Sunteți pe pagina 1din 504

CCNP-SWITCH_IPHelper_August_2019

Number: 300-115
Passing Score: 790
Time Limit: 120 min
File Version: 10.0

300-115 - Implementing Cisco IP Switched Networks

Updated - August 2019 by IPHelper

Exam A - MCQs - Cisco Official

Exam B - Simlet HSRP

Exam C - Simlet VTPv3

Exam D - HSRP Ferris Plastics


Exam E - HSRP Hotspot Certprepare

Exam F - Simulation Labs

Exam G - Drag and Drop - Official

Exam H - Drag and Drop - Concepts

Exam I - MCQs April-May 2017 - Contribute

Exam J - MCQs June 2017 - Contribute

Exam K - MCQs August 2017 - Contribute

Exam L - MCQs Sept-Oct-Nov 2017 - Contribute

Exam M - MCQs Dec 2017_Feb-March 2018 - Contribute

Exam N - MCQs April-May 2018 - Contribute

Exam O - MCQs June 2018 - Contribute

Exam P - MCQs July-August 2018 - Contribute

Exam Q - MCQs Sept-Oct 2018 - Contribute

Exam R - MCQs Nov 2018 - Contribute

Exam S - MCQs Dec 2018 - Contribute

Exam T - MCQs Jan-August 2019 - Contribute

Exam U - MCQs August 2019 - Contribute

CONTRIBUTED ONLY POOLS


THIS IS FROM CANDIDATES FROM CERTPREPARE BASED ON WHAT THEY
CAN REMEMBER IN THEIR EXAM.

REMEMBER THESE ARE NOT OFFICIALLY WRITTEN CISCO QUESTIONS.

Sections
Layer 2 Technologies
Infrastructure Security
Infrastructure Services
Mix QUESTIONS
QUESTION 1
What is the maximum number of switches that can be stacked using Cisco StackWise?
A. 4
B. 5
C. 8
D. 9
E. 10
F. 13
Correct Answer: D
QUESTION 2
A network engineer wants to add a new switch to an existing switch stack. Which configuration
must be
added to the new switch before it can be added to the switch stack?
No configuration must be added.
A. stack ID
B. IP address
C. VLAN information
D. VTP information
Correct Answer: A
QUESTION 3
What percentage of bandwidth is reduced when a stack cable is broken?
A. 0
B. 25
C. 50
D. 75
E. 100
Correct Answer: C
QUESTION 4
Refer to the exhibit.

Which set of configurations will result in all ports on both switches successfully bundling into an
EtherChannel?

A. switch1
channel-group 1 mode active
switch2
channel-group 1 mode auto

B. switch1
channel-group 1 mode desirable
switch2
channel-group 1 mode passive

C. switch1
channel-group 1 mode on
switch2
channel-group 1 mode auto

D. switch1
channel-group 1 mode desirable
switch2
channel-group 1 mode auto
Correct Answer: D
QUESTION 5
Refer to the exhibit.

How can the traffic that is mirrored out the GigabitEthernet0/48 port be limited to only traffic that is
received
or transmitted in VLAN 10 on the GigabitEthernet0/1 port?
A. Change the configuration for GigabitEthernet0/48 so that it is a member of VLAN 10.
B. Add an access list to GigabitEthernet0/48 to filter out traffic that is not in VLAN 10.
C. Apply the monitor session filter globally to allow only traffic from VLAN 10.
D. Change the monitor session source to VLAN 10 instead of the physical interface.
Correct Answer: C

QUESTION 6
Refer to the exhibit.

A network engineer wants to analyze all incoming and outgoing packets for an interface that is connected to
an access
switch. Which three items must be configured to mirror traffic to a packet sniffer that is connected to
the
distribution switch? (Choose three.)

A. A monitor session on the distribution switch with a physical interface as the source and
the remote
SPAN VLAN as the destination
B. A remote SPAN VLAN on the distribution and access layer switch
C. A monitor session on the access switch with a physical interface source and the remote
SPAN VLAN
as the destination
D. A monitor session on the distribution switch with a remote SPAN VLAN as the source and
physical
interface as the destination
E. A monitor session on the access switch with a remote SPAN VLAN source and the physical
interface
as the destination
F. A monitor session on the distribution switch with a physical interface as the source and a
physical
interface as the destination
Correct Answer: BCD
QUESTION 7

After an EtherChannel is configured between two Cisco switches, interface port channel 1 is in the
down/down
state. Switch A is configured with channel-group 1 mode active, while Switch B is configured with
channel-group 1
mode desirable. Why is the EtherChannel bundle not working?
A. The switches are using mismatched EtherChannel negotiation modes.
B. The switch ports are not configured in trunking mode.
C. LACP priority must be configured on both switches.
D. The channel group identifier must be different for Switch A and Switch B.
Correct Answer: A
QUESTION 8

An EtherChannel bundle has been established between a Cisco switch and a corporate web
server. The
network administrator noticed that only one of the EtherChannel links is being utilized to reach the
web
server. What should be done on the Cisco switch to allow for better EtherChannel utilization to the
corporate
web server?

a)Enable Cisco Express Forwarding to allow for more effective traffic sharing over the
EtherChannel bundle.
b)Adjust the EtherChannel load-balancing method based on destination IP addresses.
c)Disable spanning tree on all interfaces that are participating in the EtherChannel bundle.
d)Use link-state tracking to allow for improved load balancing of traffic upon link failure to the
server.
e)Adjust the EtherChannel load-balancing method based on source IP addresses.

Correct Answer: E
QUESTION 9
Interface FastEthernet0/1 is configured as a trunk interface that allows all VLANs. This command
is configured globally:

monitor session 2 filter vlan 1 – 8, 39, 52

What is the result of the implemented command?

A. All VLAN traffic is sent to the SPAN destination interface.


B. Traffic from VLAN 4 is not sent to the SPAN destination interface.
C. Filtering a trunked SPAN port effectively disables SPAN operations for all VLANs.
D. The trunk’s native VLAN must be changed to something other than VLAN 1.
E. Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port.

Correct Answer: E
QUESTION 10
A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the
diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery
Protocol, but it has several routing neighbor relationships. What would cause the output to show
only the single neighbor?
A. The routers are connected via a Layer 2 switch.
B. IP routing is disabled on neighboring devices.
C. Cisco Express Forwarding is enabled locally.
D. Cisco Discovery Protocol advertisements are inconsistent between the local and remote
devices.

Correct Answer: A
QUESTION 11
After the implementation of several different types of switches from different vendors, a network
engineer
notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which
vendor-neutral protocol could be used to resolve this issue?
A. Local Area Mobility
B. Link Layer Discovery Protocol
C. NetFlow
D. Directed Response Protocol

Correct Answer: B
QUESTION 12
Several new switches have been added to the existing network as VTP clients. All of the new switches have
been
configured with the same VTP domain, password, and version. However, VLANs are not passing from the VTP
server (existing network) to the VTP clients. What must be done to fix this?
A. Remove the VTP domain name from all switches with "null" and then replace it with the
new domain
name.
B. Configure a different native VLAN on all new switches that are configured as VTP clients.
C. Provision one of the new switches to be the VTP server and duplicate information from the
existing
network.
D. Ensure that all switch interconnects are configured as trunks to allow VTP information to
be
transferred.
Correct Answer: D
QUESTION 13
After implementing VTP, the extended VLANs are not being propagated to other VTP switches.
What should
be configured for extended VLANs?
A. VTP does not support extended VLANs and should be manually added to all switches.
B. Enable VTP version 3, which supports extended VLAN propagation.
C. VTP authentication is required when using extended VLANs because of their ability to
cause network instability.
D. Ensure that all switches run the same Cisco IOS version. Extended VLANs will not propagate to
different IOS versions when extended VLANs are in use.

Correct Answer: B
QUESTION 14
Refer to the exhibit.

Switch A, B, and C are trunked together and have been properly configured for VTP. Switch C
receives
VLAN information from the VTP server Switch A, but Switch B does not receive any VLAN
information.
What is the most probable cause of this behavior?

A. Switch B is configured in transparent mode.


B. Switch B is configured with an access port to Switch A, while Switch C is configured with a
trunk
port to Switch B.
C. The VTP revision number of the Switch B is higher than that of Switch A.
D. The trunk between Switch A and Switch B is misconfigured.

Correct Answer: A
QUESTION 15
Refer to the exhibit.

Switch A, B, and C are trunked together and have been properly configured for VTP. Switch B has
all
VLANs, but Switch C is not receiving traffic from certain VLANs. What would cause this issue?

A. A VTP authentication mismatch occurred between Switch A and Switch B.


B. The VTP revision number of Switch B is higher than that of Switch A.
C. VTP pruning is configured globally on all switches and it removed VLANs from the trunk
interface
that is connected to Switch C.
D. The trunk between Switch A and Switch B is misconfigured.

Correct Answer: C
QUESTION 16

After the recent upgrade of the switching infrastructure, the network engineer notices that the port
roles that were once “blocking” are now defined as “alternate” and “backup.” What is the reason
for this change?

A. The new switches are using RSTP instead of legacy IEEE 802.1D STP.
B. IEEE 802.1D STP and PortFast have been configured by default on all newly implemented
Cisco
Catalyst switches.
C. The administrator has defined the switch as the root in the STP domain.
D. The port roles have been adjusted based on the interface bandwidth and timers of the new
Cisco
Catalyst switches.
Correct Answer: A
QUESTION 17
An administrator recently configured all ports for rapid transition using PortFast. After testing, it
has been
determined that several ports are not transitioning as they should. What is the reason for this?
RSTP has been enabled per interface and not globally.
A. The STP root bridge selection is forcing key ports to remain in non-rapid transitioning
mode.
B. STP is unable to achieve rapid transition for trunk links.
C. The switch does not have the processing power to ensure rapid transition for all ports.

Correct Answer: C
QUESTION 18
Which technique automatically limits VLAN traffic to only the switches that require it?
A. access lists
B. DTP in nonegotiate
C. VTP pruning
D. PBR

Correct Answer: C
QUESTION 19
What effect does the mac address-table aging-time 180 command have on the MAC address-table?
A. This is how long a dynamic MAC address will remain in the CAM table.
B. The MAC address-table will be flushed every 3 minutes.
C. The default timeout period will be 360 seconds.
D. ARP requests will be processed less frequently by the switch.
E. The MAC address-table will hold addresses 180 seconds longer than the default of 10
minutes.
Correct Answer: A
QUESTION 20

While working in the core network building, a technician accidently bumps the fiber connection
between
two core switches and damages one of the pairs of fiber. As designed, the link was placed into a
non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did
not
recover. What solution allows the network switch to automatically recover from such an issue?
A. macros
B. errdisable autorecovery
C. IP Event Dampening
D. command aliases
E. Bidirectional Forwarding Detection

Correct Answer: B

QUESTION 21
A network engineer deployed a switch that operates the LAN base feature set and decides to use
the SDM
VLAN template. The SDM template is causing the CPU of the switch to spike during peak working
hours.
What is the root cause of this issue?
A. The VLAN receives additional frames from neighboring switches.
B. The SDM VLAN template causes the MAC address-table to overflow.
C. The VLAN template disables routing in hardware.
D. The switch needs to be rebooted before the SDM template takes effect.

Correct Answer: C
QUESTION 22
An access switch has been configured with an EtherChannel port. After configuring SPAN to
monitor this
port, the network administrator notices that not all traffic is being replicated to the management
server. What
is a cause for this issue?
A. VLAN filters are required to ensure traffic mirrors effectively.
B. SPAN encapsulation replication must be enabled to capture EtherChannel destination
traffic.
C. The port channel can be used as a SPAN source, but not a destination.
D. RSPAN must be used to capture EtherChannel bidirectional traffic.

Correct Answer: C

QUESTION 23
Refer to the exhibit.
What is the result of the configuration?
A. The EtherChannels would not form because the load-balancing method must match on the
devices.
B. The EtherChannels would form and function properly even though the load-balancing and
C. EtherChannel modes do not match.
D. The EtherChannels would form, but network loops would occur because the load-
balancing methods
do not match.
E. The EtherChannels would form and both devices would use the dst-ip load-balancing
method
because Switch1 is configured with EtherChannel mode active.

Correct Answer: B
QUESTION 24
A network engineer tries to configure storm control on an EtherChannel bundle. What is the result
of the
configuration?
A. The storm control settings will appear on the EtherChannel, but not on the associated
physical ports.
B. The configuration will be rejected because storm control is not supported for
EtherChannel.
C. The storm control configuration will be accepted, but will only be present on the physical
interfaces.
D. The settings will be applied to the EtherChannel bundle and all associated physical
interfaces.

Correct Answer: D
QUESTION 25
What is the function of NSF?
A. forward traffic simultaneously using both supervisors
B. forward traffic based on Cisco Express Forwarding
C. provide automatic failover to back up supervisor in VSS mode
D. provide nonstop forwarding in the event of failure of one of the member supervisors

Correct Answer: D
QUESTION 26
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD
packets. This
port continues to reestablish until after eight failed retries. The port then transitions into the errdisable
state.
Which option describes what causes the port to go into the errdisable state?
A. Normal UDLD operations that prevent traffic loops.
B. UDLD port is configured in aggressive mode.
C. UDLD is enabled globally.
D. UDLD timers are inconsistent.

