `: o- V4 i2 h* k$ V==========================================================5 F' _; C) w( i
6.        Guard Loop / Guard Root
3 ?  p+ i9 w6 t! Y) AGuard Loop( @2 u. a7 h2 q+ b. S" j( u/ g
&#8226;        Detecting unidirectional switching links% C6 A+ \6 V1 o+ `4 @
( [9 a3 U3 T' _, w/ J&#8226;        Port self-recovery' a4 h. f3 y) h6 ^% L; e3 ]7 O' P  z: H8 {
Guard Root; C5 @4 F: o, v( f/ Q) c# g; A( G2 [8 I' M0 s
&#8226;        A better BPDU disables the port as err-disabled
* f6 a% v: Z3 m! E  N, ]&#8226;        Protect designated port from recei
回复 支持 反对

使用道具 举报

发表于 2017-6-3 21:28:55 | 显示全部楼层
CCNP交换(300-115)考试新题汇总(5月24日更新)
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-8-3 05:32 , Processed in 0.053467 second(s), 17 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表