设为首页收藏本站language 语言切换
查看: 5311|回复: 75
收起左侧

[考试战报] CCNP交换(300-115)考试新题汇总(6月5日更新)

  [复制链接]
 成长值: 64835
发表于 2017-6-5 14:00:34 | 显示全部楼层 |阅读模式
本帖最后由 小乔 于 2017-6-5 14:06 编辑 5 y  d' b. S1 m% \  Y# `

& C$ W& w$ F& P  I& |% J1. What is the Ethernet frame size for 802.1Q?
5 T1 Z: I, a/ l) c; n+ R0 j( D7 @3 Ja. 64" b1 C/ W% o9 V% y
b. 128$ @" B4 z1 D) |2 {, X) F7 y, h' o
c. 1518
) i1 |' j. s# u2 i$ Ed. 1522 **& b2 w) c! v5 d1 e8 o
Ans: D/ {" t% k& y, D
————————————————————————————————————————————————————————————7 m  N: T! u3 ]
2. How will the traffic reach the core switch from AS switch to DS core switch?6 N9 O6 y3 B7 H9 i/ w- u% T
(Based on a topology shown with one core, two distribution and two access switches on each distribution switch, with redundant links and bandwidth mentioned.)5 |' o& j; ?1 I' n7 `
a. ASW1 to DWS1 to core
& P% U1 e, M( P2 i+ Fb. ASW1 to DWS2 to core **
; O% W( \! h0 H6 R" Jc. ???
1 x* h% e4 `( q' W: u# L/ G7 od. ???; r9 [9 x5 u& w" V% |; w
Ans: B
- ]+ X  I/ L( h1 g+ T————————————————————————————————————————————————————————————6 }2 i/ C, Y; t) L% @) Z4 A
3. If HSRP group number is 45 what would be the MAC address?! c. v' Q# p. j
(Basically conversion of digit to hexadecimal with group of 16.)
- R) L1 x1 G7 k/ p9 v, Ta. 00-00-0c-07-ac-2D
- D! I( N- B2 j; u$ Q, |9 ]b. ???
# f$ |3 \+ I9 ~/ N; a2 g1 Jc. ???/ E) S, E' B1 p
d. ???' b$ O; x0 ^$ S2 V  e  x
Ans: A& x! n1 h" v" N/ U. }1 L
Explanation:
( ]$ b0 a) q0 B; D% x! [00-00-0c- 07-ac-2D
) o$ z/ j+ b+ n# mCISCO_ID :HSRP_ID:GROUP_ID: d" b" W- y3 C0 j1 `8 R5 X3 Q
2d=451 \, p$ N% h  u7 y. _. D9 z
————————————————————————————————————————————————————————————
6 G' w' d6 ]8 s8 ~; T7 s- Y4 A question on EtherChannel misconfiguration…….& x; I6 x  M' @7 K: G2 m
a. Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. **% F) M" [! H. F6 Z( w7 _' w
b. ???
, Q( n# H/ R9 g2 t* e2 gc. ???
$ |  D6 X2 B& D8 L" ]  L8 D9 A, Od. ???
/ r* F3 F% Y6 k: F" a! a1 w5 O4 [Ans: A  X# ?; t3 U( E% F" q5 Z- h9 @
————————————————————————————————————————————————————————————/ `' a- P. a! R1 ?" A" D
5. Select a valid VRRP configuration from a list of possible configurations.
+ P3 m6 O( L0 \  q% Xa. vrrp [group-number] ip [ip-address] **
& E% M) W! `, T1 [b. vrrp [group-number] priority [priority] **8 a6 C; k, k1 o4 C0 |
c. vrrp [group-number] preempt **, a7 g9 ?! f5 t  x
d. ???. y! Q7 [2 J0 C$ |$ `
e. ???- e# M( E, O& r8 M9 w
Ans: A,B,C" ^& b7 x+ ^' q& ^. c
Explanation:' r. B" a1 W+ t# P; o
You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word ‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.; [- H9 w$ H, j" e& g( \4 P2 L$ U% H
————————————————————————————————————————————————————————————
. \0 U* Y' u. I& e6. Private VLANs (PVLANs) have two secondary VLAN types.
0 |9 ]/ p; {1 K. Z& Ra. community **! t0 X5 I% N5 |+ h8 R
b. isolated **6 H: D. @, c# }, @
c. ???
2 d) B" x5 }+ \1 L; G  Hd. ???1 U) T3 I4 Q; I1 D  k" N
e. ???
9 Z) c& U& c! }: QAns: A,B
' A1 U+ n/ P9 G- b# ~( M" l' {____________________________________________________________
$ g9 h& ?; C) W9 @0 B7. What types of SDM templates you can use in switch? (Choose three)
' S) g5 S5 _( I2 m# Ia. Access **, ^6 _5 t) E& u1 X" _$ X/ d
b. Default **
$ K! f& S# N: ~! |6 ^5 ^! w( a  Xc. Routing **& D) Y9 G0 i! I8 R1 Y4 ]
d. VLANs **
. G# z7 I$ }1 X6 D- X1 E$ j" Se. ???
' q" L, V. v8 S& \6 d0 i$ gf. ???9 {" S. [; X; k' V
Ans: A,B,C,D (note: the question asks for 3, so 3 of the 4 correct options should be in the real exam)
1 ?9 `# d3 ]2 E3 q/ DExplanation:
' x+ z( l, s1 @  h+ Y# D/ O+ Access – The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
- u0 L# y6 A& O+ Default – The default template gives balance to all functions.9 \4 L3 D, z" r
+ Routing – The routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.2 C: y7 J% ~6 U+ R, V6 {/ {
+ VLANs – The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a Layer 2 switch." V/ o. L" C. V0 r0 ]
____________________________________________________________
# b8 f$ t1 d* T9 k4 Y1 W1 W9 _* i. D8. EtherChannel – what is the process to configure EtherChannel.
4 p9 B8 T" y& J2 ra. shutdown both interface ports **/ o# l  ~. v  @  S* j" m# N' F
b. shutdown the interface on one side only1 W7 H0 f+ ~0 [  T; W1 {- ]" N
c. ???. x7 t* `5 I( h) J8 L
d. ???
+ D( p! n7 F; O# \/ ]  ?$ \  `Ans: A
! r" o7 N: N- O' B7 q____________________________________________________________
1 k; h" b6 M0 N+ m9. A question about spanning-tree port-priority.
0 e4 n1 j; g9 ^a. 127 **
& g$ B/ }+ K2 R' Z5 K7 Ub. 129& e# {, f# W& P6 Z- I
c. ???- i' g9 K9 l, I& T+ I
d. ???
( I  l$ s. e4 R' A5 w/ xAns: A8 t! |' I. {# ]& f; |! i  U3 Z
____________________________________________________________
  M( T: N) J  G7 n5 i  N3 m10. Question about EtherChannel based on STP EtherChannel misconfig……
& D, ^8 |$ D! |9 D' ta. (config)# spanning-tree etherchannel guard misconfig **
% m2 t* O2 z$ L7 T) e6 w1 ^# G$ G, gb. (config-if)# spanning-tree etherchannel guard misconfig; |, E. h/ b4 C8 P  @
c. ???. i0 ^* r4 O  T9 n. v
d. ???$ F( G& y7 A6 x' D
Ans: A
' k0 \9 e1 Z* e' O' \________________________
4 W7 H( |- z) ?+ `! I  o7 ]% _( r" H# A* r
8 D( ~, l, m" M" j+ h
___________________________________: D0 Y. m' A2 }8 G( Q* V  A
11. If HSRP group number is 37, what would be the MAC address?
9 W; N- g: Q: L5 a! ma. 00-00-0c-07-ac-25
+ Q' K* o/ R& V( h) k* c* gb. ???
# ]& ^, g  t7 Y& k+ ]/ ?c. ???" i  Q/ q& _& o+ u8 a
d. ???
7 i0 A1 u; M4 [Ans: A/ h8 a" i5 r7 s
____________________________________________________________
" ]% A- A6 _6 \! r12. What is the default value for spanning-tree port-priority?
