300-115 - Implementing Cisco IP Switched Networks (SWITCH v2.0)
Go back to
Cisco
Example Questions
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
Configure trunk and access interfaces manually.
Disable DTP on a per interface basis.
Which gateway role is responsible for answering ARP requests for the virtual IP address in GLBP?
active virtual gateway
Which statement about LLDP-MED is true?
LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices.
Which statement about the UDLD protocol is true?
UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
After reviewing UDLD status on switch ports, an engineer notices that the." Which statement describes what this indicates about the status of the port?
The port is fully operational and no known issues are detected.
A new network that consists of several switches has been connected together via trunking interfaces. If all switches currently have the default VTP domain name "null", which statement describes what happens when a domain name is configured on one of the switches?
VTP summary advertisements are sent out of all ports with the new domain name.
Which authentication service is needed to configure 802.1x?
RADIUS with EAP Extension
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
normal and aggressive
What does the command vlan dot1q tag native accomplish when configured under global configuration?
Control traffic is tagged.
After the implementation of several different types of switches from different vendors, a network engineer notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which vendor-neutral protocol could be used to resolve this issue?
Link Layer Discovery Protocol
In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded?
300 seconds
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
switch(config)# errdisable recovery cause psecure-violation
When two MST instances (MST 1 and MST 2) are created on a switch, what is the total number of spanning-tree instances running on the switch?
3
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state?
UDLD port is configured in aggressive mode.
While working in the core network building, a technician accidently bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did not recover. What solution allows the network switch to automatically recover from such an issue?
errdisable autorecovery
Which action allows a network engineer to limit a default VLAN from being propagated across all trunks?
Manually prune default VLAN with switchport trunk allowed vlans remove.
Interface FastEthernet0/1 is configured as a trunk interface that allows all VLANs. This command is configured globally: monitor session 2 filter vlan 1 - 8, 39, 52 What is the result of the implemented command?
Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port.
Which statement about the use of SDM templates in a Cisco switch is true?
SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network.
An EtherChannel bundle has been established between a Cisco switch and a corporate web server. The network administrator noticed that only one of the EtherChannel links is being utilized to reach the web server. What should be done on the Cisco switch to allow for better EtherChannel utilization to the corporate web server?
Adjust the EtherChannel load-balancing method based on source IP addresses.
Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?
native VLAN IDs, port-duplex, hardware platform
A network engineer configured a fault-tolerance link on Gigabit Ethernet links G0/1, G0/2, G0/3, and G0/4 between two switches using Ethernet port-channel. Which action allows interface G0/1 to always actively forward traffic in the port-channel?
Configure LACP port-priority on G0/1 to 1.
When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?
DHCP snooping
Which First Hop Redundancy Protocol is an IEEE Standard?
VRRP
Which option is a possible cause for an errdisabled interface?
security violation
A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery Protocol, but it has several routing neighbor relationships. What would cause the output to show only the single neighbor?
The routers are connected via a Layer 2 switch.
What is the size of the VLAN field inside an 802.1q frame?
12-bit
What is the function of NSF?
provide nonstop forwarding in the event of failure of one of the member supervisors
After the recent upgrade of the switching infrastructure, the network engineer notices that the port roles that were once "blocking" are now defined as "alternate" and "backup." What is the reason for this change?
The new switches are using RSTP instead of legacy IEEE 802.1D STP.
Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a switch?
VLANs 2-1001
An administrator recently configured all ports for rapid transition using PortFast. After testing, it has been determined that several ports are not transitioning as they should. What is the reason for this?
STP is unable to achieve rapid transition for trunk links.
Which statement describes what happens when a port configured with root guard receives a superior BPDU?
The port goes into root-inconsistent state and stops forwarding traffic.
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
The command effectively removed all other working VLANs and replaced them with the new VLANs.
While troubleshooting a network outage, a network engineer discovered an unusually high level of broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of bandwidth used by broadcast traffic?
storm control
A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?
The interfaces are configured as Layer 3 using the no switchport command.
What happens on a Cisco switch that runs Cisco IOS when an RSTP-configured switch receives 802.1d BPDU?
802.1d does not understand RSTP BPDUs because they are different versions, but when a RSTP switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the two switches run 802.1d to communicate.
Which command would a network engineer apply to error-disable a switchport when a packet- storm is detected?
router(config-if)#storm-control action shutdown
Which feature describes MAC addresses that are dynamically learned or manually configured, stored in the address table, and added to the running configuration?
sticky
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?
Configure a static DHCP snooping binding entry on the switch.
Which command correctly configures standby tracking for group 1 using the default decrement priority value?
standby 1 track 100
A network engineer must set the load balance method on an existing port channel. Which action must be done to apply a new load balancing method?
Configure the new load balancing method using port-channel load-balance.
Which statement about Cisco devices learning about each other through Cisco Discovery Protocol is true?
Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC.
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?
A DHCP snooping database agent should be configured.
What is the default value for the errdisable recovery interval in a Cisco switch?
300 seconds
Which feature must be enabled to eliminate the broadcasting of all unknown traffic to switches that are not participating in the specific VLAN?
VTP pruning
Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces, including the community and isolated host ports?
promiscuous port
What is the maximum number of 10 Gigabit Ethernet connections that can be utilized in an EtherChannel for the virtual switch link?
8
For client server failover purposes, the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning-tree feature satisfies this requirement?
Spanning-Tree PortFast
Which type of information does the DHCP snooping binding database contain?
untrusted hosts with leased IP addresses
Which statement describes what happens if all VSL connections between the virtual switch members are lost?
The VSS transitions to the dual active recovery mode, and only the new active virtual switch continues to forward traffic.
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server. Which option is the cause of this issue?
The DHCP server does not support information option 82.
Study Guides