Correct Answer: B
QUESTION 27
A. After reviewing UDLD status on switch ports, an engineer notices that the.” Which statement
describes
B. what this indicates about the status of the port?
C. The port is fully operational and no known issues are detected.
D. The bidirectional status of “unknown” indicates that the port will go into the disabled state because
it stopped
receiving UDLD packets from its neighbor.
E. UDLD moved into aggressive mode after inconsistent acknowledgements were detected.
F. The UDLD port is placed in the “unknown” state for 5 seconds until the next UDLD packet
is received
on the interface.
Correct Answer: A
QUESTION 28
Pilot testing of the new switching infrastructure finds that when the root port is lost, STP
immediately replaces the root port with an alternative root port. Which spanning-tree technology is
used to accomplish backup root port selection?
A. PVST+
B. PortFast
C. BackboneFast
D. UplinkFast
E. Loop Guard
F. UDLD

Correct Answer: D
QUESTION 29
A network engineer must adjust the STP interface attributes to influence root port selection. Which two
elements are
used to accomplish this? (Choose two.)
A. port-priority
B. cost
C. forward-timers
D. link type
E. root guard

Correct Answer: AB
QUESTION 30
A network engineer must set the load balance method on an existing port channel. Which action must
be done to
apply a new load balancing method?
A. Configure the new load balancing method using port-channel load-balance.
B. Adjust the switch SDM back to “default”.
C. Ensure that IP CEF is enabled globally to support all load balancing methods.
D. Upgrade the PFC to support the latest load balancing methods.
Correct Answer: A
QUESTION 31
Refer to the exhibit.

A network engineer investigates a recent network failure and notices that one of the interfaces on
the switch
is still down. What is causing the line protocol on this interface to be shown as down?
A. There is a layer 1 physical issue.
B. There is a speed mismatch on the interface.
C. The interface is configured as the target of the SPAN session.
D. The interface is configured as the source of the SPAN session.
E. There is a duplex mismatch on the interface.

Correct Answer: C
QUESTION 32
While doing network discovery using Cisco Discovery Protocol, it is found that rapid error
tracking is not
currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms
using Cisco
Discovery Protocol?
A. Cisco Discovery Protocol version 2
B. Cisco IOS Embedded Event Manager
C. logging buffered
D. Cisco Discovery Protocol source interface
E. Cisco Discovery Protocol logging options
Correct Answer: A
QUESTION 33
Which technique allows specific VLANs to be strictly permitted by the administrator?
A. VTP pruning
B. transparent bridging
C. trunk allowed VLANs
D. VLAN access-list
E. L2P tunneling
Correct Answer: C
QUESTION 34
For security reasons, the IT manager has prohibited users from dynamically establishing trunks
with their
associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
A. Configure trunk and access interfaces manually.
B. Disable DTP on a per interface basis.
C. Apply BPDU guard and BPDU filter.
D. Enable switchport block on access ports.
Correct Answer: AB
QUESTION 35
Which two protocols can be automatically negotiated between switches for trunking? (Choose
two.)
A. PPP
B. DTP
C. ISL
D. HDLC
E. DLCI
F. DOT1Q

Correct Answer: CF
QUESTION 36

A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the
new
switch is not receiving the list of VLANs from the server. Which action resolves this problem?
A. Reload the new switch.
B. Restart the VTP process on the new switch.
C. Reload the VTP server.
D. Verify connected trunk ports.

Correct Answer: D
QUESTION 37
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer
notices that
none of the VTP clients are receiving the updates. What is the problem?
A. The VTP server must be reloaded.
B. The VTP version number must be set to version 3.
C. After each update to the VTP server, it takes up to 4 hours propagate.
D. VTP must be stopped and restarted on the server.
E. Another switch in the domain has a higher revision number than the server.

Correct Answer: B
QUESTION 38
A network engineer is extending a LAN segment between two geographically separated data
centers.
Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the
extended LAN
segment?
A. Modify the spanning-tree priorities to dictate the traffic flow.
B. Create a Layer 3 transit VLAN to segment the traffic between the sites.
C. Use VTP pruning on the trunk interfaces.
D. Configure manual trunk pruning between the two locations.

Correct Answer: C
QUESTION 39
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse
the
switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing
VLANs no
longer pass traffic over the trunk. What is the root cause of the problem?

A. The command effectively removed all other working VLANs and replaced them with the
new VLANs.
B. VTP pruning removed all unused VLANs.
C. ISL was unable to encapsulate more than the already permitted VLANs across the trunk.
D. Allowing additional VLANs across the trunk introduced a loop in the network.
Correct Answer: A
QUESTION 40
When you design a switched network using VTPv2, how many VLANs can be used to carry user
traffic?
A. 1000
B. 1001
C. 1024
D. 2048
E. 4095
F. 4096

Correct Answer: B
QUESTION 41
What does the command vlan dot1q tag native accomplish when configured under global
configuration?
A. All frames within the native VLAN are tagged, except when the native VLAN is set to 1.
B. It allows control traffic to pass using the non-default VLAN.
C. It removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s).
D. Control traffic is tagged.

Correct Answer: D
QUESTION 42
A network engineer has just deployed a non-Cisco device in the network and wants to get
information
about it from a connected device. Cisco Discovery Protocol is not supported, so the open
standard
protocol must be configured. Which protocol does the network engineer configure on both
devices to
accomplish this?
A. IRDP
B. LLDP
C. NDP
D. LLTD

Correct Answer: B
QUESTION 43
A manager tells the network engineer to permit only certain VLANs across a specific trunk interface. Which
option can be
configured to accomplish this?
A. allowed VLAN list
B. VTP pruning
C. VACL
D. L2P tunneling
Correct Answer: A
QUESTION 44
For client server failover purposes, the application server team has indicated that they must not
have the standard 30 second delay before their switchport enters a forwarding state. For their
disaster recovery feature to operate successfully, they require the switchport to enter a forwarding
state immediately. Which spanning-tree feature satisfies this requirement?
A. Rapid Spanning-Tree
B. Spanning-Tree Timers
C. Spanning-Tree FastPort
D. Spanning-Tree PortFast
E. Spanning-Tree Fast Forward
Correct Answer: D
QUESTION 45
Which command does a network engineer use to verify the spanning-tree status for VLAN 10?
A. switch# show spanning-tree vlan 10
B. switch# show spanning-tree bridge
C. switch# show spanning-tree brief
D. switch# show spanning-tree summary
E. switch# show spanning-tree vlan 10 brief
Correct Answer: A
QUESTION 46
A new network that consists of several switches has been connected together via trunking
interfaces. If
all switches currently have the default VTP domain name "null", which statement describes what
happens
when a domain name is configured on one of the switches?
A. The switch with the non-default domain name restores back to "null" upon reboot.
B. Switches with higher revision numbers does not accept the new domain name.
C. VTP summary advertisements are sent out of all ports with the new domain name.
D. All other switches with the default domain name become VTP clients.
Correct Answer: C
QUESTION 47
A network engineer is setting up a new switched network. The network is expected to grow and add
many new
VLANs in the future. Which Spanning Tree Protocol should be used to reduce switch resources and
managerial
burdens that are associated with multiple spanning-tree instances?
A. RSTP
B. PVST
C. MST
D. PVST+
E. RPVST+
Correct
QUESTION 48
Which statement about the use of SDM templates in a Cisco switch is true?
SDM templates are used to configure system resources in the switch to optimize support for
specific
features, depending on how the switch is used in the network.
A. SDM templates are used to create Layer 3 interfaces (switch virtual interfaces) to permit hosts in one
VLAN to
communicate with hosts in another VLAN.
B. SDM templates are used to configure ACLs that protect networks and specific hosts from
unnecessary or
unwanted traffic.
C. SDM templates are used to configure a set of ACLs that allows the users to manage the
flow of traffic
handled by the route processor.
D. SDM templates are configured by accessing the switch using the web interface.
Correct Answer: A
QUESTION 49
Which SDM template disables routing and supports the maximum number of unicast MAC
addresses?
A. VLAN
B. access
C. default
D. routing
Correct Answer: A
QUESTION 50
Which SDM template is the most appropriate for a Layer 2 switch that provides connectivity to a
large
number of clients?
VLAN
default
access
routing
Correct Answer: A
QUESTION 51
In a Cisco switch, what is the default period of time after which a MAC address ages out and is
discarded?
A. 100 seconds
B. 180 seconds
C. 300 seconds
D. 600 seconds
Correct Answer: C
QUESTION 52
If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port,
when is a
syslog message generated?
A. A MAC address or host moves between different switch ports.
B. A new MAC address is added to the content-addressable memory.
C. A new MAC address is removed from the content-addressable memory.
D. More than 64 MAC addresses are added to the content-addressable memory.
Correct Answer: A
QUESTION 53
Which option is a possible cause for an errdisabled interface?
A. routing loop
B. cable unplugged
C. STP loop guard
D. security violation
Correct Answer: D
QUESTION 54
What is the default value for the errdisable recovery interval in a Cisco switch?
A. 30 seconds
B. 100 seconds
C. 300 seconds
D. 600 seconds
Correct Answer: C
QUESTION 55
Which statement about LLDP-MED is true?
A. LLDP-MED is an extension to LLDP that operates between endpoint devices and network
devices.
B. LLDP-MED is an extension to LLDP that operates only between network devices.
C. LLDP-MED is an extension to LLDP that operates only between endpoint devices.
D. LLDP-MED is an extension to LLDP that operates between routers that run BGP.
Corret Answer: A
QUESTION 56
Which statement about Cisco devices learning about each other through Cisco Discovery Protocol
is true?
A. Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC.
B. Each device broadcasts periodic advertisements to all of its neighbors.
C. Each device sends periodic advertisements to a central device that builds the network
topology.
D. Each device sends periodic advertisements to all IP addresses in its ARP table.
Correct Answer: A
QUESTION 57
Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?
A. native VLAN IDs, port-duplex, hardware platform
B. native VLAN IDs, port-duplex, memory errors
C. native VLAN IDs, memory errors, hardware platform
D. port-duplex, hardware platform, memory errors
Correct Aswer: A
QUESTION 58
Which option describes a limitation of LLDP?
A. LLDP cannot provide information about VTP.
B. LLDP does not support TLVs.
C. LLDP can discover only Windows servers.
D. LLDP can discover up to two devices per port.
Correct Answer: A
QUESTION 59
Which statement about the UDLD protocol is true?
A. UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical
status of links and
detect unidirectional failures.
B. UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity,
capabilities, and neighbors
on a local area network.
C. UDLD is a standardized Layer 2 protocol that enables devices to monitor the physical
status of links and
detect unidirectional failures.
D. UDLD is a standardized Layer 2 protocol that enables devices to advertise their identity,
capabilities, and
neighbors on a local area network.
Correct Answer: A
QUESTION 60
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
A. normal and aggressive
B. active and aggressive
C. normal and active
D. normal and passive
E. normal and standby
Correct Answer: A
QUESTION 61
What is the default interval at which Cisco devices send Cisco Discovery Protocol
advertisements?
A. 30 seconds
B. 60 seconds
C. 120 seconds
D. 300 seconds
Correct Answer: B
QUESTION 62
Which statement about Cisco Discovery Protocol configuration on a Cisco switch is true?
A. CDP is enabled by default and can be disabled globally with the command no cdp run.
B. CDP is disabled by default and can be enabled globally with the command cdp enable.
C. CDP is enabled by default and can be disabled globally with the command no cdp enable.
D. CDP is disabled by default and can be enabled globally with the command cdp run.
Correct Answer: A
QUESTION 63
What is the size of the VLAN field inside an 802.1q frame?
A. 8-bit
B. 12-bit
C. 16-bit
D. 32-bit
Correct Answer: B
QUESTION 64
What is the maximum number of VLANs that can be assigned to an access switchport without a
voice VLAN?
A. 0
B. 1
C. 2
D. 1024
Correct Answer: B
QUESTION 65
Refer to the exhibit.

Which option shows the expected result if a show vlan command is issued?

A.

B.

C.

D.
Correct Answer: A
QUESTION 66
Which feature is automatically enabled when a voice VLAN is configured, but not automatically
disabled when a voice VLAN is removed?
A. portfast
B. port-security
C. spanning tree
D. storm control
Correct Answer: A
QUESTION 67
In which portion of the frame is the 802.1q header found?
A. within the Ethernet header
B. within the Ethernet payload
C. within the Ethernet FCS
D. within the Ethernet source MAC address
Correct Answer: A
QUESTION 68
Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a
switch?
A. VLANs 1-1001
B. VLANs 1-4094
C. VLANs 2-1001
D. VLANs 2-4094
Correct Answer: C
QUESTION 69
Which feature must be enabled to eliminate the broadcasting of all unknown traffic to switches
that are not participating in the specific VLAN?
A. VTP pruning
B. port-security
C. storm control
D. bpdguard
Correct Answer: A
QUESTION 70
Refer to the exhibit.