2 W, E% h2 i" w" E, {$ m7 Oa. 128
+ q( r( B+ E) o( O+ |b. ???" V0 U. @1 p3 B& w% x
c. ???; Q2 a& p2 \8 h6 @2 [
d. ???
& G* }/ L4 ?/ D3 ~  M* ^9 }# qAns: A* J9 j7 U+ |( c
____________________________________________________________8 b/ c. S* h0 ?9 f- [5 @1 s) R0 p
13. Which information does CDP supply from connected devices?# l5 k6 p2 F5 j% e7 |) O: B
a. hardware platform, interface ID, hostname- V* [4 B  E, y7 u1 ~
b. ???* f9 Y. @* c" z
c. ???
+ o$ X& K3 u9 o0 J; id. ???
( t2 F: f; P! n; \5 H: d# G% `Ans: A
& |$ f- [$ o. L! d$ c/ j____________________________________________________________
4 A- Q; h8 [0 t0 N6 t14. If EtherChannel guard is configured, how the interface status is (or looks like) if misconfigured?  [+ E) R" G! M; f) L
a. errdisabled
* j8 D& f( u8 C5 V# E" t% lb. shutdown
& O/ O# @3 x' E/ mc. ???4 {5 v  y8 y% m* w( J' M1 R
d. ???
- F7 y. g7 J. j3 X' f. h; c) IAns: A
; O' \2 r, U2 M5 F( N____________________________________________________________% D% E! p) z2 b( o4 y
15. When you configure PVLAN to the portal facing to the router what kind of ….. should be?
  z; H' a6 b- |: |a. isolated
1 o$ V2 @3 z/ Ab. promiscuous9 j5 a% v. q- D1 ~* B
c. ???3 Q2 E$ H7 M+ F7 E  C% `  j* J
d. ???
$ i$ t5 C+ M% YAns: B
" f- n3 q8 l6 k4 Q. W1 G____________________________________________________________
0 l0 q$ E( J7 p$ N/ Q9 s16. A question with an exhibit.* n. ^" z7 p2 G7 `1 E
There are 2 SW and 2 PCs. There is a trunk with VLAN 1 and 5 allowed. Question is if you do “switchport trunk allowed vlan 2,3,4” on SW2, what happens. Ports towards PCs are in mode access VLAN 5.
) b3 C- D. z9 Y& w' B  sa. The connection is lost between PCs, because you will remove VLANs 1 and 5 from trunk with this command. You should use “switchport trunk allowed vlan” to add additional VLANs into trunk.
9 @: g* d) K9 c# Q. yb. ???
3 y& p- d, F- p7 Z3 v0 Z, Wc. ???
/ ^! b1 T9 y, ^$ j+ I) od. ???
8 E0 K) o3 f8 [+ q  L+ ZAns: A
$ b& W% q  x( M! W5 L2 |2 j____________________________________________________________
  N2 S0 \4 n" e2 @0 R17  Which option TPI 802.1Q tag?- `* n6 R  b( l* ~$ U; L5 T  S
a. 0x0806
% S  h& n4 Y! a5 Ub. 0x888E
' r4 }1 L6 q: `: D' Xc. 0x08004 m' }+ r2 f: O' x
d. 0x8100 *** o# a" Y* i. r  S9 v# M. L3 R' d9 [
Ans: D
& Q& a5 ~3 t0 S/ S( A' x1 U____________________________________________________________
5 o( i0 Y2 o/ ?( `18. MAC address filter?# p1 [5 f( [- y3 q) X
a. CPU-destined
. o' Q7 L/ I! a, Fb. router
5 `, K# M' [. o/ D4 O, Y) O2 A. ]c. unicast **
" N  l  I$ @( F* Q: e  ?- qd. multicast
$ g& ^& `+ t: P) [" c4 H- wAns: C/ u2 ^' f( C/ e) |& n: |8 J
____________________________________________________________
1 u! [; r+ u% x  R- }# z" H19. Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember properly)
9 G4 ^) ?, ?( E( za. trunk port will be immediately
! Y  }5 H( I0 h! r1 r5 D- ?b. trunk port can be portfast mode% \" Y1 Z9 \) Q4 g
c. BDPU turn this port to err-disabled **/ C) Z0 r# V0 @8 R7 Y; o% o
d. ???. G6 n7 Z9 j3 h8 A7 |. l
Ans: C
9 J8 a4 S: G: Z+ N' f$ k) F) e) o____________________________________________________________' Y, U, {1 V2 v+ L
20. Question about root guard….: p; {8 S8 t6 e) p9 K/ y
a. Prevent unknown switch be a root port
& }. w- J: K8 H1 s. G" N* v; db. Root-inconsistent **
/ Z* T1 l5 l# w9 H; Pc. ???
& r" O) w  l9 K8 u: q; L% Ud. ???
2 S4 b0 K6 f6 U# O% w* |Ans: B
& B* V- D: d( a6 z/ o! E* _____________________________________________________________/ P: q  U- ^( h
21 Question about Loop guard configure……..
- D) [3 j, Z9 i- H6 s3 na. (config)#spanning-tree loop guard default3 M$ j& N5 q  ]/ d/ o& c
b. (config-if)#spanning-tree loop
: a6 Z# H) o* E( x; Q5 Vc. (config)#spanning-tree loop-guard default; A  F0 M* q) u4 d
d. (config-if)#spanning-tree guard loop **2 r, M4 @9 o5 h
e. (config-if)#spanning-tree ??????0 O; y- b+ d4 U8 M+ R! M
Ans: D
3 `; Y6 L, a+ G% t; g* Y7 v$ U____________________________________________________________8 R9 O; s3 k1 N) p
22. VMPS question – a dynamic access port is member of which VLAN by default?1 d, d/ r; P3 E9 I! I
a. VLAN 1 is the default VLAN **# f' ~; q% V0 @0 R4 t
b. none until the port VLAN is determined5 d/ G; x/ R1 _/ q/ P) |
c. ???
8 R4 D' Y6 C" T  B0 p/ n, E- ld. ???
- i" e1 o7 d& p6 J% h( r: L, e2 KAns: A; j; @$ @5 D7 l0 G! ]
____________________________________________________________
% g' T* |( A+ A( p23. Question about the behavior of an access port when a tagged packet is received.! t" [. ]- ]9 Z2 k1 t- I! |! t
a. packet is dropped.6 _; t& A- X7 M3 U& ]6 T
b. tag is removed and packet is forwarded on the VLAN of the access port. **" S7 W; P, E+ D' N7 {6 g$ S
c. tag is removed and packet is forwarded to the VLAN mentioned in the tag.
9 \# Q( @( O" ?4 Id. ???5 t, b6 q2 O- y8 l9 q+ n( K" W
Ans: B( G2 C+ \2 J$ b0 R" y6 L3 K$ b1 p
____________________________________________________________
! `9 \* W& @% j0 H: B24. What is an extension of HSRP that allows load sharing between two or more HSRP groups?1 N" @, Z* ~* Y6 \' {) V/ i
a. ???
+ Q2 [! h4 p7 eb. GHSRP
2 W# K- X- D) P9 T* _c. MHSRP **. s) D. {  g* C+ i( w# r, n
d. GLBP0 n9 z3 g  c1 s! h: W
e. ???
! I$ z+ z- R# J3 B* af. ???
! n- o# ]6 n: m: ^: m4 [% m5 i7 jAns: C2 N- h, t+ @: V0 g0 S
____________________________________________________________
" n9 |; f) `4 Y25  A question about RSPAN.! Z  ^1 {9 R% t; s0 P
a. vlan 4029 remote span9 g, s/ |3 l) `" S
b. vlan 510 remote span **3 u1 [+ D# s4 k* |7 r) {
c. vlan 510 span
4 ^5 z* y' ]+ K4 Ed. vlan 4029 span
/ V9 m; Y2 ^7 n' Y6 Y6 }( RAns: B
: }& m- N  v, h' D2 {5 {____________________________________________________________
5 _7 D6 R8 v" C, j: }( ?26. A question about configuring spanning-tree port-priority based on a diagram.
