Sunteți pe pagina 1din 22

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Which command do you enter on a device so that users are automatically placed

in enable mode after they authenticate with TACACS+ ?

A. aaa authorization exec default group tacacs+ if-authenticated

B. aaa authorization exec default group tacacs+ enable

C. aaa authorization exec default group tacacs+ local-case

D. aaa authentication exec default group tacacs+ if-authenticated

Correct Answer: D

Which two statements about recovering error-disabled interface are true ?

(Choose two )

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

A. Reloading the switch recovers it from the error-disabled state

B. The show errdisable recovery command displays the conditions for which

autorecovery is enabled

C. Removing and reinserting network media recovers an interface from the error-

disabled state

D. If errdisable recovery is configured,the interface is recovered automatically

when the root problem is corrected

E. Errdisable recovery is enabled by default and operates normally without

additional configuration

Correct Answer: BD

In which two circumstance does a port security violation occur?(Choose two )

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

A. when the CAM table overflows with dynamically learned MAC addresses

B. when sticky MAC address learning is enabled and the port has a link-down

condition

C. when a port with a secure MAC address attempt to use a different port in the

same VLAN

D. when the same MAC addresses enters a port more than once

E. when the port has received more MAC addresses than allowed

Correct Answer: AC

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Which two new feature are included in VTPv3 ?(Choose two )

A. VLANs configured for token ring are now eligible to participate in VTP

B. It can be configured to prevent the override of the VLAN database

C. VTP now support MD5 passwords

D. VTPs can now be configured in off mode

E. VLANs in the extended range are now eligible to participate in VTP

Correct Answer: DE

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

which three features can be optimized by using SDM templates? (choose three.)

A. access

B. port security

C. routing

D. DHCP snooping

E. trunk

F. VLAN

Correct Answer: ACF

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Which two tasks must you perform to enable DHCP option 82 on an untrusted port?

(Choose two.)

A. Enter the ip dhcp snooping information option replace command to enable

DHCP option 82.

B. Enter the ip dhcp snooping trust command to enable DHCP option 82

C. Enter the ip dhcp snooping information option allow-untrusted command to

enable the untrusted port.

D. Enter the ip dhcp snooping information option command to enable option 82

E. Enter the ip dhcp snooping trust command to enable data insertion DHCP option

82.

Correct Answer: CD

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Which statement describes what happens when a switch enters dual active

recovery mode?

A. The switch shuts down and waits for the VSL link to be restored before sending

traffic.

B. All interfaces are shut down in the formerly active virtual switch member, but

the new active virtual

C. The switch continues to forward traffic out all links and enables spanning tree

on VSL link and all other links to prevent loops.

D. The VSS detects which system was last in active state and shuts down the other

switch.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Correct Answer: B

Which two statements about HSRP, GLBP, and VRRP are true? (Choose two.)

A. HSRP is the preferred protocol to be used on multivendor environments.

B. VRRP has one master router, one standby router, and many listening routers.

C. GLBP allows for a maximum of four MAC addresses per group.

D. HSRP supports up to 255 groups on the same switch or router.

E. VRRP is a Cisco proprietary protocol.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Correct Answer: CD

When a Layer 2 EtherChannel is configured, which statement about interaction

with the Spanning Tree Protocol is true?

A. Spanning Tree uses only the member ports for forwarding.

B. Spanning Tree uses the port channel for forwarding.

C. Spanning Tree uses the port channel and member ports for forwarding.

D. Spanning Tree does not use port channels in loop prevention

Correct Answer: B

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP

snooping database. What is the solution to avoid the snooping database from

being

rebuilt after every device reboot?

A. A DHCP snooping database agent should be configured.

B. Enable DHCP snooping for all VLANs that are associated with the switch.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

C. Disable Option 82 for DHCP data insertion.

D. Use IP Source Guard to protect the DHCP binding table entries from being lost

upon rebooting.

E. Apply ip dhcp snooping trust on all interfaces with dynamic addresses.

Correct Answer: A

Which statement about the configuration of a trunk port as the source of a SPAN

session is true?

A. Only VLANs that are configured individually as SPAN sources are monitored

B. All VLANs in the trunk are monitored.

C. The trunk is errdisabled automatically.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

D. All VLANs in the trunk are monitored, provided the SPAN destination port is a

trunk.

Correct Answer: B

Which feature prevents from sending BPDUs on a portfast enabled port?

A. BPDU guard

B. PortFast

C. root guard

D. BPDU filtering

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Correct Answer: D

Which feature can prevent ARP poisoning attacks on a device?

A. Dynamic ARP Inspection

B. DHCP snooping

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

C. MAC snooping

D. CGMP snooping

E. Dynamic MAC Inspection

F. Static ARP Inspection

Correct Answer: A

Which mechanism is specific for RSPAN and not for SPAN?

A. source port

B. monitor port

C. reflector port

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

D. redundant port

E. destination port

Correct Answer: C

Which two statements about RPVST+ are true? (Choose two.)

A. It automatically enabled uplinkfast and backbonefast

B. It elects one root switch per VLAN instance

C. It supports two STP instances per VLAN.

D. It is incompatible with spanning tree portfast.

E. Backwards compatibility with 802.1d is not supported.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Correct Answer: AB

Where does a subordinate switch in a stack store the information about VLANs?

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

A. NVRAM: vlan.xml

B. FLASH: vlan.xml

C. NVRAM: vlan.txt

D. FLASH: vlan.txt

E. NVRAM: vlan.dat

F. FLASH: vlan.dat

Correct Answer: F

If all devices on an EtherChannel are sending traffic to a single MAC address, which

two methods of load balancing on the EtherChannel are preferred? (Choose

two.)

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

A. destination-MAC

B. src-dst-MAC

C. destination-IP

D. source-MAC

E. source-IP

Correct Answer: BE

Which two statements about sticky MAC address learning are true? (Choose two.)

A. A single device can learn up to three sticky MAC addresses.

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

B. Devices can learn sticky MAC addresses dynamically.

C. Learned addresses are saved to the startup configuration file by default.

D. Learned addresses are saved to the running configuration by default.

E. Learned addresses are automatically preserved when the device reboots.

F. It can be used only on devices that operate in a single layer.

Correct Answer: BD

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Drag and drop the statement about SPAN ports from the left onto the correct port

types on the right.

Correct Answer:

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Drag and drop the statements about remote security databases from the left onto

the correct security database types on the right

Correct Answer:

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie


Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

Leader of IT Certifications

Website: https://cciedump.spoto.net Email: support@spoto.net

phone / WhatsApp: +86 18344981205 Facebook page: https://www.facebook.com/spotoccie