The users in an engineering department that connect to the same access switch cannot access
the network. The network engineer found that the engineering VLAN is missing from the database.
Which action resolves this problem?
A. Disable VTP pruning and disable 802.1q.
B. Update the VTP revision number.
C. Change VTP mode to server and enable 802.1q.
D. Enable VTP pruning and disable 802.1q.
Correct Answer: C
QUESTION 71
Refer to the exhibit.
The network switches for two companies have been connected and manually configured for the
required
VLANs, but users in company A are not able to access network resources in company B when DTP
is
enabled. Which action resolves this problem?
A. Delete vlan.dat and ensure that the switch with lowest MAC address is the VTP server.
B. Disable DTP and document the VTP domain mismatch.
C. Manually force trunking with switchport mode trunk on both switches.
D. Enable the company B switch with the vtp mode server command.
Correct Answer: C
QUESTION 72
A network engineer must implement Ethernet links that are capable of transporting frames and IP
traffic for
different broadcast domains that are mutually isolated. Consider that this is a multivendor
environment.
Which Cisco IOS switching feature can be used to achieve the task?
A. PPP encapsulation with a virtual template
B. Link Aggregation Protocol at the access layer
C. dot1q VLAN trunking
D. Inter-Switch Link
Correct Answer: C
QUESTION 73
Which statement about using native VLANs to carry untagged frames is true?
A. Cisco Discovery Protocol version 2 carries native VLAN information, but version 1 does
not.
B. Cisco Discovery Protocol version 1 carries native VLAN information, but version 2 does
not.
C. Cisco Discovery Protocol version 1 and version 2 carry native VLAN information.
D. Cisco Discovery Protocol version 3 carries native VLAN information, but versions 1 and 2
do not.
Correct Answer: A

QUESTION 74
Refer to the exhibit.
A multilayer switch has been configured to send and receive encapsulated and tagged frames.
VLAN 2013 on the multilayer switch is configured as the native VLAN. Which option is the cause of
the spanning-tree error?
A. VLAN spanning-tree in SW-2 is configured.
B. spanning-tree bpdu-filter is enabled.
C. 802.1q trunks are on both sides, both with native VLAN mismatch.
D. VLAN ID 1 should not be used for management traffic because its unsafe.
Correct Answer: C
QUESTION 75
A network engineer must improve bandwidth and resource utilization on the switches by stopping
the
inefficient flooding of frames on trunk ports where the frames are not needed. Which Cisco IOS
feature can
be used to achieve this task?
A. VTP pruning
B. access list
C. switchport trunk allowed VLAN
D. VLAN access-map
Correct Answer: A
QUESTION 76
Which action allows a network engineer to limit a default VLAN from being propagated across all
trunks?
A. Upgrade to VTP version 3 for advanced feature set support.
B. Enable VTP pruning on the VTP server.
C. Manually prune default VLAN with switchport trunk allowed vlans remove.
D. Use trunk pruning vlan 1.
Correct Answer: C
QUESTION 77
What is required for a LAN switch to support 802.1q Q-in-Q encapsulation?
A. Support less than 1500 MTU
B. Support 1504 MTU or higher
C. Support 1522 layer 3 IP and IPX packet
D. Support 1547 MTU only
Correct Answer: B
QUESTION 78
Refer to the exhibit.

How many bytes are added to each frame as a result of the configuration?
A. 4-bytes except the native VLAN
B. 8-bytes except the native VLAN
C. 4-bytes including native VLAN
D. 8-bytes including native VLAN
Correct Answer: A
QUESTION 79
A network engineer configured a fault-tolerance link on Gigabit Ethernet links G0/1, G0/2, G0/3,
and G0/4
between two switches using Ethernet port-channel. Which action allows interface G0/1 to always
actively
forward traffic in the port-channel?
A. Configure G0/1 as half duplex and G0/2 as full duplex.
B. Configure LACP port-priority on G0/1 to 1.
C. Configure LACP port-priority on G0/1 to 65535.
D. LACP traffic goes through G0/4 because it is the highest interface ID.
Correct Answer: B
QUESTION 80
Which statement about the use of PagP link aggregation on a Cisco switch that is running Cisco
IOS
Software is true?
A. PagP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-
desirable, and on-on allow
the formation of a channel.
B. PagP modes are active, desirable, and on. Only the combinations active-desirable, desirable-
desirable, and on-on allow
the formation of a channel.
C. PagP modes are active, desirable, and on. Only the combinations active-active, desirable-
desirable, and on-on
allow the formation of a channel.
D. PagP modes are off, active, desirable, and on. Only the combinations auto-auto, desirable-
desirable, and on-on
allow the formation of a channel.
Correct Answer: A
QUESTION 81
Refer to the exhibit.

Which EtherChannel negotiation protocol is configured on the interface f0/13 – f0/15?


A. Link Combination Control Protocol
B. Port Aggregation Protocol
C. Port Combination Protocol
D. Link Aggregation Control Protocol
Correct Answer: B
QUESTION 82
Refer to the exhibit.

Users of PC-1 experience slow connection when a webpage is requested from the server. To increase
bandwidth, the network engineer configured an
EtherChannel on interfaces Fa1/0 and Fa0/1 of the server farm switch, as shown here:

Server_Switch#sh etherchannel load-balance


EtherChannel Load-Balancing Operational State (src-mac):
Non-IP: Source MAC address
IPv4: Source MAC address
IPv6: Source IP address
Server_Switch#
HoweIer, traffic is still slow. Which action can the engineer take to resolve this issue?
A. Disable EtherChannel load balancing.
B. Upgrade the switch IOS to IP services image.
C. Change the load-balance method to dst-mac.
D. Contact Cisco TAC to report a bug on the switch.
Correct Answer: C
QUESTION 83
A network engineer changed the port speed and duplex setting of an existing EtherChannel
bundle that uses
the PAgP protocol. Which statement describes what happens to all ports in the bundle?
A. PAgP changes the port speed and duplex for all ports in the bundle.
B. PAgP drops the ports that do not match the configuration.
C. PAgP does not change the port speed and duplex for all ports in the bundle until the
switch is rebooted.
D. PAgP changes the port speed but not the duplex for all ports in the bundle.
Correct Answer: A
QUESTION 84
Which statement about using EtherChannel on Cisco IOS switches is true?
A. A switch can support up to eight compatibly configured Ethernet interfaces in an
EtherChannel. The EtherChannel provides full-duplex bandwidth up to 800 Mbps only for
Fast EtherChannel or 8 Gbps only for Gigabit EtherChannel.
B. A switch can support up to 10 compatibly configured Ethernet interfaces in an
EtherChannel. The EtherChannel provides full-duplex bandwidth up to 1000 Mbps only for
Fast EtherChannel or 8 Gbps only for Gigabit EtherChannel.
C. A switch can support up to eight compatibly configured Ethernet interfaces in an
EtherChannel. The EtherChannel provides full-duplex bandwidth up to 800 Mbps only for
Fast EtherChannel or 16 Gbps only for Gigabit EtherChannel.
D. A switch can support up to 10 compatibly configured Ethernet interfaces in an
EtherChannel. The EtherChannel provides full-duplex bandwidth up to 1000 Mbps only for
Fast EtherChannel or 10 Gbps only for Gigabit EtherChannel.
Correct Answer: A
QUESTION 85
Refer to the exhibit.
Which statement about switch S1 is true?

A. Physical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a Layer 2 port-channel interface
using an open
standard protocol.
B. Logical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a Layer 2 physical port-channel
interface using a Cisco
proprietary protocol.
C. Physical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a Layer 3 port-channel interface
using a Cisco
proprietary protocol.
D. Logical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a Layer 3 physical port-channel
interface using an open
standard protocol.

Correct Answer: A
QUESTION 86
What happens on a Cisco switch that runs Cisco IOS when an RSTP-configured switch
receives 802.1d
BPDU?
A. 802.1d does not understand RSTP BPDUs because they are different versions, but
when a RSTP
switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the
two switches
run 802.1d to communicate.
B. 802.1d understands RSTP BPDUs because they are the same version, but when a RSTP
switch
receives a 802.1d BPDU, it responds with a 802.1d BPDU and eventually the two
switches run 802.1d
to communicate.
C. 802.1d does not understand RSTP BPDUs because they are different versions, but
when a RSTP
switch receives a 802.1d BPDU, it does not respond with a 802.1d BPDU.
D. 802.1d understands RSTP BPDUs because they are the same version, but when a RSTP
switch
receives a 802.1d BPDU, it does not respond with a 802.1d BPDU and eventually the
two switches run 802.1d to
communicate.
Correct Answer: A
QUESTION 87
When two MST instances (MST 1 and MST 2) are created on a switch, what is the total number of
spanning-tree
instances running on the switch?
A. 1
B. 2
C. 3
D. 4
Correct Answer: C
QUESTION 88
Refer to the exhibit.

f1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is
needed to modify
the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses
switchport f1/1 as a
primary port?
A. Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16.
B. Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0.
C. Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16.
D. Modify the spanning-tree port-priority on SW2 f1/1 to 16 and f1/0 to 0.
Correct Answer: C
QUESTION 89
Refer to the exhibit.
Why would the switch be considered as a root bridge?
A. The bridge priority is 1 and all ports are forwarding.
B. The switch priority for VLAN 1 and the macro specifies “This Bridge is the root”.
C. The bridge priority is 128.19 and all ports are forwarding.
D. The switch priority value is zero, it has the lowest priority value for VLAN 1.
Correct Answer: D
QUESTION 90
Refer to the exhibit.

All ports are members of VLAN 10. Considering the default cost of upstream bridges to the root
bridge is equal, which option will be the new root port for VLAN 10?
A. interface f0/13
B. interface f0/14
C. interface f0/15
D. interface f0/21
Correct Answer: D
QUESTION 91
A network engineer is trying to deploy a PC on a network. The engineer observes that when the PC
is
connected to the network, it takes 30 to 60 seconds for the PC to see any activity on the network
interface
card. Which Layer 2 enhancement can be used to eliminate this delay?
A. Configure port duplex and speed to auto negotiation.
B. Configure port to duplex full and speed 1000.
C. Configure spanning-tree portfast.
D. Configure no switchport.
Correct Answer: C
QUESTION 92
A network engineer configured an Ethernet switch using these commands.
Switchone(config) # Spanning-tree portfast bpdufilter default
Which statement about the spanning-tree portfast feature on the switch is true?
A. If an interface is enabled for portfast receives BDPU, the port goes through the spanning-
tree listening,
learning, and forwarding states.
B. If an interface is enabled for portfast receives BDPU, the port does not go through the
spanning-tree listening,
learning, and forwarding states.
C. If an interface is enabled for portfast receives BDPU, the port is shut down immediately.
D. If an interface is enabled for portfast receives BDPU, the port goes into the spanning-tree
inconsistent state.
Correct Answer: A
QUESTION 93
Which statement describes what happens when a port configured with root guard receives a
superior BPDU?
A. The port goes into errdisabled state and stops forwarding traffic.
B. The port goes into BPDU-inconsistent state and stops forwarding traffic.
C. The port goes into loop-inconsistent state and stops forwarding traffic.
D. The port goes into root-inconsistent state and stops forwarding traffic.
Correct Answer: D
QUESTION 94
Which statement about restrictions for multichassis LACP is true?
A. It is available only on a Cisco Catalyst 6500 Series chassis.
B. It does not support 1Gb links.
C. Converting a port channel to mLACP can cause a service disruption.
D. It is not available in VSS.
Correct Answer: C
QUESTION 95
What is the maximum number of 10 Gigabit Ethernet connections that can be utilized in an
EtherChannel for
the virtual switch link?
A. 4
B. 6
C. 8
D. 12
Correct Answer: C
QUESTION 96
Which statement describes what happens if all VSL connections between the virtual switch
members are
lost?
A. Both virtual switch members cease to forward traffic.
B. The VSS transitions to the dual active recovery mode, and both virtual switch members
continue to forward
traffic independently.
C. The virtual switch members reload.
D. The VSS transitions to the dual active recovery mode, and only the new active virtual
switch continues to
forward traffic.
Correct Answer: D
QUESTION 97
Which statement describes what happens when a switch enters dual active recovery mode?
A. The switch shuts down and waits for the VSL link to be restored before sending traffic.
B. All interfaces are shut down in the formerly active virtual switch member, but the new
active virtual
switch forwards traffic on all links.
C. The switch continues to forward traffic out all links and enables spanning tree on VSL link
and all other links
to prevent loops.
D. The VSS detects which system was last in active state and shuts down the other switch.
Correct Answer: B
QUESTION 98
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping
database. What is
the solution to avoid the snooping database from being rebuilt after every device reboot?
A. A DHCP snooping database agent should be configured.
B. Enable DHCP snooping for all VLANs that are associated with the switch.
C. Disable Option 82 for DHCP data insertion.
D. Use IP Source Guard to protect the DHCP binding table entries from being lost upon
rebooting.
E. Apply ip dhcp snooping trust on all interfaces with dynamic addresses.
Correct Answer: A
QUESTION 99
Which portion of AAA looks at what a user has access to?
A. authorization
B. authentication
C. accounting
D. auditing
Correct Answer: A
QUESTION 100
Which command creates a login authentication method named “login” that will primarily use
RADIUS and fail
over to the local user database?
A. (config)# aaa authentication login default radius local
B. (config)# aaa authentication login login radius local
C. (config)# aaa authentication login default local radius
D. (config)# aaa authentication login radius local
Correct Answer: B
QUESTION 101
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP
snooping.
For more protection against malicious attacks, the network team is considering enabling dynamic
ARP
inspection alongside DHCP snooping. Which solution ensures that the server maintains network
reachability
in the future?
A. Disable DHCP snooping information option.
B. Configure a static DHCP snooping binding entry on the switch.
C. Trust the interface that is connected to the server with the ip dhcp snooping trust
command.
D. Verify the source MAC address of all untrusted interfaces with ip dhcp snooping verify
mac-address
command.
Correct Answer: B
QUESTION 102