* F8 |* Q' l9 q6 oa. (config)# spanning-tree port-priority 127
9 r, P: e, I, l) cb. (config-if)# spanning-tree port-priority 127 **$ a: v7 M- `- _$ ]/ }( q
c. (config)# spanning-tree port-priority 129
! F" x- q. V% u* od. (config-if)# spanning-tree port-priority 129% {: ?% a* |; O1 o! l% Z9 D: |
Ans: B
; }: w8 I% k+ L- ?____________________________________________________________9 I2 g, k) d- ^) g. P
27 . A question on EtherChannel misconfiguration.- z- E7 K" S# W' |5 @( p. G
a. PortFast$ V0 i" t& S1 _) ^4 W$ V" P
b. PAGP
$ ]- M- D4 I( Oc. LACP
/ h/ @5 n/ L9 j- Hd. STP **, C8 o6 b1 M7 m# _
Ans: D7 b  {. g1 b! @3 `4 a
____________________________________________________________
1 t5 `. r: \+ y7 k, r28. A question on local database for consoling to network devices. (Choose two.)2 W3 E3 U* T% o' q
a. Console is a backup authentication method **/ Z( j* n4 N$ r8 w. H
b. Console is the only backup authentication method
, P& Q3 a5 a0 ^0 @& j* s0 K% n$ e( Pc. You can set user privileged levels **  u: o8 Z+ j# ~* J" t* Q/ f5 j, H
d. ???
' r6 J6 Y# J* G- G  M4 SAns: A & C
+ z) d& n- L8 e3 _1 z" @% _1 N% j29. Drag and Drop – STP Timers
. \+ n$ i" A6 }- y) gHello
- P/ f) d0 S2 p3 |) E– 10 seconds) N: J, x( K& p% Q, I  w& ^
– new BDPU
9 `, s5 Y4 `9 W* b0 }, j. G* IForward
. p( r* n% ?" M" `- K  {' P– 15 seconds5 ?" [6 X3 s" y6 c- o
– listening or learning9 s. w1 P# d. T) n
Hold
+ B1 A, H- O4 u; C  u2 Y– 20 seconds
0 M3 A# u" x0 O3 j5 _# _5 @– time when BDPU expires' B, D$ \/ H! J' Z
____________________________________________________________5 Q5 |5 J( n5 v& V; m2 V
30. Three reasons for err-disable. (Choose three), z4 ]1 Q! R: [* H/ P
a. storm control **% l" X) P( T  Z# @3 s- P
b. security violation **
" w( Q6 [4 n$ _. k# _9 q; l) V. Lc. configuration ports into EtherChannel
1 a$ `  y' B' id. BPDUguard *** g  a8 ~- E: g# J' p, m2 O
e. ???4 O( A+ T- H* v" ^. ]4 q, x
f. ???
2 H9 Z8 R3 b8 pAns: A,B,D0 [% K" f" U# n" l4 K
____________________________________________________________
5 f/ j/ `& Z2 B) Z/ L& u31. RSPAN what happen after configuration.- P' v7 ]: n& N2 {
a. destination port is unusable for normal use **
# _* U# M. E+ v& P, M8 U4 ?b. traffic in network is doubled) Y6 K. q. U6 s' h6 a, D
c. ???
! a1 b# Z! `7 o" m0 H" G8 jd. ???$ \5 C5 L* W2 {4 v9 z7 q! c" ^
Ans: A" z  a/ ]6 }# H: x) d2 C
____________________________________________________________
+ q' T' j# g# u) ?2 \+ o: @( O+ O8 w& z32. A question on local user database for login to network devices. (Choose two.)- c4 ^! Q) g  v% s1 u
a. Local user dbs can be main and also backup authentication method **
' U1 R5 {1 ?) Q2 B; u. Hb. Local user dbs is the only backup authentication method
9 T- `3 I9 p6 M! Jc. You can set user privileged levels **
) y9 O% i, i' i" ~( v# l; `; K9 Xd. Local user dbs is used after 3 unsuccessful logins via RADIUS server7 D, [+ d: y) a  N5 x( q
e. ???
& [+ Z; Q' r# o4 }Ans: A,C/ p& F" b8 d! v, f& H) C8 q: q9 r
____________________________________________________________
1 k! p  z/ Y. k  D8 C( r+ z33 Which switchport feature will block the packet with unknown MAC address from sending it via port.
6 m9 ?; A) u3 S1 Y* ka. switchport protect
" b( a8 y4 Q* Ob. switchport block unicast **
0 D& O) N3 ?6 K2 Uc. switchport portfast0 b8 a7 H" Z4 s* P; h
d. packet with unknown MAC will be dropped, N* A5 _0 L2 g
Ans: B
- F7 z& H# y3 h6 Y____________________________________________________________
( H8 S$ ~3 U; ]7 S4 ?5 E5 [. ~34. What are the two ways to configure loop guard?3 K3 Q2 h8 U# x8 d7 u% C: a
a. (config)# spanning-tree loopguard default **
7 [6 x  V- ^: }1 k; z( Hb. (config-if)# spanning-tree guard loop **' N" ]" ?# a& F& }! R: e- Q0 E0 k
c. ???
# O5 M, L" m) l  D$ c! K7 h6 n: pd. ???
1 {8 P) B. `. l  Ie. ???/ V% O* i7 L+ l/ {6 h9 d
Ans: A,B1 \% _/ l) j, U% X, d: y
____________________________________________________________
2 D6 s' D, Y9 A! q, X* H* V35. Question about action of DAI with invalid IP-to-MAC. (Choose three)
8 V) {" X3 K- K9 v" C3 _a. Intercept **' F& B' m3 H: X  J+ f' p
b. Drops **" s2 O2 y% \4 B) ^7 U
c. Log **
" t, H* v' H$ h$ Rd. ???
. T3 _) E" `9 t/ |7 `e. ???
! b' n9 Q! C1 |+ U5 \8 H) R9 QAns: A,B,C
& j0 W2 U7 R9 h4 I____________________________________________________________3 ]* D6 e% j5 I
36. Question about what are RADIUS server responses. (Choose three)
5 t" U& Z- [, @! c% w$ ^a. Accept **: s9 C) n- V/ {) w
b. Reject **: V  D1 d" o% e7 Q+ u
c. Challenge **: Y% p6 l; E2 j
d. Get Password
- E  ?/ u( [& g4 [1 B5 }. qe. Cancel
3 A1 f  Y& k% @2 z4 Y0 qf. ???; e; h5 J6 r. ^
Ans: A,B,C
$ g5 r6 ]% h% I4 S5 d' F: r" k+ F- d

" ^; U6 n/ Y8 \- P( i3 I0 D
$ O1 ?# A, W2 [( t
! ?6 R$ [7 z* M9 c. ]/ U37 What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
) j1 o* B8 {8 |2 \% O: Na. Drop. f/ d1 w( y6 w2 t! q
b. Remove 82 and forward **
' a2 R9 ?+ t- _c. Proxy ARP
: A  \( B9 S; C! t$ w) E: Hd. ???: h3 I- x5 d8 v" B& J/ |9 t* `& L
Ans: B' P# F6 r% _' N& h# {" M
____________________________________________________________; `2 ^, [+ {; I/ X: |0 v' }! x
38  Option 82 question with two choices. (Choose two.)
; g% {, p+ W: [  k8 o: r5 \a. Layer 2 ingress **
9 ~, F+ X/ S7 I8 e7 l, ?# A- ]b. Layer 3 egress **5 A6 Y1 _' E. K0 ~2 E/ \( q9 F
c. ???
8 n! \! t/ P9 [9 Y' Ed. ???  q- C, M1 }6 v" r/ L) v
Ans: A,B
1 @/ {5 `5 q' N( k" Z____________________________________________________________
5 M* d# x# w' q39 . Drag and Drop – Port Priority/Switch Priority/Path Cost
: H' z; f* c, s3 q  \  M+ I! `+ ?+ YPort Priority! U  i1 Q5 a6 ~: [$ k! p; q/ x2 P- j0 I  ]
– By default port priority is 1280 n; j2 e0 _8 o
– Lower port priority most preferred path to root* G+ I/ r0 u4 p4 R8 [/ C; T' e
– Value from 0-240
' M5 D0 q' i4 d8 n+ q2 Q1 b( H& x; Z/ M6 q– Multiple of 16 <—– this was there% x# ?  N- G' I. }6 D1 q" a$ c3 `7 e
Switch Priority) k( @2 m% I  U' P5 G& _
– Lower priority is better to be root bridge/ W& i7 X2 v+ r) r
– Multiple of 4069 <—– this was there7 L* X1 ^% {5 q! v
– Lower bridge priority is root bridge
5 M: D) i9 s& {; p7 MPath Cost# J, }! i3 }$ p8 Z. O
– Cost depends of link bandwidth <—– this was there
+ R8 N9 C) e. M: v5 U8 a– Lower cost value is better <—– this was there but it can be draged to any of them
+ p! l9 J* L. t6 G( S  Q– If you change the cost on an interface of SW1 then only SW1 will learn the change) z) P% G' ?& i4 C7 A1 ~/ P% B
– Short range — The range is from 1 to 65536.
$ U/ V2 M8 Y  A' n. x– Long range — The range is from 1 to 200,000,000.
1 D; |/ O+ H- ~6 o____________________________________________________________) ~; ^5 G) e/ O; u
40 . Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)
8 D" Q, E5 C& a$ J; A) x7 Na. deletes
; j/ Z$ g5 I( i1 yb. logs **
0 i0 C1 G  n5 j0 Bc. accepts* A+ ]) R- l( @9 X% L
d. intercepts **
; i5 v* W* e$ A1 ?6 O; D6 {( Ye. discards **$ E4 `: m9 I. Y$ F+ y, Y( D
f. bypasses
7 [: f; a& }- k8 X; K  wAns: B,D,E
9 K8 M( S; X. J) d: s/ x. U# x7 q, H____________________________________________________________0 l; F( A  K: Q
41 . Which three features can be optimized by using SDM templates? (Choose three.)9 Q" [* p7 a9 x6 C4 v
a. port security
' r, n2 F5 S5 C0 A. Z/ nb. trunk! @, s% E* }! F  H4 H( B
c. VLAN **
# M+ f; i* n9 ]$ y0 g" F% hd. access **( I0 F6 {) }5 t* X/ O  H
e. DHCP snooping
2 E; q3 w3 m: h9 C, Df. routing **
3 Y- Q9 @7 k% ~% @2 sAns: C,D,F
5 i% ~7 ^7 t3 x3 e/ ^. E& \% q3 ?____________________________________________________________# H# ]2 D" u& n& a0 }. ^2 o* L! I
42 . If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods of load balancing on the EtherChannel are preferred? (Choose two.)
+ o, H# k# F( I, I' h; R9 T# la. destination-MAC/ R* o+ e& x$ S0 O+ Q3 \7 C7 L
b. dest-source-MAC
( i% E- W6 j1 a' Q6 T+ `c. destination-IP% C% a; Z/ s" o! a5 ^
d. source-MAC **/ e7 E! n, e% i
e. source-IP **' H. L$ q# \7 C7 N( w3 Q
Ans: D,E1 Y" {. K8 X& ~3 }# A: a3 D: z
____________________________________________________________
+ z; X- T5 J' _43  Which command is used to verify trunk native VLANs?
9 Z, t$ s8 v* H! Q/ V  E! p+ Fa. show access ports
7 G, Z+ B) U5 V! Tb. show interfaces trunk **
" J& N/ E0 @& n/ k- Ic. ???
4 ?$ x8 d# j+ Q3 Zd. ???, v  R9 X7 N" P2 K
Ans: B
0 Q& U! u( a. [____________________________________________________________
4 o" L# s$ v  {% u5 H% W44. Question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose two.)
. b' A5 i; E3 {a. spanning-tree vlan 10 root primary **
3 J6 W% R. l- R. Sb. spanning-tree vlan 10 priority 4096 **
3 B7 r. ]) N/ dc. ???$ j  m" b4 K) R* Q  `0 G
d. ???
! H. i5 M9 d: p! ee. ???
( A1 {& C* M2 T* m$ k' J1 y: s6 Qf. ???
$ v8 b7 v; W- ]/ }7 R2 M) gAns: A,B: ^7 @* o1 i" u/ w) q
____________________________________________________________. z1 b0 k2 g! V7 p: `0 W
45. Which information does CDP supply from connected devices? (Choose three.), m1 G0 N0 D! b# u/ c# Q' N. ]' `
a. Hardware Platform *** U4 P( L/ m$ ?- h
b. Interface ID **1 Y+ Z9 x( [$ P
c. Hostname **
; Q6 W+ S' w( L' V+ j) l' Zd. Config Register# g# T" N/ Q  h- U+ g; D
Ans: A,B,C- L3 F' N+ b  h% R2 R9 w
____________________________________________________________1 p: s- R& a' }) c8 b& l) k. a2 M

) S2 R# M7 ~: D7 l, [
+ g* R6 e  {8 z8 n9 L) g: Y8 H46  Question about voice VLAN.
! _0 e" @5 K8 aa. Disabled by default **4 s' L/ _, B( ?$ B3 W0 m1 @# l% j3 d
b. Enters on untrusted port
  K) p% e$ n; {+ Bc. Default CoS value of 5 for untagged….. **
4 F8 X4 |8 r+ N4 pd. Needs manual enable of portfast.
9 D. B5 o: Z7 m+ p, {4 a7 D/ RAns: A,C
1 d& n, H" _1 X1 A$ a& m____________________________________________________________2 @; T" f& u& k9 ?  g/ n
47 . Question about UDLD aggressive. (Choose two.)
- n% Q7 S& o1 pa. UDLD messages are sent every 15 seconds. **
& c' I0 I* a/ _% c+ O+ n( Tb. UDLD tries to reestablish link once before declaring the link down.& G- T6 k9 N6 c0 o& E$ p1 k8 W
c. When unidirectional fail is detected, port state is determined by spanning tree.& e* y  K9 q) x: e0 V3 Q
d. When unidirectional fail is detected, port is turned to errdisable. **4 q  T) S# j3 B/ b7 ]0 l9 Q
e. UDLD sends messages four times the message interval by default.
  W: p' n9 K) w3 [5 q) I7 bf. UDLD automatically … message interval based on configured timers.
0 t( {+ ]9 O  k* m- |1 u3 N6 vAns: A,D
0 n% {6 B- Q; P* t, ?) ~0 `____________________________________________________________
  n; I6 D% A) N8 V4 g& D7 H5 `- e48. Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current root for VLAN 10 is DSW2.
: t$ Z" X# J, f- Y5 M: p% @8 ^Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)8 S! q" l2 j3 [: }* p2 b
a. DSW2: change bridge priority to 61440 (highest). **9 Q) p- p  _: o
b. DSW1: change bridge priority to 4096 (lowest). **4 Z1 z- X& G8 \4 j6 V' [
c. DSW1: change port priority but in global configuration mode.
; X. q0 ~. y. G: R% rd. DSW1: change bridge priority but value is 0.
4 G3 y8 @) Y; E' Ye. DSW1: change bridge priority but command is priority root.9 G. R' U, k6 B  H
Ans: A,B6 t3 Z3 B" W8 A: l. V5 i
____________________________________________________________
8 u" w. B( ~, R# y6 I& ]! R8 X49 . How to configure dynamic ARP inspection on a VLAN?
7 _; }3 r" u6 da. (config-if)# ip arp inspection vlan! J! B$ {  K& i2 a, v
b. ???7 y) m, ^; s6 l+ x
c. ???* `& C' u! R- `; K2 u. G/ s9 L
d. ???