A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN.
Which
configuration must be made before the private VLAN is configured?
A. Disable VTP and manually assign VLANs.
B. Ensure all switches are configured as VTP server mode.
C. Configure VTP Transparent Mode.
D. Enable VTP version 3.
Correct Answer: C
QUESTION 103
DHCP snooping and IP Source Guard have been configured on a switch that connects to several client
workstations. The IP address of one of the workstations does not match any entries found in the DHCP
binding
database. Which statement describes the outcome of this scenario?
A. Packets from the workstation will be rate limited according to the default values set on the
switch.
B. The interface that is connected to the workstation in question will be put into the
errdisabled state.
C. Traffic will pass accordingly after the new IP address is populated into the binding
database.
D. The packets originating from the workstation are assumed to be spoofed and will be
discarded.
Correct Answer: D
QUESTION 104
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP
snooping.
IP Source Guard with the ip verify source port-security command is configured under the
interfaces that
connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the
DHCP
server. Which option is the cause of this issue?
A. The DHCP server does not support information option 82.
B. The DHCP client interfaces have storm control configured.
C. Static DHCP bindings are not configured on the switch.
D. DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic
address
allocation.
Correct Answer: A
QUESTION 105
A switch is added into the production network to increase port capacity. A network engineer is
configuring
the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source
under
several of the interfaces. Which option is the cause of the problem?
A. The local DHCP server is disabled prior to enabling IP Source Guard.
B. The interfaces are configured as Layer 3 using the no switchport command.
C. No VLANs exist on the switch and/or the switch is configured in VTP transparent mode.
D. The switch is configured for sdm prefer routing as the switched database management
template.
E. The configured SVIs on the switch have been removed for the associated interfaces.
Correct Answer: B
QUESTION 106
The command storm-control broadcast level 75 65 is configured under the switch port connected
to the
corporate mail server. In which three ways does this command impact the traffic? (Choose three.)
A. SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level
threshold.
B. The switchport is disabled when unicast traffic reaches 75% of the total interface
bandwidth.
C. The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
D. Only broadcast traffic is limited by this particular storm control configuration.
E. Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total
interface bandwidth.
F. The switch drops broadcasts when they reach 75% of bandwidth.
Correct Answer: CDF
QUESTION 107

After port security is deployed throughout an enterprise campus, the network team has been
overwhelmed
with port reset requests. They decide to configure the network to automate the process of re-
enabling user
ports. Which command accomplishes this task?
A. switch(config)# errdisable recovery interval 180
B. switch(config)# errdisable recovery cause psecure-violation
C. switch(config)# switchport port-security protect
D. switch(config)# switchport port-security aging type inactivity
E. switch(config)# errdisable recovery cause security-violation
Correct Answer: B
QUESTION 108
The network monitoring application alerts a network engineer of a client PC that is acting as a
rogue DHCP
server. Which two commands help trace this PC when the MAC address is known? (Choose two.)
A. switch# show mac address-table
B. switch# show port-security
C. switch# show ip verify source
D. switch# show ip arp inspection
E. switch# show mac address-table address <mac address>
Correct Answer: AE
QUESTION 109
While troubleshooting a network outage, a network engineer discovered an unusually high level of
broadcast
traffic coming from one of the switch interfaces. Which option decreases consumption of
bandwidth used by
broadcast traffic?
A. storm control
B. SDM routing
C. Cisco IOS parser
D. integrated routing and bridging
E. Dynamic ARP Inspection
Correct Answer: A
QUESTION 110
Which command globally enables AAA on a device?
A. aaa new-model
B. aaa authentication
C. aaa authorization
D. aaa accounting
Correct Answer: A
QUESTION 111
Which AAA Authorization type includes PPP, SLIP, and ARAP connections?
A. network
B. IP mobile
C. EXEC
D. auth-proxy
Correct Answer: A
QUESTION 112
Which authentication service is needed to configure 802.1x?
A. RADIUS with EAP Extension
B. TACACS+
C. RADIUS with CoA
D. RADIUS using VSA
Correct Answer: A
QUESTION 113
Refer to the exhibit.
Which login credentials are required when connecting to the console port in this output?
A. none required
B. username cisco with password cisco
C. no username with password linepass
D. login authentication default
Correct Answer: A
QUESTION 114
Refer to the exhibit.

When a network administrator is attempting an SSH connection to the device, in which order does
the device
check the login credentials?
A. RADIUS server, local username, line password
B. RADIUS server, line password, local username
C. Line password, local username, RADIUS server
D. Line password, RADIUS server, local username
Correct Answer: A
QUESTION 115
Which type of information does the DHCP snooping binding database contain?
A. untrusted hosts with leased IP addresses
B. trusted hosts with leased IP addresses
C. untrusted hosts with available IP addresses
D. trusted hosts with available IP addresses
Correct Answer: A
QUESTION 116
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a
trusted
database?
A. Dynamic ARP Inspection
B. storm control
C. VTP pruning
D. DHCP snooping
Correct Answer: A
QUESTION 117
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP
server?
A. ip dhcp snooping trust
B. ip dhcp snooping
C. ip dhcp trust
D. ip dhcp snooping information
Correct Answer: A
QUESTION 118

Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces,
including the
community and isolated host ports?
A. promiscuous port
B. isolated port
C. community port
D. trunk port
Correct Answer: A
QUESTION 119
Which private VLAN can have only one VLAN and be a secondary VLAN that carries
unidirectional traffic
upstream from the hosts toward the promiscuous ports and the gateway?
A. isolated VLAN
B. primary VLAN
C. community VLAN
D. promiscuous VLAN
Correct Answer: A
QUESTION 120
Which database is used to determine the validity of an ARP packet based on a valid IP-to-MAC
address
binding?
A. DHCP snooping database
B. dynamic ARP database
C. dynamic routing database
D. static ARP database
Correct Answer: A
QUESTION 121
When IP Source Guard with source IP filtering is enabled on an interface, which feature must
be enabled on
the access VLAN for that interface?
A. DHCP snooping
B. storm control
C. spanning-tree portfast
D. private VLAN
Correct Answer: A
QUESTION 122
Which switch feature prevents traffic on a LAN from being overwhelmed by continuous
multicast or
broadcast traffic?
A. storm control
B. port security
C. VTP pruning
D. VLAN trunking
Correct Answer: A
QUESTION 123
Which command would a network engineer apply to error-disable a switchport when a packet-
storm is
detected?
A. router(config-if)#storm-control action shutdown
B. router(config-if)#storm-control action trap
C. router(config-if)#storm-control action error
D. router(config-if)#storm-control action enable
Correct Answer: A
QUESTION 124
A network engineer configures port security and 802.1x on the same interface. Which option
describes what
this configuration allows?
A. It allows port security to secure the MAC address that 802.1x authenticates.
B. It allows port security to secure the IP address that 802.1x authenticates.
C. It allows 802.1x to secure the MAC address that port security authenticates.
D. It allows 802.1x to secure the IP address that port security authenticates.
Correct Answer: A
QUESTION 125
Which feature describes MAC addresses that are dynamically learned or manually configured,
stored in the
address table, and added to the running configuration?
A. sticky
B. dynamic
C. static
D. secure
Correct Answer: A
QUESTION 126
On which interface can port security be configured?
A. static trunk ports
B. destination port for SPAN
C. EtherChannel port group
D. dynamic access point
Correct Answer: A
QUESTION 127
When you configure private VLANs on a switch, which port type connects the switch to the
gateway router?
A. promiscuous
B. community
C. isolated
D. trunked
Correct Answer: A
QUESTION 128
When you configure a private VLAN, which type of port must you configure the gateway router
port as?
A. promiscuous port
B. isolated port
C. community port
D. access port
Correct Answer: A
QUESTION 129
Which configuration command ties the router hot standby priority to the availability of its
interfaces?
A. standby group
B. standby priority
C. backup interface
D. standby track
Correct Answer: D
QUESTION 130
What is the default HSRP priority?
A. 50
B. 100
C. 120
D. 1024
Correct Answer: B
QUESTION 131
Which option is a benefit of using VSS?
A. reduces cost
B. simplifies configuration
C. provides two independent supervisors with two different control planes
D. removes the need for a First Hop Redundancy Protocol
Correct Answer: D
QUESTION 132
Which First Hop Redundancy Protocol is an IEEE Standard?
A. GLBP
B. HSRP
C. VRRP
D. OSPF
Correct Answer: C
QUESTION 133

What is the default amount by which the hot standby priority for the router is decremented or
incremented when the
interface goes down or comes back up?
A. 1
B. 5
C. 10
D. 15
Correct Answer: C
QUESTION 134
What is the maximum number of virtual MAC addresses that GLBP allows per group?
A. 2
B. 4
C. 6
D. 8
Correct Answer: B
QUESTION 135
Which gateway role is responsible for answering ARP requests for the virtual IP address in
GLBP?
A. active virtual forwarder
B. active virtual router
C. active virtual gateway
D. designated router
Correct Answer: C
QUESTION 136
Which VRRP router is responsible for forwarding packets that are sent to the IP addresses of
the virtual
router?
A. virtual router master
B. virtual router backup
C. virtual router active
D. virtual router standby
Correct Answer: A
QUESTION 137
Which command correctly configures standby tracking for group 1 using the default
decrement priority value?
A. standby 1 track 100
B. standby 1 track 100 decrement 1
C. standby 1 track 100 decrement 5
D. standby 1 track 100 decrement 20
Correct Answer: A
QUESTION 138
Which command configures an HSRP group to become a slave of another HSRP group?
A. standby slave
B. standby group track
C. standby follow
D. standby group backup
Correct Answer: C
QUESTION 139
Refer to the exhibit.

Which option describes the reason for this message in a GLBP configuration?
A. Unavailable GLBP active forwarder
B. Incorrect GLBP IP address
C. HSRP configured on same interface as GLBP
D. Layer 2 loop

Correct Answer: D
QUESTION 140
Refer to the exhibit.

When troubleshooting a network problem, a network analyzer is connected to Port f0/1 of a LAN
switch.
Which command can prevent BPDU transmission on this port?
A. spanning-tree portfast bpduguard enable
B. spanning-tree bpduguard default
C. spanning-tree portfast bpdufilter default
D. no spanning-tree link-type shared
Correct Answer: C
QUESTION 141
Which four LACP components are used to determine which hot-standby links become active after
an
interface failure within an EtherChannel bundle? (Choose four.)
A. LACP system priority
B. LACP port priority
C. interface MAC address
D. system ID
E. port number
F. hot-standby link identification number
G. interface bandwidth
Correct Answer: ABDE
QUESTION 142
RSPAN has been configured on a Cisco Catalyst switch; however, traffic is not being replicated to
the remote switch. Which type of misconfiguration is a cause?
A. The RSPAN designated VLAN is missing the remote span command.
B. The local and remote RSPAN switches are configured using different session IDs.
C. The local RSPAN switch is replicating only Rx traffic to the remote switch.
D. The local switch is overloaded with the amount of sourced traffic that must be replicated
to the remote switch.
Correct Answer: A
QUESTION 143
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD
packets. This
port continues to reestablish until after eight failed retries. The port then transitions into the errdisable
state.
Which option describes what causes the port to go into the errdisable state?
A. Normal UDLD operations that prevent traffic loops.
B. UDLD port is configured in aggressive mode.
C. UDLD is enabled globally.
D. UDLD timers are inconsistent.
Correct Answer: B
QUESTION 144
To follow the Layer 2 switching guidelines, a network engineer decides to create a separate
spanning tree for
every group of 10 VLANs. Which version of spanning tree is appropriate to meet the company
policy?
A. MST
B. PVST+
C. RSTP
D. RPVST+
E. STP
Correct Answer: A
QUESTION 145
A network engineer is installing a switch for temporary workers to connect to. The engineer does
not want
this switch participating in Spanning Tree with the rest of the network; however, end user
connectivity is still
required. Which spanning-tree feature accomplishes this?
BPDUblock
BPDUfilter
BPDUignore
BPDUguard
BPDUdisable
Correct Answer: B
QUESTION 146
Refer to the exhibit.

What is the result of the SPAN configuration on a Cisco switch?


A. Configure a SPAN session to monitor the received traffic on interface g0/4 only for VLAN 3.
B. Configure a SPAN session to monitor the received traffic on interface g0/4 for all VLANs except VLAN
3.
C. Configure a SPAN session to monitor the received traffic on interface g0/5 only for VLAN 3.
D. Configure a SPAN session to monitor the received traffic on interface g0/5 for all VLANs except VLAN
3.
Correct Answer: A
QUESTION 147
When SDM templates are configured, which action must be performed for the configuration to take effect?
A. reload
B. shutdown
C. write memory
D. backup config
Correct Answer: A
QUESTION 148
Which statement about the MAC address sticky entries in the switch when the copy run start command is
entered is true?
A. A sticky MAC address is retained when the switch reboots.
B. A sticky MAC address can be a unicast or multicast address.
C. A sticky MAC address is lost when the switch reboots.
D. A sticky MAC address ages out of the MAC address table after 600 seconds.
Correct Answer: A
QUESTION 149
Enablement of which feature puts the port into err-disabled state when the port has PortFast enabled and it
receives
BPDUs?
A. BPDU filtering
B. BackboneFast
C. EtherChannel
D. BPDU guard
Correct Answer: D
QUESTION 150
Refer to the exhibit.

Which configuration ensures that the Cisco Discovery Protocol packet update frequency sent from DSW1 to
ALS1 is half
of the default value?
DSW1(config)#cdp timer 90
DSW1(config-if)#cdp holdtime 60
DSW1(config)#cdp timer 30
DSW1(config)#cdp holdtime 90
DSW1(config-if)#cdp holdtime 30
DSW1(config-if)#cdp timer 60
Correct Answer: C
QUESTION 151

Interfaces are assigned to a VLAN, and then the VLAN is deleted. Which state are these interfaces in after
the VLAN is
deleted?
A. They remain up, but they are reassigned to the default VLAN.
B. They go down until they are reassigned to a VLAN.
C. They go down, but they are reassigned to the default VLAN.
D. They remain up, but they are reassigned to the native VLAN.
Correct Answer: B
QUESTION 152
Which feature is automatically configured when an administrator enables a voice VLAN?
A. 802.1Q trunking
B. PortFast
C. QoS
D. private VLANs
Correct Answer: B
QUESTION 153
Which statement describes one major issue that VTP can cause in an enterprise network when
a new switch
is introduced in the network in VTP mode server?
A. It can cause network access ports to go into err-disabled state.
B. It can cause a network-wide VLAN configuration change if the revision number on the
new switch is
higher.
C. It can cause a network-wide VLAN configuration change if the revision number on the
new switch is
lower.
D. It can cause routing loops.
Correct Answer: B
QUESTION 154
A network administrator configures 10 extended VLANs ranging from VLANs 3051 to 3060 in
an enterprise
network. Which version of VTP supports these extended VLANs?
A. version 1
B. version 2
C. version 3
D. VTP does not recognize extended VLANs.
Correct Answer: C
QUESTION 155

An engineer is configuring an EtherChannel between two switches using LACP. If the


EtherChannel mode on
switch 1 is configured to active, which two modes on switch 2 establish an operational
EtherChannel?
Choose two.)
A. active
B. auto
C. desirable
D. on
E. passive
Correct Answer: AE
QUESTION 156
When a Layer 2 EtherChannel is configured, which statement about placement of the IP address is true?
A. The IP address is placed on the highest numbered member port.
B. The IP address is placed on the port-channel logical interface.
C. The IP address is placed on the lowest numbered member port.
D. The IP address is assigned via DHCP only.
Correct Answer: B
QUESTION 157
Which option is valid for EtherChannel load balancing?
A. source MAC address and source IP address
B. destination MAC address and destination IP address
C. source MAC address and destination IP address
D. source MAC address and destination MAC address

Correct Answer: D

QUESTION 158
Refer to the exhibit.

An engineer is configuring EtherChannel between two switches and notices the console message on
switch 2. Based on
the output, which option describes the reason for this error?
A. Switch 1 does not have enough member ports configured.
B. Switch 2 has too many member ports configured.
C. The port channel interface numbers do not match.
D. The EtherChannel protocols do not match.
Correct Answer: D
QUESTION 159
Refer to the exhibit.
DSW1 should share the same MST region with switch DSW2. Which statement is true?
A. Configure DSW1 with the same version number, and VLAN-to-instance mapping as
shown on DSW2.
B. DSW2 uses the VTP server mode to automatically propagate the MST configuration to
DSW1.
C. DSW1 automatically inherits MST configuration from DSW2 because they have the
same domain
name.
D. Configure DSW1 with the same region name, revision number, and VLAN-to-instance
mapping as
shown on DSW2.
E. DSW1 is in VTP client mode with a lower configuration revision number, therefore, it
automatically inherits MST
configuration from DW2.
Correct Answer: D
QUESTION 160
Which two statements about SPAN source and destination ports during an active session are true?
(Choose two.)
A. The source port can be only an Ethernet physical port.
B. The source port can be monitored in multiple SPAN sessions.
C. The destination port can be destination in multiple SPAN sessions.
D. The destination port does not participate in STP.
E. You can mix individual source ports and source VLANs within a single session.
Correct Answer: BD
QUESTION 161
In a switch stack environment, what is the total bidirectional traffic flow between two logical counter-
rotating paths?
A. 16 Gbps
B. 32 Gbps
C. 64 Gbps
D. 128 Gbps
Correct Answer: B
Section: (none)
Explanation
QUESTION 162
Refer to the exhibit.

Which statement about the SPAN and RSPAN configuration on SW1 is true?
A. SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.
B. RSPAN session 1 monitors activity on VLAN 50 of a remote switch.
C. RSPAN session 1 is incompletely configured for monitoring.
D. SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.
Correct Answer: C
QUESTION 163
Which information does the subordinate switch in a switch stack keep for all the VLANs that
are configured
on it?

A. VLAN database
B. DHCP snooping database
C. spanning trees
D. routing information

Correct Answer: C

QUESTION 164
Which option is the minimum number of bindings that the DHCP snooping database can
store?
A. 1000 bindings
B. 2000 bindings
C. 5000 bindings
D. 8000 bindings
Correct Answer: D
QUESTION 165
On which layer does IP source guard provide filtering to prevent a malicious host from impersonating the
IP address of a
legitimate host?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 7
Correct Answer: B
QUESTION 166
By default, what is the state of port security on a switch?
A. disabled
B. on
C. off
D. learning
Correct Answer: A
QUESTION 167

Which two statements about HSRP, GLBP, and VRRP are true? (Choose two.)
A. HSRP is the preferred protocol to be used on multivendor environments.
B. VRRP has one master router, one standby router, and many listening routers.
C. GLBP allows for a maximum of four MAC addresses per group.
D. HSRP supports up to 255 groups on the same switch or router.
E. VRRP is a Cisco proprietary protocol.
Correct Answer: CD
QUESTION 168
Refer to the exhibit.
Which option is the most likely explanation of the duplicate address message logged?
A. spanning-tree loop
B. HSRP misconfiguration
C. a PC with IP of 10.10.1.1
D. a hardware problem
Correct Answer: B
QUESTION 169
Refer to the exhibit.

A network engineer changes the default native VLAN to VLAN 999. After applying the settings on
the uplinks to the
core switches, the switch control traffic, such as CDP and VTP, is no longer working. The standard
configuration
is used for each uplink. What is wrong with the configuration?
A. The interface is administratively down.
B. The encapsulation type is incorrect.
C. The switchport mode trunk command should be first in the output.
D. The native VLAN is not present on the trunk.
E. The control traffic must be manually enabled on the new native VLAN.
Correct Answer: D
QUESTION 170
Which two options are two results of using the command spanning-tree vlan 50 root primary
within a
spanning-tree network under global configuration? (Choose two.)
A. Spanning tree determines the priority of the current root for VLAN 50 and reduces the
priority of the local
switch to a lower value.
B. The priority value for VLAN 50 is set to 4094 on the root while the local switch priority
is set to 32768.
C. The spanning-tree timers are reduced to improve the convergence time for VLAN 50.
D. All ports that are configured on the current switch with VLAN 50 transition to
designated ports.
E. The switchport that is configured for VLAN 50 is the primary connection to the
spanning-tree root
switch.
Correct Answer: AD
QUESTION 171

An access switch at a remote location is connected to the spanning-tree root with redundant
uplinks. A network
engineer notices that there are issues with the physical cabling of the current root port. The
engineer decides to
force the secondary link to be the desired forwarding root port.
Which action accomplishes this task?
A. Change the link-type to point-to-point.
B. Enable Rapid Spanning Tree to converge using the secondary link.
C. Adjust the secondary link to have a lower priority than the primary link.
D. Apply a BPDU filter on the primary interface of the remote switches.
Correct Answer: C
QUESTION 172
A network engineer wants to make sure that an access switch will never become a Spanning Tree root for
VLAN 5. What
action will accomplish this task?
A. adjust STP priority to the maximum value
B. disable STP globally
C. apply root guard to all outgoing neighbor interfaces
D. enable MSTP and use a different revision number than all other switches
Correct Answer: A
QUESTION 173
In a switch stack where is the SDM template stored?
A. All switches in stack
B. Master switch
C. Flash memory
D. Another
Correct Answer: B
QUESTION 174
Which two statements about default FHRP behavior are true? (Choose two)
A. Pre-emption is enabled by default
B. A back up GLBP active virtual gateway can become active only in the current active
router fails
C. Unless specifically configured, the priority of an HSRP router is 200
D. Standby HSRP router becomes active if it has higher priority than current active router
E. VRRP backup router becomes the master router if its priority is higher than the priority of the
current master router.
Correct Answer: BE
QUESTION 175
Which statement about HSRP, GLBP, and VRRP is true?
A. GLBP uses UDP port 3222 (source an destination) for hello messages.
B. HSRP group members communicate using multicast 224.0.0.18
C. VRRP group communicate using multicast address 224.0.0.102
D. MAC address 0000.0c07.ac0c indicates that default gateway redundancy is provided through
GLBP
Correct Answer: A
QUESTION 176
Which statement about the current configuration on port GigabitEthernet 2/0/1 is true?

A. It is an access port configured for a phone and PC


B. It is a trunk port and the native VLAN is VLAN 1
C. It is a trunk port and native VLAN is VLAN 700
D. It is an access port in VLAN 700
Correct Answer: B
QUESTION 177
An enterprise network has port security sticky enabled on all access ports. A network
administrator moves a
PC from one office desk to another. After the PC is moved the network administrator clears the
port security
on the network switch port connection to the PC, but the port keeps going back into err-
disabled mode.
Which two factors are possible causes of this issue? (Choose two)
A. Port security sticky exists on the new network switch port
B. Port security sticky is disabled on the new network switch port
C. Port security must be disabled on all access ports
D. Port security is still enable on the older network switch port
E. Port security sticky is still enabled on the older network switch port
Correct Answer: AE
QUESTION 178
Refer to the exhibit. An engineer has run the show etherchannel summary command the
output is displayed. Which statement the status of the EtherChannel is true?
A. The EtherChannel is operational and configured for PAGP
B. The EtherChannel is down because of a mismatched EtherChannel protocol
C. The EtherChannel is down and configured for LACP
D. The EtherChannel is operational and is using no etherchannel protocol
Correct Answer: D
QUESTION 179
A switch has been configured with the VLAN dot1q tag native command. Which statement
describes what the switch does with untagged frames when it receives on a trunked interface?
Untagged frames are forwarded via the default VLAN
It drops the untagged frames
The trunk ports is put in err-disable state.
Untagged frames are forward via the native vlan
Correct Answer: B
QUESTION 180

When a Cisco Catalyst switch that is configured in VTP server mode is first booted, which two VLAN
ranges are loaded
on the switch? (Choose two)
A. All VLANs are in the VLAN database
B. VLANs greater than 1005 in the startup config file
C. The first 1005 VLANs in the VLAN database file
D. The first 1005 VLANs in the startup-config file
E. VLANs greater than 1005 in the VLAN database
Correct Answer: BC
QUESTION 181
Which two options are advantages of deploying VTPv3? (Choose two)
A. It stores the VTP domain password securely in as SHA-1 hash
B. It adds an FCS field at the end of each VTP frame for consistency checking
C. It supports the propagation of private VLANs
D. It supports the use of AES to encrypt VTP messaging
E. It can be configured to allow only one VTP server to make changes to the VTP domain
Correct Answer: CE
QUESTION 182
If storm control is enabled on a port and the traffic reaches the configure level, which two actions can be
configured to
occur. (Choose two)
A. Trap
B. Notify admin
C. Redirect traffic
D. Log
E. Shut down
Correct Answer: AE
QUESTION 183
To provide security, a service provider configures various private VLANS in its backbone
network
infrastructure to prevent communicating to each other. Which version of VTP supports the use
of private
VLANs?
A. Version 1
B. Version 2
C. Version 3
D. VTP does not support private VLANs
Correct Answer: C
QUESTION 184
Refer to the exhibit. Which two statements about SW1 are true? (Choose two)
A. Interface Gi5/1 is using a Cisco proprietary trunking protocol
B. On interface Gi5/1, all untagged traffic is tagged with VLAN 113
C. The device is configured is configured with the default MST region
D. Interface Gi5/1 is using an industry standard trunking protocol
E. Interface Gi6/2 is the root port for VLAN 36
F. On interface Gi6/2 all untagged traffic is tagged with VLAN 600
Correct Answer: DF

QUESTION 185
Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?
(Choose two)

A. Spanning-tree mstp 1 priority 0


B. Spanning-tree mst 1 root primary
C. Spanning -tree mst vlan 10,20 priority root
D. Spanning-tree mst 1 priority 4096
E. Spanning-tree mst 1 priority 1
F. Spanning tree mstp vlan 10,20 root primary
Correct Answer: BD
QUESTION 186
What condition was matched during a EtherChannel configuration? (Choose two.)
(Which two conditions should match during EtherChannel configuration?)
A. Spanning tree port priority
B. Spanning tree cost
C. Interface description
D. Trunk mode
E. Trunk allow vlan (allowed VLANs on the trunk)
Correct Answer: DE
QUESTION 187
Refer to exhibit, which two statements correctly indicate when an SNMP trap is set to the switch?
(Choose two)
A. When a new workstation connects to port F0/1
B. When 61 MAC address are in the switch
C. When 61 percent of the address table capacity is used
D. When the switch loses power and reboots
E. When the phone previously on Fa0/2 is now connect to Fa0/5
Correct Answer: CE
QUESTION 188
Refer to the exhibit, an engineer is configuring an EtherChannel between two switches. He
notices the error message on the switch 2 (error message channel-misconfiguring error),
based on the output what is the problem?
A. the EtherChannel on the switch 1 using incorrect member port
B. the EtherChannel interface of switch 1 is not configured
C. the EtherChannel protocol on switch 1 is not correct
D. the EtherChannel interface of switch 2 is not configured