* k. ]7 H+ z0 Q! f$ w+ cAns: A% \  c) u, N7 O+ s8 p- z
____________________________________________________________/ @/ l2 Z" c5 u1 G1 [
50. Drag and Drop – Port Priorities
7 d; d: B/ P8 ]! H) e: VPort Cost& `4 ~+ U8 s0 c* t
– 8 default is being the interface value3 d3 E1 G2 O! q* X0 c% @1 J. {0 o
– range 1 – 200k (200,000)
$ `2 q+ a4 a3 fSwitch Port Priority. z/ x' \* T! x4 n# |' p1 r
– default value is 128) Q' ]9 K! X& e' |4 P
– multiple of 16! ^9 |" J6 N  g* ^7 G0 v
Switch Priority
( \% V8 d  f& I. V– lower the better
; g0 a+ s$ q$ \. D, g" `– multiple of 4096
+ m, l+ }/ V* f- J2 n3 a/ ]2 ^2 L
游客,如果您要查看本帖隐藏内容请回复
_________________________________________________________: w7 ^7 s6 t. S7 ~5 q! g
96. A question about the priority of a Stackwise switch.* f! p7 A. k1 s& B: \
(CONCEPT ONLY)
+ q. W9 L/ l" p' n* ma. Master member is selected based on member’s priority. **
* ?( X; Y; g0 ?' xb. ???" L( Y( Z* ~: a4 Y# {5 l
c. ???5 E" k5 `% Z( L4 b
d. ???
" V0 P" d0 x* u2 H/ LAns: A2 W5 D9 B- I5 c5 _% z0 D

1 l3 V9 }+ u' o' }+ U8 v; x" {97. What is the benefit of UDLD?
( x% q- v# g0 L. V; C. M8 g1 N$ U$ pa. provides backup for fiber0 O0 X* `( D7 F& m
b. help in preventing loops **9 B8 W" O2 k: t- |. _
c. removes loops+ y9 K( O# ~$ ]4 K
d. determines switch path( c* s  U4 D" N3 h  q9 z
Ans: B
% t* e' j  A" l/ L! q____________________________________________________________
2 }" S) ?( A9 J# X- R9 X98. When no spanning-tree bpdu guard enable is configured in f0/7, which is true?
, F  q7 ]0 @- a: Z- J1 U(There’s an exhibit that shows f0/7 receive BPDU.)
3 k3 s8 z: M6 u+ X' h4 f3 L  l) Wa. We have to configure shutdown and no shutdown.
2 g5 \$ }5 w5 {b. Have to use errdisable recovery.
% N1 g3 g$ y) r- x7 j$ R1 yc. ???1 s" Q& u6 Y% J( H, t1 O# C
d. ???
9 `. i/ T5 s; T7 ^- C, VAns: A3 @( _$ h: r/ w% Z* v
QUESTION 99, Q+ S8 d" {; W0 x. s/ b
EXHIBIT INCLUDED.- k- _6 z: e) i; _- J! }
An exhibit with spanning-tree. Protocol used was IEEE. (Choose two.); j+ L$ i5 S( l2 x7 ]
A. The command spanning-tree mode IEEE was implemented.' W+ Q. ~3 D7 Y* G6 R
B. The spanning-tree mode is IEEE.
2 g$ X  p0 g4 ~+ ?' O% nC. NA
+ H& Y  E" c2 B$ mD. NA
+ }4 a. N% U; \- hCorrect Answer: AB
  Z. U* I1 i( x8 ~7 r& W$ l+ aSection: (none)9 c$ R7 g$ U2 {! V0 u! }1 \
Explanation
8 l: X7 r  m  x, ~Explanation/Reference:; q9 t: |& w2 A* P0 O
QUESTION 100; r0 f+ J% @/ P9 _& y
A question about the priority of a Stackwise switch.
8 i# C- m0 H& A& P(CONCEPT ONLY)3 W6 J3 E, u, o+ S' F, b8 p
A. Master member is selected based on member's priority8 W- j) Z' L& e2 Y  T( a! O" m
B. na
" d6 E3 k) f) W5 \. IC. na5 L6 t9 Y7 \  S
D. na$ ?) F0 E9 ^0 G1 S1 x
Correct Answer: A
) j7 ]1 ?% A3 Y7 l5 E* XSection: (none)
& J" v: f) [" Q% s, uExplanation0 |# T; v6 Z7 m
Explanation/Reference:+ T& z1 T2 Z. t! s6 ^
QUESTION 101
! |' k* t( x% pA question about port number and multicast address of HSRP.
5 l0 \- p- L" _% Z1 E, i' `! \(CONCEPT ONLY)
' d" }- n+ e# a( v& uA. HSRP uses multicast address 224.0.0.2 and uses UDP port 1985
8 W+ Y) V" q% P; f0 k& L( I4 w6 SB. na* I( I5 |' |- ^4 x
C. na
+ W' |- w) ]- v1 dD. na8 b& @" l7 K  ^6 h# Y
Correct Answer: A  m8 I& T; D% D+ I; k
Section: (none)9 \$ L7 G- F( X) q  o% z
Explanation6 @- J6 z/ \$ e
Explanation/Reference:2 J/ u. T9 s! E0 G; k1 y
QUESTION 102
5 n0 l) C! h/ d* J) BA question about the port number and multicast address of VRRP.
5 V2 e' E' z% c. T' t(CONCEPT ONLY)+ O. p: k' R8 x# n5 {( M. p
A. VRRP uses multicast address 224.0.0.18 and uses UDP port 112.
/ w: m5 N1 y9 v4 o" L* CB. na
! U% F. `) f0 @+ XC. na
9 q2 k1 c! h4 {# D( h/ x0 cD. na% ?' g8 i- a2 X- k' r& v
Correct Answer: A
9 k, Y" }4 E2 g1 {$ E( pSection: (none); W, |6 q/ x% O& A7 z# W6 t" F1 D# ~% y
Explanation) v3 r, J6 v+ N
Explanation/Reference:
" }5 ~' n* a+ ^) AQUESTION 103
* q7 Z( ^7 Z  h: s/ bA question about the number of Active Virtual Gateways (AVG) that can be used.# ?7 N2 h  G$ u$ k$ h# o
(CONCEPT ONLY)
* e% M6 x4 a4 H# A  I' bA. 1 - only one can be elected on a switch.! e( a. P- A& F
B. na  J7 m# y* ~0 b1 L! D+ n6 c
C. na! Q) i! I' t, g2 l2 D
D. na
* e) u2 m' d8 r) W% l4 F8 ~Correct Answer: A+ R* M5 ^" H7 P# B
Section: (none)
9 |  a6 H  F8 }/ r# K# Q2 w- e5 E9 UExplanation
. |& w6 @" V/ W; r; w- f* AExplanation/Reference:
% x" y% |6 @( f: u$ g% X" W! _% UQUESTION 104& w4 r" q- E& F& @7 M
A question about the port number and multicast address of GLBP.
* x, ?( w: @$ X% P) V(CONCEPT ONLY)
( A5 P9 y. O* ^A. GLBP uses multicast address 224.0.0.102 with UDP port 3222.
1 Q2 U) r4 F5 s* j9 iB. na5 j1 ]' `7 h! d0 @8 `
C. na
2 m$ }2 i3 U  L$ A( Z; ~& w1 AD. na& F# R' f+ ~2 n& {+ m- M
Correct Answer: A
/ W6 W4 N- w7 P+ v* H, D) d2 \Section: (none)
2 D# g% q: }; j" w' p/ T5 ^Explanation
$ V5 s7 N* s' x  H& vExplanation/Reference:. V  a" d+ Y, N; N* N
QUESTION 105$ B+ a" u0 w% B  T; v
Behavior of an access port when a tagged packet is received other than the. r2 u2 ]; e: E1 `: Q8 m% i, L( O" M
access VLAN value.