Correct Answer: C
QUESTION 189
Which statement is true about RSTP topology changes?
A. Any change in the state of the port generates a TC BDPU
B. Only non-edge ports moving to the forwarding state generate a TC BDPU
C. If either an edge port or a non-edge port move to a block state, then a TC BDPU is
generated
D. Only edge ports moving to the blocking state generate a TC BPDU
E. Any loss of connectivity generates a TC BDPU
Correct Answer: B
QUESTION 190
What action should a network administrator take to enable VTP pruning on an entire management
domain?
A. Enable VTP pruning on any client switch in the domain.
B. Enable VTP pruning on every switch in the domain.
C. Enable VTP pruning on any switch in the management domain.
D. Enable VTP pruning on a VTP server in the management domain.
E. Disable VTP pruning on a VTP server in the management domain.
Correct Answer: D
QUESTION 191
Refer to the exhibit. Based on the debug output, which three statements about HSRP are true? (Choose
three)

A. The final active router is the router with IP address 172.16.11.111


B. The router with IP address 172.16.11.111 has preempt configured
C. The priority of the router with IP address 172.16.11.112 is preferred over the router with
IP address 172.16.11.111
D. The IP address 172.16.11.115 is the virtual HSRP IP address
E. The router with IP address 172.16.11.112 has non-preempt configured
F. The router with IP address 172.16.11.112 is using default HSRP priority.
Correct Answer: ABD
QUESTION 192
Which two statements are true about recommended practices that are to be used in a local
VLAN solution
design where Layer 2 traffic is to be kept to a minimum? (Choose two)
A. Routing should occur at the access layer if voice VLANs is utilized. Otherwise, routing
should occur at the
distribution layer.
B. Routing may be performed at all layers but is most commonly done at the core and
distribution layers.
C. Routing should not be performed between VLANs located on separate switches.
D. VLANs should be local to a switch
E. VLANs should be localized to a single switch unless voice VLANs are being utilized.
Correct Answer: BD
QUESTION 193
What is the effect of configuring the following command on a switch?
A. Switch(config)# spanning-tree portfast bdpufilter default
B. If BPDUs are received by a port configured for PortFast, then PortFast is disabled and the
BPDUs are processed
C. normally.
D. If BPDUs are received by a port configured for PortFast, they are ignored and none are
sent.
E. If BPDUs are received by a port configured for PortFast, the port transitions to the
forwarding state.
F. The command enables BPDU filtering on all ports regardless of whether they are configured for
BPDU filtering at the
G. interface level.
Correct Answer: A
QUESTION 194
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to
use VTP versions 1 or 2?
transparent
client
server
Extended VLANs are only supported in version 3 and not in versions 1 or 2.
Correct Answer: A
QUESTION 195

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements
about the STP
process for VLAN 200 are true? (Choose two.)

A. BPDUs will be sent out every two seconds.


B. The time spent in the listening state will be 30 seconds.
C. The time spent in the learning state will be 15 seconds.
D. The maximum length of time that the BPDU information will be saved is 30 seconds.
E. This switch is the root bridge for VLAN 200.
F. BPDUs will be sent out every 10 seconds.
Correct Answer: BF
QUESTION 196
Which three statements are correct with regard to the IEEE 802.1Q standard? (Choose three.)
A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame
B. The packet is encapsulated with a 26 byte header and a 4 byte FCS
C. The protocol uses point-to-multipoint connectivity
D. The protocol uses point-to-point connectivity
E. The IEEE 802.1Q frame uses multicast destination of 0x01-00-0c-00-00
F. The IEEE 802.1Q frame retains the original MAC destination address
Correct Answer: ADF
QUESTION 197

Which of the following HSRP router states does an active router enter when it is pre-empted by a higher
priority router?
(Select the best answer.)
A. active
B. speak
C. learn
D. listen
E. init
F. standby
Correct Answer: B
QUESTION 198
What happens if you apply this command “vlan dot1q tag native” ?
A. packet will be dropped
B. packet will go to default VLAN
C. packet will go to native VLAN
D. ???
Correct Answer: A

QUESTION 199

Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude about
interfaces Fa0/13
and Fa0/14?

A. That interfaces Fa0/13 and Fa0/14 are in VLAN 1


B. That interfaces Fa0/13 and Fa0/14 are down
C. That interfaces Fa0/13 and Fa0/14 are trunk interfaces
D. That interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switch
E. That interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch

Correct Answer: C
QUESTION 200

VLAN maps have been configured on switch R1. Which of the following actions are taken in a VLAN
map that does
not contain a match clause?
A. Implicit deny feature at end of list
B. Implicit deny feature at start of list
C. Implicit forward feature at end of list
D. Implicit forward feature at start of list.
Correct Answer: A
QUESTION 201
Given the configuration on a switch interface, what happens when a host with the MAC address of
0003.0003.0003 is
directly connected to the switch port?

A. The host will be allowed to connect.


B. The port will shut down.
C. The host can only connect through a hub/switch where 0002.0002.0002 is already
connected.
D. The host will be refused access.
Correct Answer: A
QUESTION 202

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN
20. If the STP
configuration is correct, what will be true about Switch 15?

A. All ports will be in forwarding mode.


B. All ports in VLAN 10 will be in forwarding mode.
C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in
blocking mode.
D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in
standby mode.
Correct Answer: B
QUESTION 203

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports
command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?
They have been configured with the spanning-tree bpdufilter disable command.

They have been configured with the spanning-tree bpdufilter enable command.

They have been configured with the spanning-tree bpduguard disable command.

They have been configured with the spanning-tree bpduguard enable command.

They have been configured with the spanning-tree guard loop command.

They have been configured with the spanning-tree guard root command.

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:
QUESTION 204

You want to configure a switched intemetwork with multiple VLANs as shown above. Which of
the following commands should you issue on SwitchA for the port connected to SwitchB?
(Select the best answer)

switchport mode trunk

switchport access vlan 5

switchport mode access vlan 5

switchport trunk native vlan 5

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 205

You administer a network that uses two routers, R1 and R2, configured as an HSRP group to
provide redundancy for the gateway. Router R1 is the active router and has been configured as
follows:
Which of the following describes the effect the "standby preempt delay minimum 50" command will have on
router R1? (Select the best answer.)

The HSRP priority for router R1 will increase to 200.

Router R1 will become the standby router if the priority drops below 50.

The HSRP priority for router R1 will decrease to 50 points when Fa0/2 goes down.

Router R1 will wait 50 seconds before attempting to preempt the active router.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 206
Which statement is correct about 802.1Q trunking?

Both switches must be in the same VTP domain.

The encapsulation type of both ends of the trunk does not have to match.

The native VLAN on both ends of the trunk must be VLAN 1.

802.1Q trunking can only be configured on a Layer 2 port.

In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:
QUESTION 207

Which of the following commands can be issued without interfering with the operation of loop guard?

Switch(config-if)#spanning-tree guard root

Switch(config-if)#spanning-tree portfast

Switch(config-if)#switchport mode trunk

Switch(config-if)#switchport mode access

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 208

The following command was issued on a router that is being configured as the active HSRP router.

Which statement is true about this command?

This command will not work because the HSRP group information is missing.

The HSRP MAC address will be 0000.0c07.ac00.

The HSRP MAC address will be 0000.0c07.ac01.

The HSRP MAC address will be 0000.070c.ad01.

This command will not work because the active parameter is missing

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 209
Routers R1 and R2 are configured for HSRP as shown below:

You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice very
frequent HSRP group state transitions. What is the most likely cause of this?

physical layer issues

no spanning tree loops

use of non-default HSRP timers

failure to set the command standby 35 preempt

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 210
Which two statements about the HSRP priority are true? (Choose two)

To assign the HSRP router priority in a standby group, the standby group—number priority priority-value
global configuration command must be used.

The default priority of a router is zero (0).

The no standby priority command assigns a priority of 100 to the router.

Assuming that preempting has also been configured, the router with the lowest priority in an
HSRP group would become the active router.

When two routers in an HSRP standby group are configured with identical priorities, the router
with the highest configured IP address will become the active router.

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:
The “no standby priority” command will reset the priority to the default value (100) -> C is
correct.

QUESTION 211
Which three statements are true of a default HSRP configuration? (Choose three.)

The Standby hello time is 2 seconds.

Two HSRP groups are configured.

The Standby track interface priority decrement is 10.

The Standby hold time is 10 seconds.

The Standby priority is 100.

The Standby delay is 3 seconds.

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:
The table below shows the default values of popular HSRP parameters:
Note:

Standby delay: If router A is the HSRP active router and then loses a link, which causes it to
become standby router, and then the link comes back, the delay command causes router A to
wait before it becomes active again. For example, with the “standby preempt delay minimum
30” command, it waits for 30 seconds for the router to become active.

Standby track: For example, consider this configuration:


standby priority 150
standby track serial 0

An HSRP priority of 150 is configured with the standby priority command and HSRP is
configured to track the state of interface Serial0. Because no decrement value is specified in
the standby track command, the HSRP priority is decremented by the default value of 10 when
the tracked interface goes down.

Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_12c_ea1/co
nfiguration/guide/swhsrp.html

QUESTION 212
Refer to the exhibit. What is the result of setting GLBP weighting at 105 with lower threshold
90 and upper threshold 100 on this router?
Only if both tracked objects are up will this router will be available as an AVF for group 1.

Only if the state of both tracked objects goes down will this router release its status as an AVF
for group 1.

If both tracked objects go down and then one comes up, but the other remains down, this router will be
available as an AVF for group 1.

This configuration is incorrect and will not have any effect on GLBP operation.

If the state of one tracked object goes down then this router will release its status as an AVF
for group 1.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 213
Which describes the default load balacing scheme used by the Gateway Load Balancing
Protocol (GLBP)?

Per host using a strict priority scheme

Per session using a round-robin scheme

Per session using a strict priority scheme

Per GLBP group using a strict priority scheme

Per host basis using a round robin-scheme

Per GLBP group using a round-robin scheme

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 214

Refer to the exhibit. BPDUGuard is enabled on both ports of SwitchA. Initially, LinkA is connected
and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two
statements about the possible result of attaching the second link are true? (Choose two.)
The switch port attached to LinkB does not transition to up.

One or both of the two switch ports attached to the hub goes into the err-disabled state when a
BPDU is received.

Both switch ports attached to the hub transitions to the blocking state.

A heavy traffic load could cause BPDU transmissions to be blocked and leave a switching loop.

The switch port attached to LinkA immediately transitions to the blocking state.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 215

Which protocol will enable a group of routers to form a single virtual router and will use the real IP address of
a router as the gateway address?

Proxy ARP

HSRP

IRDP
VRRP

GLBP

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 216

What two things occur when an RSTP edge port receives a BPDU? (Choose two.)

The port immediately transitions to the forwarding state.

The switch generates a Topology Change Notification BPDU.

The port immediately transitions to the err-disable state.

The port becomes a normal STP switch port.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 217
How does VTP pruning enhance network bandwidth?

by restricting unicast traffic across VTP domains

by reducing unnecessary flooding of traffic to inactive VLANs

by limiting the spreading of VLAN information

by disabling periodic VTP updates

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 218
In the hardware address 0000.0c07.ac0a, what does 07.ac represent?

vendor code

HSRP group number

HSRP router number

HSRP well-known physical MAC address

HSRP well-known virtual MAC address

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 219
If a switch stack is configured to use SDM templates, where are the templates stored?

all stack members

stack master

TFTP server

flash memory

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 220

Which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user traffic
immediately and transparently recovers from
first-hop failures in network edge devices or access circuits?

ICMP

IRDP

HSRP

STP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

HSRP is a Cisco-proprietary protocol developed to allow several routers or multilayer switches


to appear as a single gateway IP address. This protocol is described in RFC 2281.

QUESTION 221
HSRP was implemented and configured on two switches while scheduled network
maintenance was performed.
After the two switches have finished rebooting, you notice via show commands that Switch2 is
the HSRP active router. Which two items are most likely the cause of Switch1 not becoming
the active router? (Choose two)
booting delays

standby group number does not match VLAN number

IP addressing is incorrect

premption is disabled

incorrect standby timers

IP redirect is disabled

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

When two routers are turned on at the same time, the router completes booting process first will take the
active role. Without the “preempt” configured, even a new router with a higher priority cannot take over
the active role.In the configuration of Switch1 we don’t see the “preempt” command configured.

QUESTION 222

Refer to the exhibit. Three switches are configured for HSRP. Switch1 remains in the HSRP listen
state. What is the most likely cause of this status?
this is normal operation

standby group number does not match VLAN number

IP addressing is incorrect

incorrect priority commands

incorrect standby timers

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

Only Switch 1 is not configured with the priority so it will have the default priority of 100, which is smaller than
that of Switch2 (110) and Switch3 (150).

Moreover, both Switch2 and Switch3 have the “preempt” command so surely Switch3 becomes active router
while Switch2 becomes standby router ->

Switch1 will be in listen state (Please read the explanation of question 2 to understand more about
this state).

QUESTION 223
What are three possible router states of HSRP routers on a LAN? (Choose three)

Standby

Established

Active

Idle

Backup

Init

Correct Answer: ACF


Section: (none)
Explanation

Explanation/Reference:
First we should review all the HSRP States:

Now let’s take an example of a router passing through these states. Suppose there are 2 routers A and B in the
network; router A is turned on first. It enters the initial state. Then it moves to listen state in which it tries to
hear if there are already active or standby routers for this group. After learning no one take
the active or standby state, it determines to take part in the election by moving to speak state. Now it starts
sending hello messages containing its priority. These messages are sent to the multicast address 224.0.0.2
(which can be heard by all members in that group). When it does not hear a hello message with a higher
priority it assumes the role of active router and moves to active state. In this state, it continues sending out
periodic hello messages.