% N# W" a7 k8 z. O" W- y$ @A. Tag is removed and packet is forwarded of the VLAN mentioned in the
' `- i5 ]: C/ |1 L& C- Gtag.0 o" x! u- r. S& @: K2 e3 _
B. tag is removed and packet is forwarded on the VLAN of the access port
8 n9 E" F( h; V0 [& t- F' W( FC. Not Available
- `6 n/ }, I" E: W% ?) X' m) xD. packet is dropped0 w. ?' G2 ^5 k% T7 B3 d# ~$ k8 I
Correct Answer: D
$ i1 G% ]6 v+ M. {1 h" ISection: (none)
; y( K+ {8 n) o8 u  {3 H3 GExplanation
$ c. C& }5 Z, T" F5 M. z, yExplanation/Reference:$ \3 U% Y: c; Z% I# w
Answer: D6 c1 C% m$ M8 j# j9 s6 F
QUESTION 106
/ d9 C+ K: g1 l2 l: y7 L5 g- l+ FRefer to the exhibit
' {* ?1 S0 K( G3 u1 y RatedR_Cisco_300-115.jpg ) Y2 Q6 ?4 l0 h( U
A network engineer deployed an older switch with the same spanning-tree
0 ^' P- o+ O6 f- H; |1 ^) M8 epriority as the existing root, which caused a network outage. In which two
( U. B/ f. S' ~7 U4 m, k: `locations should the Spanning Tree protocol root guard feature be
# B/ t, p* S2 R; M2 R8 G% ^implemented? (Choose two.)
) d2 T; |; u1 e- x: }$ \A. On the designated root switch downlinks to the access layer.) @9 c' f, `) d
B. On all of non-root switch facing ports of the access layer
1 r3 }, F8 w! w# J" w2 `/ mC. On the access layers root facing ports& I' {. z% M. Z8 a" J
D. On Layer 3 boundaries in the distribution layer7 X$ x/ A% t6 }' J( j$ ~$ B
E. Globally on all network switches.. d( B2 ^1 v) b. B8 a
Correct Answer: AB0 F7 p. o" }$ S! r' R. n, |
Section: (none)' N1 r$ W+ }1 f1 g
Explanation
( u: r' Z1 Z# N2 FExplanation/Reference:
( O: D- ~* D0 ^: }9 l# tAns: A,B4 u$ ?9 G6 r8 e  K( I" z
QUESTION 107  }6 P% W* s  g9 p3 ~( S
A question about UDLD.* Y* [* K2 ~2 W* r4 o
udld setting0 Q  Z& d: Q$ n2 ]/ O' C* q7 c+ L
udld setting
8 O4 _* C* t% |& P) E2 |int f0/5( B7 r  R( A* k) I" e7 i
udld setting aggressive
1 i- p$ d' `% [- TWhat happens if interface f0/5 has been damaged?9 [% P& m1 d0 E  q, l
A. Other interface will recover.
# _0 h2 p/ N; y( P3 eB. All links go down
! c& o3 S, D# G+ E& U3 D& ?. ^C. link stays up
/ N+ b) J; @+ `) s% MD. NA6 C9 w7 I" J- Y) ^/ _
Correct Answer: A% ?' R+ P' f" [% F$ D, Z/ Q
Section: (none)
2 R( j$ s, J* k, c: HExplanation
+ S3 d4 y0 V; DExplanation/Reference:5 Z: B. }$ X4 |! ^
Ans A
( o* f0 f7 r# z% i3 L$ ^QUESTION 108/ t! s; h( H) m5 Z. `7 A4 D
Question about the difference between RSPAN and SPAN.
# c! A& G/ T; U* GA. Monitor port; ?; I3 w! X/ {! I5 _
B. access port/ h/ V5 c2 B- e' }; F
C. forwarding Port" G1 z" v5 o. B6 {% r
D. destination port
+ `( @, V. Z- pCorrect Answer: A
: u- ?4 l& d. m! b! ~) aSection: (none)
+ i6 d2 r- ^6 a" T2 eExplanation1 W# w! m/ I  e; K# t0 l# b: F
Explanation/Reference:2 ?9 Q2 w4 [# E0 v" Y6 r0 U( v4 ^7 `
Ans: A
; X" F; S# ~( RQUESTION 109
% j( F+ v  @( g' i4 a. U1 W" J2 E: H& ^Which option is the maximum frame size for an 802.1Q frame
! y2 F: M. n* NA. 64 bytes
0 C5 l- h' O( R( [  S7 o, }3 H: [7 iB. 68 bytes
* Q* F/ y9 h5 K7 q; N' IC. 1518 bytes
1 Y% Z6 z6 _: v# s: mD. 1522 bytes) c  u9 p& I+ r* b& V
Correct Answer: D
2 W6 m; w5 c: ?) Q4 ^$ D9 Y9 e  _5 BSection: (none)0 h. y; l9 U1 t
Explanation5 c7 K0 U3 v5 g+ y7 I
Explanation/Reference:% j' d( V6 R9 f/ _9 ^& B
Ans: D
5 w( K* ^! k8 W4 B9 dQUESTION 110
/ y  p) [  l+ g7 I2 {Which option is the minimum frame size for an 802.1Q frame?
8 H5 y% {# J5 l- _A. 64 bytes+ N: ?, A5 f' x. D5 Q) B# j
B. 68 bytes' }7 s9 R$ X- x4 J) b
C. 1518 bytes
( L# g% O: p( {9 yD. 1522 bytes  M/ g5 H+ ~: U( G; Y
Correct Answer: B
1 h, H4 c9 j0 ^% X( p. h+ ?" [" h; sSection: (none)( {& @9 _$ |" A* s* x( b$ z
Explanation
8 a1 ]  E3 x; ?0 Y$ J& n3 ?Explanation/Reference:
4 M" N8 d7 X. C2 Q4 xAns: B
2 r9 i) k1 J, q7 o7 A% Q; [QUESTION 1119 k0 g* Q0 K: Y
What SPAN configuration is required to enable on a switch?
- {# Y' z1 C" l# E5 D: q$ JA. A monitor VLAN is created for the SPAN traffic.' Z- J% @& {" x. _
B. Configure a source and destination port: J8 m5 e; f3 M/ t2 ^
C. Disable VTP pruning on trunk links- g! w% Z9 [  ^  k  c0 D6 t
D. NA
* o- x7 E% T1 }" }/ C" f8 yCorrect Answer: B- l% w5 t  V. a8 U% J
Section: (none)- l; ~" l+ u7 g* B* o; `5 H
Explanation3 G' \7 E) H6 g$ p$ e0 {
Explanation/Reference:+ G' W% ^% o1 e
Ans: B" Z3 q$ F8 z+ h9 z3 Z+ T' `
QUESTION 1125 w  E' l8 G+ ?- \
Refer to the exhibit.
: F9 a* R( K; M( _: D(Picture was showing from CLI “show spanning-tree vlan xx” that running on mode" \/ a' u2 [  A
rapid-pvst).+ G' w2 |: H9 g+ k% H6 w. r/ Q. ^- B# q
If you have a new switch (that runs spanning-tree mode pvst+) connect to the exist
/ X+ [5 k2 d* [( n6 O" A( I, Cswitch, which statement is true?( ]0 G% \6 y8 G( V$ g
A. It will not working between two switches
3 p+ I- r: f) ?% ]$ m3 \9 g7 Q, pB. It will work, the new switch will communicate exist switch with PVST+( S) d% c- ~' x3 k* P$ u+ @3 @9 ~
C. It will work, the new switch will communicate exist switch with Rapid-PVST) P8 o* O% Z# k. \' Y+ E
D. NA& r( j( M& h$ d7 ^! |4 w" i- S
Correct Answer: B& i& t, C, J4 J1 e; Z( {+ X- I
Section: (none)
- O% [* P- a3 \; HExplanation  C7 y6 A# O8 U! ~' @- m
Explanation/Reference:
: X- s& w& X% ~Ans: B: [7 g% x  A2 J* L8 M: r# D6 r
QUESTION 113
6 t# C7 p/ k% dAbout VRRP configuration. Which statement is true?
' \6 V0 ]) L% c# c* D' F" Z[Question just short like this because in each option will have CLI for config 1: R+ A: h8 [6 H, ?4 r9 ?# H
group of VRRP]
: t4 U- \$ c* X, U$ B8 _( hA. Switch-A(config)# interface vlan 1% h9 c, v. \6 c6 C5 v* c
Switch-A(config-if)# ip address 192.168.1.10 255.255.255.0, T: u+ f4 a' [( d- ^  J7 j' @
Switch-A(config-if)# vrrp 1 ip 192.168.1.1+ {& y4 L7 ^1 V2 [3 [6 P6 r
Switch-A(config-if)# vrrp 1 priority 200
( `, j3 C$ g; J& C* ?3 O6 ~) T1 JB. Switch-A(config)# interface vlan 1
1 e8 F* c# r  P8 w8 [' Y% WSwitch-A(config-if)# ip address 192.168.1.11 255.255.255.0& @6 l5 z5 N1 c) E) ^
Switch-A(config-if)# vrrp 2 ip 192.168.1.1! l5 u/ v9 @. J6 f) V+ d
Switch-A(config-if)# vrrp 2 priority 100& i# J2 {0 {: [; V/ f
C. Switch-A(config)# interface vlan 2
- ^7 I6 }- g9 I+ |Switch-A(config-if)# ip address 192.168.1.10 255.255.255.0
- q( x" h# u1 x6 c. h1 q# CSwitch-A(config-if)# vrrp 1 ip 192.168.1.10( a  T* e- I& O$ u- R) h7 g  ]
Switch-A(config-if)# vrrp 1 priority 1008 ~" |- Z4 ]8 c* U) l8 k
D. na
- t; ]( i; Q  e  ~% y7 z7 k: BCorrect Answer: A
$ ^' o% h" Y: r9 T! g, \% N4 |Section: (none)+ O2 I* I& i3 D  x' g5 q$ b2 d
Explanation
2 A4 q# ?( H, c, H4 `5 F% mExplanation/Reference:
/ Z! n2 W# p9 g. R; S  eQUESTION 114
+ `3 A, u8 d/ X+ H1 UQuestion about voice vlan?% q2 Y+ C) ]$ j4 n
A. Disable by default9 b6 b! M% h6 P/ k% L
B. enter on
5 z2 J; Q+ n- J& s! W1 E( B# _+ Q! O, EC. CoS value of 5
4 V1 }* L5 C- L8 X: TD. Need manually enable
" k+ H( `( }% W5 `& x/ D6 Y' yCorrect Answer: AC
: g6 b; h+ l& k; {  A; lSection: (none)
: C" g+ m0 Z8 f+ q, T* cExplanation
' o3 N7 B) h- N5 I1 vExplanation/Reference:1 l4 X4 Z, n; X# p( I* |5 A
The Answer should be A and C. The Default CoS value is tagged by 5! V, O: P/ a$ h. C
QUESTION 1152 J6 J5 m6 Y/ _3 o6 i
Your company wants to connect an internal switch to the uplink provider switch.( e, |& \7 r9 `" u$ a3 m
What method / feature / functions you need to enable to prevent initial / potential
& X/ m0 o7 @! O' b7 Q3 C* Zbroadcast of internal information/topology? (forgot the correct wording)
8 b; k2 Y! {4 C) N  jA. BPDU Filter- i% Z/ J7 ]+ g; h% n
B. BPDU Guard
1 Z# ^# g+ W, K1 h: y" T* A3 ]% F& bC. BPDU Loop7 j7 X  @* H) N: N, _
D. BPDU bridge
; p, V+ @, @1 O( P6 U# O/ g: E' z. CCorrect Answer: A3 e+ M5 V+ C$ Y& T5 Y" j
Section: (none)
7 }8 S, H, J4 mExplanation. v6 C* ?- A9 W
Explanation/Reference:/ W0 q# @! [$ P9 z0 Q; `, r( l) J
Ans: A
. O$ S1 e) w5 Y  {$ y, |7 X# o! WQUESTION 116
1 K$ u3 S, Z7 o! S5 b' VEtherChannel question. Which combination are possible? (Question looks
4 T. e7 t) |- N  [incomplete)5 ^. b: R+ g/ R. }3 f
A. passive-passive
5 d' |2 }0 Q) v* a) zB. desirable-active) H+ T% O' ?% ^8 t$ _. w. x. ^
C. passive-auto
% N+ N% p4 i1 h! sD. desirable-desirable
3 v! U% @1 ]; J( n3 p% \" Y' nCorrect Answer: D, n3 Q/ d6 j; _- N
Section: (none)
- ~+ @. Q* p6 j  CExplanation. y- x9 d" [1 w6 G+ w% }0 H" ^  D% p
Explanation/Reference:
/ c3 A* {' J" _Ans: D
, h. H1 W5 e7 rQUESTION 117
2 H: f5 ~8 o! fEtherChannel guard. What happens to the port when it’s misconfigured?5 s+ P$ K: l6 J1 Q! X
A. channel gets disabled: W4 h7 S# ^1 D" d% c' x$ N
B. Goes into err-disable
6 F: g: b  r9 p% |C. shutdown
! w6 }8 F- h% G  `4 iD. Works normal
. u* t1 |1 y6 }8 E; x4 sCorrect Answer: B7 [3 k. Q# a: f$ `3 @" d
Section: (none)
% a  [* H/ m7 b* X6 [Explanation5 K* `5 \" U  C; D' A1 M! a
Explanation/Reference:6 }8 y0 `, `6 s. c  f
err-disable6 L* X$ u2 F  s" G; Z
QUESTION 118
0 u3 n0 y. |7 Z' Rspanning-tree extend system-id
* z9 ]9 g9 J. z2 f?????
2 S- k8 N+ ^$ ~+ {spanning-tree backbonefast
" l- \+ q+ h4 P* f: RThe question was something like what does the configuration do?. |  c5 e# u, |" D" l) o
A. It used extended VLAN1 P6 ?8 w) p, k
B. It used to protect Root switch
$ I1 _+ Q' j+ U3 W# F3 Z3 X" WC. extend system hardware: d& c- u" @6 x% N4 \+ t
D. NA- \" h/ W% r* F: Z5 }8 u: w8 @0 J8 ]
Correct Answer: A
* f0 N6 p/ ^, O- c' ~Section: (none)% f  D: b) O. e3 w- V
Explanation
& L6 \5 c/ U* O+ L" Y: P8 s* R) l* aExplanation/Reference:
8 H# V( R/ S9 ~9 e- MAns: A
1 B. p. }6 Z4 T' T3 l; ?8 ]QUESTION 119
6 b6 k; A* v4 V' NA question about CDP., @  n' a) g) ]) s
A. CDP works on L2
) Q; y* X1 I) n/ l0 ^B. CDP uses TLV to deal with native VLAN
% Z" K/ ?. {8 g! W# IC. CDP works on L12 ?- m+ v' F9 C/ g; m7 X
D. CDP with SNMP* S/ t6 v, C2 [7 ^: ~  Q
E. CDP sends extended vlan info* ]4 P1 n8 Z. H1 N# e* J) H
Correct Answer: AB
0 `+ Y# w& v# x/ A- ~; G& _Section: (none)) Y* B9 `2 {+ D$ z& b& ^$ _
Explanation
$ H  u% d0 j" {8 u9 QExplanation/Reference:. A. y  o* _1 V: `7 _9 f
Ans: A,B
  D! B8 [0 h5 |9 N4 j* ?________7 J% D% _' }  a& [6 O, _) l
QUESTION 120; N6 _  W8 \! e, }/ U) L, M
A question about EtherChannel compatibility modes. (Choose two.)
* F$ A* B0 p& nA. passive-passive" ?% V/ l; f9 ^* j" B
B. active-active
& C( q- E, P* s4 eC. desirable-desirable& Z! ~0 a- e; M3 i2 X  G; s4 k' T6 x0 C
D. active-passive# o2 I3 ?8 P3 g( E7 c7 l& {! S
E. active-desirable" ^% [8 r$ E: Y( L
Correct Answer: CD9 T" C/ e1 \+ `6 z) x
Section: (none)
, Y/ k" Z! m9 X3 WExplanation  m4 R, F3 ~& E% ], Q  u4 v, r
Explanation/Reference:
# b! E, R5 z, a; \+ B1 AAns: C,D
+ r2 V: u) _5 ^) p. K- U9 JQUESTION 121% x4 C8 F4 ]# B# j- N: ]7 A
There was an EtherChannel configured and one of the port was used as SPAN) G  K0 y  j4 [0 R# b
destination. What will be the result?