Now router B is turned on. It also goes through initial and listen state. In listen state, it learns that
router A has been already the active router and no other router is taking standby role so it enters
speak state to compete for the standby router -> it promotes itself as standby router.

Now to our main question! We want router B to become active router so we set a higher priority
number than the priority of A and ask router B to take over the role of active router (with the
preempt command). Now router A will fall back to the speak state to compete for active or standby
state -> it becomes standby router because its priority is now lower than that of router A.
(Therefore answer B is correct).

Note: Suppose router A is in active state while router B is in standby state. If router B does not hear
hello messages from router A within the holdtime, router B goes into speak state to announce its priority
to all HSRP members and compete for the active state. But if at some time it receives a message from
the active router that has a lower priority than its priority (because the administrator change the priority
in either router), it can take over the active role by sending out a hello packet with parameters indicating
it wants to take over the active router. This is called a coup hello message.

Reference:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml

QUESTION 224

Refer to the exhibit. Which configuration on the HSRP neighboring device ensures that it becomes
the active HSRP device in the event that port fa1/1 on Switch_A goes down?

Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 200


Switch_B(config-if)#standby 1 preempt Switch_B(config-if)#standby 1 ip 10.10.10.10
Switch_B(config-if)#standby 1 track interface fa 1/1

Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 200


Switch_B(config-if)#standby 1 ip 10.10.10.10

Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 195


Switch_B(config-if)#standby 1 preempt
Switch_B(config-if)#standby 1 ip 10.10.10.10

Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 190


Switch_B(config-if)#standby 1 ip 10.10.10.10 Switch_B(config-if)#standby 1 track interface fa 1/1

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

Switch_A is not configured standby track priority value so it will use the default track priority of 10
-> When Switch_A goes down, its priority is 200 – 10 = 190 so Switch_B must be configured with a
priority higher than 190. Also Switch_B must have the “preempt” command configured to take over
the active state -> C is correct.

Note: Answer A is not correct because Switch_B has the same priority value of Switch_A, but the
Switch_B’s ip address on the HSRP interface is higher (10.10.10.2 is higher than 10.10.10.1) so Switch_B
will take over the active state of Switch_A even when Switch_A is still operational.

QUESTION 225
HSRP has been configured between two Company devices. Which of the following describe
reasons for deploying HSRP? (Choose three)

HSRP provides redundancy and fault tolerance.

HSRP allows one router to automatically assume the function of the second router if the second
router fails.

HSRP allows one router to automatically assume the function of the second router if the second
router starts.

HSRP provides redundancy and load balancing.

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

Answer A and B are correct because they are the functions of HSRP. I just want to mention about
answer D. In fact answer D is not totally correct, in SWITCH only GLBP has the load-balancing
feature. HSRP can only load-sharing by configuring some different HSRP groups. But answer D is
the only choice left in this question so we have to choose it.

QUESTION 226
Regarding high availability, with the MAC address 0000.0c07.ac03, what does the “03” represent?
The GLBP group number

The type of encapsulation

The HSRP router number

The VRRP group number

The HSRP group number

The active router number

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:
The last two-digit hex value in the MAC address presents the HSRP group number.

QUESTION 227

An engineer is configuring EtherChannel between two switches using PAgP. If the EtherChannel
mode on switch 1 is configured using auto, which mode on switch 2 establishes an operational
EtherChannel?

desirable

passive

active

auto

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 228

When using EtherChannel misconfiguration guard which technology is used to prevent this type of
misconfiguration from affecting the network?

PAgP

STP
LACP

port security

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 229

A physical switch port is part of an EtherChannel group. What happens while the same port is configured as
a SPAN destination?

The port is removed from the EtherChannel group.

The operation is not allowed as an EtherChannel member cannot be a SPAN source port.

The port forwards traffic in the EtherChannel group and acts as a SPAN source simultaneously.

The port is put in the errdisabled state and can only be re-enabled manually.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 230
Which option is a Cisco recommended RSPAN configuration practice?

Define an RSPAN VLAN before configuring an RSPAN source or destination session.

Use a different RSPAN VLAN for each session if configuring RSPAN on multiple switches.

Assign access ports to an RSPAN VLAN like any other campus VLAN.

Use only one destination port for each RSPAN session.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 231
When port security is configured on a switch, which violation mode is the default?

shutdown

logging

no change

error disable

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 232

Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings?
(Choose three.)

intercepts

discards

logs

accepts

bypasses

deletes

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:
QUESTION 233
Which command enables root guard on a Cisco switch?

Switch(config)#spanning-tree guard root

Switch(config)#spanning-tree root guard

Switch(config-if)#spanning-tree guard-root

Switch(config-if)#spanning-tree guard root

Switch(config-if)#spanning-tree root guard

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 234
A network engineer is considering implementing UDLD throughout the network. Which option
must the network engineer consider?

UDLD works at Layer 1 of the OSI model.

UDLD is already enabled by default on all ports on Cisco switches.

UDLD aggressively disables the port after eight failed retries to connect to neighbor.

UDLD is an IEEE standard that can be configured on non-Cisco devices.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 235

In regards to Cisco Virtual Switching System which technology is needed between two
switches for them to act as one network element and share control information and data
traffic?

A. trunk
virtual port channel

EtherChannel

virtual switch link

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 236
In which two ways can a port respond to a port-security violation? (Choose two.)

The port triggers an EEM script to notify support staff and continues to forward traffic
normally.

The port immediately begins to drop all traffic.

The port enters the err-disabled state.

The port enters the shutdown state.

The SecurityViolation counter is incremented and the port sends a critical syslog message to
the console.

The SecurityViolation counter is incremented and the port sends an SNMP trap.

Correct Answer: CF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 237

After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter
to determine the reason?

show interfaces g0/1 status

show log

show run interface g0/1

show ip interface brief


Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 238

When EtherChannel guard is enabled and a misconfiguration is detected on a port, how does the port
respond?

It enters the shutdown state.

The port state remains unchanged, but the EtherChannel stays down.

The port remains up, but it is unable to pass traffic.

It enters the channel-error state.

It enters the errdisable state.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 239
In which two ways are IEEE STP BPDUs forwarded if VLAN 99 is configured as native? (Choose
two.)

VLAN 1 STP BPDUs are sent untagged on VLAN 99.

VLAN 1 STP BPDUs are sent untagged on VLAN 1.

VLAN 1 STP BPDUs are sent tagged on VLAN 99.

VLAN 1 STP BPDUs are sent tagged on VLAN 1.

VLAN 1 and VLAN 99 BPDUs are sent tagged on VLAN 1.

VLAN 1 and VLAN 99 BPDUs are sent untagged on VLAN 1.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 240

Refer to the exhibit. Which two statements can be derived from the output of the show standby
command? (Choose two.)

R2 Fa1/0 regains mastership when the link comes back up.

If Fa0/0 is shut down, the HSRP priority on R2 becomes 80.

R2 becomes the active router after the hold time expires.

R2 is using the default HSRP hello and hold timers.

Router with IP 10.10.1.3 is active because it has a higher IP address.

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 241
Which switch is chosen as the stack master during a stack master election?

the switch with the highest stack member ID.

the switch with the lowest stack member ID.

the switch with the lowest stack member priority value.

the switch with the highest stack member priority value.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 242

Which two combinations of EtherChannel modes support the formation of an EtherChannel? (Choose
two.)

passive, passive

active, passive

desirable, passive

desirable, desirable

active, desirable

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 243
Refer to the exhibit. What is the effect of the given configuration?
It enables the switch to become the spanning-tree root bridge.

It enables the reduced MAC address feature.

It enables spanning-tree to create dynamic system IDs.

It enables extended VLANs.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 244
Which two statements about 802.1q are true? (Choose two.)

It supports 8-byte VLAN identifiers.

It adds a 32-bit field to the Ethernet frame between the source MAC address and length.

When it is enabled, it forces a recalculation of the frame-check sequence field.

It increases the maximum size of an Ethernet frame to 1594 bytes.

It encapsulates the original Ethernet frame and adds a VLAN identifier.

It is a Cisco proprietaty protocol.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 245

Which command do you enter so that the default authentication group on a device falls back to the case-
sensitive local user database when the initial
authentication fails?

aaa authentication login default group tacacs+ radius local

aaa authentication exec default group tacacs+ local if-authenticated

aaa authentication login default group tacacs+ local-case if-authenticated

aaa authentication exec default group tacacs+ if-authenticated local

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 246
Which two statements about VRRP are true? (Choose two.)

Authentication commands must be entered under the interface.

It sends advertisements to multicast address 224.0.0.9.

It supports MD5 and IP sec authentication.

It can use an interface IP address as the virtual IP address.

It sends advertisements to multicast address 224.0.0.18.

It is a Cisco proprietary protocol.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 247

Which statement about Layer 2 protocol participation of ports involved in a SPAN session is true?

Neither a SPAN source nor SPAN destination participates in any Layer 2 protocols.

A SPAN source does not participate in any Layer 2 protocols.


A SPAN destination does not participate in any Layer 2 protocols.

Both SPAN source and SPAN destination participate in any Layer 2 protocols.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 248

Refer to the exhibit. Which description of the effect of entering the switch port trunk allowed vlan 2,3,4
command on FastEthernet0/2 is true?

The two workstations continue to communicate without a default gateway configured.

The command is unsupported on a trunk where VLANs have already been pruned manually.

The running configuration displays switch port trunk allowed vlan 1-5 for Fa0/2.

The two workstation stop communicating because they are on VLAN 5. Which is not allowed on the
trunk.
Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

This command will delete vlan 5 and configure trunk with allowed vlans 2,3,4.

To add vlan command is switchport trunk allowed vlan ADD.

QUESTION 249
Refer to the exhibit. Which statement about the interface is true?

The interface is down.

The other side of the interface is set as access.

The switchport command is missing from the configuration.

The interface needs no shutdown configured.


Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 250

A network engineer is trying to prevent users from connecting unauthorized equipment to a


production network. Which option can be campus-wide to satisfy this requirement?

IP Source Guard

switch port block

Uplink fast

private VLAs

BPDU Guard

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 251
Which three responses from a RADIUS server are valid? (Choose three.)

REJECT

CHALLENGE

ACCEPT

UPDATE PASSWORD

CONFIRM

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:

QUESTION 252
Which two operational attributes can be checked for EtherChannel ports that are in err-disabled
state? (Choose two.)

Port mode

Port cost

Duplex

DTP

VLAN

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
Compatibility Requirements
When you add an interface to a channel group, Cisco NX- OS checks certain interface attributes to
ensure that the interface is compatible with the channel group. Cisco NX-OS also checks a number
of operational attributes for an interface before allowing that interface to participate in the port-
channel aggregation.

The compatibility check includes the following operational attributes:


Port mode
Access VLAN
Trunk native VLAN
Allowed VLAN list
Speed
802.3x flow control setting
MTU

The Cisco Nexus 5000 Series switch only supports system level MTU. This attribute cannot be
changed on an individual port basis.
Broadcast/Unicast/Multicast Storm Control setting
Priority-Flow-Control
Untagged CoS

Use the show port-channel compatibility-parameters command to see the full list of compatibility
checks that Cisco NX-OS uses.
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/421_n2_1/b_Cisco_n5k
_layer2_config_gd_rel_421_N2_1/ Cisco_n5k_layer2_config_gd_rel_421_N2_1_chapter7.pdf

QUESTION 253
Refer to the exhibit.

A network engineer deployed an older switch with the same spanning-tree priority as the
existing root, which caused a network outage. In which two locations should the Spanning
Tree protocol root guard feature be implemented? (Choose two.)

On the designated root switch downlinks to the access layer.

On all of non-root switch facing ports of the access layer.

On the access layers root facing ports.

On Layer 3 boundaries in the distribution layer.

Globally on all network switches.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 254
Which three features can be optimized by using SDM templates? (Choose three.)

port security

trunk

VLAN

access

DHCP snooping

routing

Correct Answer: CDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 255

Which two configurations can you apply to a port so that it tags traffic with VLAN 915? (Choose two.)

interface GigabitEthernet0/0 switchport mode access switchport access vlan 915

interface GigabitEthernet0/0 switchport mode trunk


switchport trunk encapsulation dot1q switchport trunk allowed vlan 915

interface GigabitEthernet0/0 switchport mode access switchport voice vlan 915 switchport access vlan
915

interface GigabitEthernet0/0.915 encapsulation dot1q 915

interface GigabitEthernet0/0.915 switchport mode access switchport access vlan 915


Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 256

An engineer is configuring an EtherChannel between two switches using PAgP. If the EtherChannel
mode on switch 1 is configured to auto, which modes on switch 2 establish an operational
EtherChannel?

active

auto

desirable

on

passive

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 257
Which feature do you implement so that an interface enters the root inconsistent state if it receives
a superior BPDU?

DPDU guard

root guard

BPDU guard

loop guard

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 258

A physical switch port is part of an EtherChannel group. What happens while the same port configured as a
SPAN destination?

The port forwards traffic in the EtherChannel group and acts as a SPAN source simultaneously.

The port is removed from the EtherChannel group.

The port is put in the errdisabled state and can only be reenabled manually.

The operation is not allowed as an EtherChannel member cannot be a SPAN source port.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 259
Which two statements about CDP are true? (Choose two.)

CDP uses a TLV to advertise the native VLAN

CDP is not supported with SNMP

CDP is supported on Frame Relay sub interfaces.