& X6 t* }4 D8 Q5 H7 sA. the etherchannel will not be operational because the port cannot be used as SPAN) J) `. u6 o" [6 l+ J8 V
destination
+ J3 D- x# f8 w1 D( IB. etherchannel will discard the port used
+ s, l  Y$ g+ ^; Z0 k; x+ MC. the etherchannel will shutdown1 Q# F9 y4 G; O( e6 `6 Z
D. NA$ e* U; V( ^; Q+ |9 u6 P7 r* o% K
Correct Answer: C
' |3 m0 m4 @# W5 f( WSection: (none)
' W" f5 v( W( p! Y+ oExplanation
) n* F3 n) V- A/ C3 j$ O/ }+ [9 bExplanation/Reference:
0 M+ o6 S8 g2 a& j* NAns: C9 i8 I; p$ X+ b# ?8 x
QUESTION 122
- ~, A% q( ]: kA question about interface gi 0/1 being in errdisable and how do you find the, ]; w) n" P4 O2 w: {
reason for it being disabled
5 q6 w8 l& H, a4 T' K2 eA. show interfaces g0/1 status- A( X& s& [. L0 H5 J- _
B. show run interface g0/10 i+ d/ E' Z& P3 Z4 w: H8 [* ?
C. show ip int brief# r8 F/ j3 V: Z* H' }2 }1 X2 E
D. show log
/ w- W% i* l( w3 B4 L3 BCorrect Answer: A" C5 d0 {8 }+ f+ o0 a& x; b1 R0 d

) k6 ^' K) |2 q' {; `
: s( D* x% N: {. M拖图题汇总:
) m5 J: A; Y% b& _7 ]1.        CDP / LLDP
* k. l, I" b5 W6 @CDP3 j6 O3 {# I2 J% |1 b
&#8226;        Default time between protocol frames is 60 seconds$ T$ K8 _9 K# [1 X+ p
&#8226;        Supports IEEE 802.2 and 802.3 encapsulation9 Y- o, q9 [, L/ n; q
&#8226;        Uses multicast address 0100.0ccc.cccc
5 {) U8 O2 X" ~# ?LLDP
; M- K1 M& h* o; C&#8226;        Default time between protocol frames is 30 seconds
+ N& b6 |* |4 J4 m&#8226;        Sends topology change notification+ \/ P) w9 x3 J  T
&#8226;        Uses multicast address 01-80-C2-00-00-0E" Y; g) k, x# P. S: l1 \
==========================================================) U1 _& C: j/ ~- H' p  x! Z
2.        BPDU Filter / BPDU Guard / PortFast8 t& {% m+ [2 e& w3 n0 s6 N
BPDU Filter
8 X/ {; _! @8 h! ~9 ?) \, O&#8226;        Disables Spanning Tree on a configured interface9 d- v  r. U7 z
&#8226;        Protects configured interfaces from sending and receiving unauthorised BPDU frames
" P  F+ p/ }& |6 KBPDU Guard3 q- g6 @- y3 b6 k9 H, T
&#8226;        Protects configured interface from receiving unauthorised BPDU frames( E, p* ^& e, A, J) L
&#8226;        Shuts down port and places it in err-disabled mode
, p: O+ [8 r9 h" ?; I' `PortFast) p7 R3 P3 n' U8 q
&#8226;        Configured on access ports with a single host device1 N9 {4 R1 k: k$ \; a, H: V( ?
&#8226;        Configured trunk interface goes immediately to forwarding state from blocking state
' y$ {/ `6 \( d' |* Y==========================================================
% [+ G* N& i8 g0 }3.        MSTP / PVST+ / Rapid-PVST+2 @6 \7 Q  f4 p' a/ i
MSTP
* d! H% A' A: s$ {. ]&#8226;        Based on 802.1S0 Y5 n' i; P5 V* H( D, y3 u4 m
&#8226;        Maps VLANs to instances
+ o1 H/ `2 p% k8 p. `6 [PVST+
# \- ~0 ~9 j2 o&#8226;        Based on IEEE 802.1D: w* F+ b$ H; q$ ?
&#8226;        Default STP mode
' r8 u( r  c% c# g0 IRapid-PVST+
2 j" |/ T- M6 ~" y+ s* i( q&#8226;        Based on IEEE 802.1W
" n5 t& P' m1 p  I" G" S4 [, g( R&#8226;        Discarding port state
7 p8 o3 S6 {: Z7 C8 r8 o==========================================================( S$ C: M* ?5 r) A; ?
4.        Forward / Hello / Hold
/ B; `7 I: q2 M9 T$ t+ i" GForward
3 [9 f2 G3 G" P. q. t( k&#8226;        15 seconds( b3 @# N# M( K) W* L8 j  b# [% ~
&#8226;        Listening or learning, J6 P" P( K( Y6 W& @; c
Hello' ^) {: S: t! f0 }/ ^6 o
&#8226;        10 seconds
* ~$ O+ q1 j/ @* C&#8226;        New BPDU0 ?* o6 M" B9 i% E+ E: t2 U
Hold3 D- P9 Z" ~4 C8 P/ B
&#8226;        20 seconds6 W, g1 p8 |% g
&#8226;        Time when BPDU expires
( y$ G, N0 [3 ~: x& Q, ~$ j, s* b==========================================================$ {  y+ z# S, X7 V0 `
5.        Port Cost / Switch Port Priority / Switch Priority
- g* h: ?& q) G1 XPort Cost7 z: m* I  i! h
&#8226;        8 default is being the interface value, a/ s* H% v8 T$ o+ B- z" Z
&#8226;        Range 1 – 200k (200,000)
. `7 S9 t1 E! u, vSwitch Port Priority3 J$ a6 k+ b. P8 L* n) y0 n
&#8226;        Default value is 128  f1 i' y1 Z5 f/ B1 ^
&#8226;        Multiple of 16
# h2 d1 M! {) X0 W* v3 rSwitch Priority7 P6 V  n* q) ?8 e& c* R* a
&#8226;        Lower the better5 D) T" K$ \- K3 J9 l9 C3 b- p! N
&#8226;        Multiple of 4096* D/ ]' B0 q7 ?9 ^
==========================================================
) z- v# \- |, ]* @3 e7 P5 `& M6.        Guard Loop / Guard Root
: Q# X  M: X  q: x7 |Guard Loop6 \3 D0 d0 L+ w' N& a; ]" |+ M+ |7 C
&#8226;        Detecting unidirectional switching links8 J6 m! a5 o2 ~6 y& \8 e
&#8226;        Port self-recovery$ A0 V) v8 g* W; t4 k5 B
Guard Root4 R, j7 `6 E7 [" p+ V3 q: {
&#8226;        A better BPDU disables the port as err-disabled0 G+ i1 k! A2 Q) R3 _+ y
&#8226;        Protect designated port from receiving superior BPDU" b& i: F, p4 I
# |% V, r9 o+ v' ^0 @

& t" g9 R: y2 ^5 h0 k
1 ]5 o& j% x7 }3 L) u4 B$ i; k) L$ {1 b9 J0 o
来源: CCNP交换(300-115)考试新题汇总(5月24日更新)0 g/ u- O* I8 ^  y9 r9 i6 d
发表于 2017-6-5 14:04:09 | 显示全部楼层
xiexielouzhu
沙发 2017-6-5 14:04:09 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 14:07:32 | 显示全部楼层
感谢乔帮主,请问能不能搞到描述细致一点的题呀,感觉题目描述有点过于模糊了/(ㄒoㄒ)/~~答案是很详细
板凳 2017-6-5 14:07:32 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 14:25:33 | 显示全部楼层
ddddddddddd
7# 2017-6-5 14:25:33 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 14:52:11 | 显示全部楼层
thanks for sharing
4 V( x8 E! p8 L# t- g
9# 2017-6-5 14:52:11 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 14:52:42 | 显示全部楼层
终于等到了
10# 2017-6-5 14:52:42 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 15:01:03 | 显示全部楼层
谢谢谢谢谢谢寻
11# 2017-6-5 15:01:03 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 15:01:09 | 显示全部楼层
谢谢谢谢谢谢寻
12# 2017-6-5 15:01:09 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 15:01:16 | 显示全部楼层
谢谢谢谢谢谢寻
13# 2017-6-5 15:01:16 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-6-5 15:18:05 | 显示全部楼层
thanks for sharing
14# 2017-6-5 15:18:05 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-9 14:39 , Processed in 0.084654 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表