CDP runs on OSI Layer 2

CDP runs on OSI Layer 1

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 260
Which statements about RSPAN are true? (Choose two.)

A. It supports MAC address learning.


RSPAN VLANs can carry RSPAN traffic only.

Only one RSPAN VLAN can be configured per device.

RSPAN VLANs are exempt from VTP pruning.

MAC address learning is not supported.

RSPAN uses are GRE tunnel to transmit captured traffic.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 261
When a private VLAN is configured, which mode must be configured as a router facing port?

isolated

promiscuous

community

host

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 262

When a switch is added to a stack, which switch automatically configures the new switch with the correct
IOS?

master

peer

adjacent

slave
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 263

Which HSRP extension allows groups to share traffic loads?

GLBP

CHSRP

MHSRP

CGMP

FHRP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 264

Which mechanism is specific for RSPAN and not for SPAN?

source port

monitor port

reflector port

redundant port

destination port

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 265

Which three pieces of information about the remote device are reported by Cisco Discovery Protocol? (Choose
three.)

The routing protocols in use on the device

Its spanning-tree state

Its hostname

Its port number

Its configuration register value

Its hardware platform

Correct Answer: CDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 266
Where can NetFlow export data for long term storage and analysis?

another network device

flat file

syslog

collector

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 267
Which two types of threshold can you configure for tracking objects? (Choose two.)
weight

bandwidth

MTU

percentage

administrative distance 15

delay

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 268

Refer to the exhibit. Which statement describes the result if a switch that is running PVST+ is added to
this network?
Spanning tree is disabled automatically on the network

Spanning tree continues to operate in Rapid PVST+ on DSW2 and the new switch operates in PVST+

Both switches operate in the PVST+ mode

Both switches operate in the Rapid PVST+ mode

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 269
A workstation technician moves a PC from one office desk to another. Before the move the PC has
network connectivity. After the move as the PC plugged into the new network port, it loses network
connectivity and the network switch port becomes err-disabled. Which option can cause the issue?

wrong VLAN

wrong switch port mode

port security

speed issue

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 270

Your manager asked you to make every port on your switch bypass the normal spanning-tree
timers which includes your uplink to other switches. What two commands can you apply on
the interfaces? (Choose two.)

spanning-tree portfast

spanning-tree portfast default

spanning-tree portfast access

spanning-tree portfast trunk

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 271
Which switchport feature will block the packet with unknown MAC address from sending it via
port.

switchport protect

switchport block unicast


switchport portfast

packet with unknown MAC will be dropped

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 272
Which IOS configuration command is required to configure a VLAN as a private VLAN?

switch(config-vlan)# private-vlan common

switch(config-vlan)# private-vlan private

switch(config-vlan)# private-vlan primary

switch(config-vlan)# private-vlan transparent

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 273

If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods
of load balancing on the EtherChannel are preferred? (Choose two.)

destination-MAC

dest-source-MAC

destination-IP

source-MAC

source-IP

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/54sg/configuration/guide/config/channel.html

QUESTION 274
What is the default mode for LACP EtherChannel when configured?

on

active

passive

desirable

off

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 275
Which layer private VLAN partition the broadcast domain?

Layer 1

Layer 2

Layer 3

Layer 4

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 276

What VSS technology allows you to share downstream resources?

LACP

PAgP

MEC

EOA

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 277

Which option is the maximum frame size for an 802.1Q frame?

64 bytes

68 bytes

1518 bytes

1522 bytes

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 278

Which option is the minimum frame size for an 802.1Q frame?

64 bytes

68 bytes

1518 bytes
D. 1522 bytes

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 279
Which two statements about HSRP timers are true? (Choose two.)

the default hold timer is 15 seconds

the default hello timer is 3 seconds.

the default hello timer is 5 seconds.

the default hold timer is 10 seconds.

the default hello timer is 30 seconds.

the default hold timer is 30 seconds.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 280

During the implementation of a voice solution, which two required items are configured at an
access layer switch that will be connected to an IP phone to provide VoIP communication?
(Choose two.)

allowed codecs

untagged VLAN

auxiliary VLAN

Cisco Unified Communications Manager IP address

RSTP
Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:
An IP phone contains an integrated three-port 10/100 switch. The ports, which are dedicated
connections, are described as follows:
Port 1 connects to the Catalyst series switch or other device that supports Voice-over-IP
(VoIP).
Port 2 is an internal 10/100 interface that carries the phone traffic.
Port 3 connects to a PC or other device.

To enhance the quality of the VoIP traffic, port 2 and port 3 are often placed in two different
VLANs. The VLAN carries voice traffic to and from the IP Phone is often called auxiliary VLAN
(Port 2 in this case) while the VLAN carries data traffic is often the native VLAN (Port 3 in this
case).

In the picture below the auxiliary VLAN is VLAN 30 while the native VLAN is VLAN 20. To use
the IP Phone these two VLANs will need to be configured on the switch.
To learn how to configure auxiliary VLAN please read:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4000/8.1/configuration/guide/
vlans.html#wp1048863.

To learn how to configure voice and data VLAN please read:


http://www.cisco.com/en/US/products/hw/switches/ps4324/ products
MCQs April-May 2017 - Contribute

QUESTION 1
What is the Ethernet frame size for 802.1Q?

64

128

1518

1522

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2

How will the traffic reach the core switch from AS switch to DS core switch?
(Based on a topology shown with one core, two distribution and two access switches on each
distribution switch, with redundant links and bandwidth mentioned.)

ASW1 to DWS1 to core

ASW1 to DWS2 to core

ASW1 to DSW1 to DSW2 to core

ASW1 to DSW2 to DSW1 to core

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 3

If HSRP group number is 45 what would be the MAC address?

(Basically conversion of digit to hexadecimal with group of 16.)

00-00-0C-07-AC-2D

0000-0C07-AC45

0000-070C-AC2D

0000-C004-ACD2

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
HSRP vMAC: 0000-0C07-AC?? -> 0000-0C07-AC2D
CISCO_ID : HSRP_ID : GROUP_ID
2D=45

QUESTION 4
A question on EtherChannel misconfiguration.......

Enable this feature by using the (config)# spanning-tree etherchannel guard misconfig global
configuration command.

Spanning Tree portfast feature must be disabled per interface basis

This command is not available in Cisco Switches

Enable this feature by using the (config-if)# spanning-tree etherchannel guard misconfig command

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Enabling EtherChannel Misconfiguring Guard –


http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/
configuration/guide/3750xscg/swstpopt.html

QUESTION 5
Select a valid VRRP configuration from a list of possible configurations. (Choose three.)

vrrp [group-number] ip [ip-address]

vrrp [group-number] priority [priority]

vrrp [group-number] preempt

standby [group number] priority [priority]

standby [group number] preempt

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

You can eliminate configurations with the word ‘standby’, as that would be HSRP, not VRRP. Also, I
think the options that put things like vrrp group 1 ip x.x.x.x are wrong. You don’t need the word
‘group’ in the configuration line. The number 1 is the group number. Anyway, just take a good look
a t a few valid VRRP configuration examples so that you will be able to recognize invalid ones.
QUESTION 6

Private VLANs (PVLANs) have two secondary VLAN types.

community

isolated

promiscuous

host

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7

EtherChannel - what is the process to configure EtherChannel.

shutdown both interface ports

shutdown the interface on one side only

Shutdown is necessary if the ports are in err-disable

Don't need to shutdown the ports

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8

question about spanning-tree port-priority. A. 127


B. 129
128

4096

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
If all priorities are default the value is 128.

Lesser is better in this case, the only one answer who has the less value in this case is 127.

QUESTION 9
Question about EtherChannel based on STP EtherChannel misconfig......

(config)# spanning-tree etherchannel guard misconfig

(config-if)# spanning-tree etherchannel guard misconfig

(config)# spanning-tree etherchannel misconfig guard

(config-if)# spanning-tree etherchannel misconfig guard

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Enabling EtherChannel Guard –


http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-
2_55_se/configuration/ guide/3750xscg/swstpopt.html

QUESTION 10
If HSRP group number is 37, what would be the vMAC (virtual MAC) address?

00-00-0C07-AC25

0000-0C07-AC37

0000-C007-AC25

0000-C007-AC37

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
HSRP vMAC: 0000-0C07-ACXX

Converting 37 Decimal to hexadecimal = 25

HSRP vMAC = 0000-0C07-AC25

QUESTION 11
What is the default value for spanning-tree port-priority?

128

64

32

1024

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/n5k/commands/spanning-tree-port-
priority.html QUESTION 12
When you configure PVLAN to the portal facing to the router what kind of ..... should be?

isolated

promiscuous

host

community

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 13
Which option TPI 802.1Q tag?

0x0806

0x888E

0x0800

0x8100

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
MAC address filter?

CPU-destined

router

unicast

multicast

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15

Question about what would be, if write command “switchport mode trunk portfast”? (I don’t remember
properly)

A. trunk port will be immediately


trunk port can be portfast mode

BDPU turn this port to err-disabled

BDPU turn this port to shutdown

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16

What statement is true if a new switch with a lower bridge ID is introduced in a network with root guard
enhancement?

Prevent unknown switch be a root port

Root Guard puts the port into root-inconsistent

Allow two root bridges in a network

All ports of the new switch are changed to listening state

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10588-74.html

QUESTION 17
How to configure loop guard in a Cisco switch IOS?

(config)#spanning-tree loop guard default

(config-if)#spanning-tree loop

(config)#spanning-tree loop-guard default

(config-if)#spanning-tree guard loop

(config-if)#spanning-tree guard

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
spanning-tree guard loop

Router(config)#interface gigabitEthernet 1/1

Router(config-if)# spanning-tree guard loop

QUESTION 18
Which statement is true about dynamic access port?

VLAN 1 is the default VLAN.

None until the port VLAN is determined.

All VLANs are permitted in a dynamic access port link.

Per default the port has to participate in a VLAN election to determine which VLAN a port is assigned.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
Question about the behavior of an access port when a tagged packet is received.

packet is dropped.

tag is removed and packet is forwarded on the VLAN of the access port.

tag is removed and packet is forwarded to the VLAN mentioned in the tag.

tag is removed and packet is forwarded on the VLAN of the trunk port.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 20
A question about RSPAN configuration in VTPv2.

vlan 4029 remote span

vlan 510 remote span

vlan 510 span

vlan 4029 span

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21

A question about configuring spanning-tree port-priority based on a diagram where all port-priorities are
default.

(config)# spanning-tree port-priority 127

(config-if)# spanning-tree port-priority 127

(config)# spanning-tree port-priority 129

(config-if)# spanning-tree port-priority 129

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
A question on EtherChannel misconfiguration.

PortFast

PAGP
LACP

STP

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

A question on local database for consoling to network devices. (Choose two.)

Console is a backup authentication method

Console is the only backup authentication method

You can set user privileged levels

Consoling to network devices is not possible

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Three reasons for err-disable. (Choose three)

storm control

security violation

configuration ports into EtherChannel

BPDUguard

VRRP

VSS

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

There are various reasons for the interface to go into errdisable. The reason can be:

A cable that is out of specification (either too long, the wrong type, or defective)

Bad network interface card (NIC) card (with physical problems or driver problems)

Port duplex misconfiguration


Duplex mismatch
Port channel misconfiguration
BPDU guard violation
UniDirectional Link Detection (UDLD) condition
Late-collision detection
Link-flap detection
Security violation
Port Aggregation Protocol (PAgP) flap
Layer 2 Tunneling Protocol (L2TP) guard
DHCP snooping rate-limit
Incorrect GBIC / Small Form-Factor Pluggable (SFP) module or cable
Address Resolution Protocol (ARP) inspection
Inline power
Storm Control

QUESTION 25
What can happen after a RSPAN configuration in a Cisco switch?

Destination port is unusable for normal use

Traffic in network is doubled

CDP or LLDP must be enable on switch

The traffic is cached in NVRAM

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 26
A question on local user database for login to network devices. (Choose two.)

Local user dbs can be main and also backup authentication method

Local user dbs is the only backup authentication method

You can set user privileged levels

Local user dbs is used after 3 unsuccessful logins via RADIUS server

AAA authentication must be implemented on switch

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
What are the two ways to configure loop guard?

(config)# spanning-tree loopguard default

(config-if)# spanning-tree guard loop

(config)# spanning-tree loopguard enable

(config-if)# spanning-tree loopguard default

(config)# spanning-tree guard loop

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-
84.html#loop_guard

QUESTION 28

What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the
switch do when it receives a packet with option 82?
Drop

Remove 82 and forward

Proxy ARP

Nothing

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

The switch removes the option-82 field and forwards the packet to the switch port that connects to
the DHCP client that sent the DHCP request.

http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/security/configurati
on_guide/b_sec_3se_3850_cg/ b_sec_3se_3850_cg_chapter_01100.html

QUESTION 29
Which two statements are true about Option 82? (Choose two.)

Layer 2 ingress

Layer 3 egress

Layer 3 ingress

Layer 2 egress

Layer 4 egress

Layer 4 ingress

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

Layer 2 ingress – “Enters interface configuration mode, where slot/port is the Layer 2 Ethernet
ingress interface where you want to configure the option 82 string.” (see “Enabling or
Disabling Option 82 User Defined Data Insertion and Removal”) <<ingress (in)

Layer 3 egress – this sounds right "Enters interface configuration mode, where slot/port is the
interface for which you want to enable or disable subnet broadcast support for the DHCP relay
agent. (see "Enabling or Disabling Subnet Broadcast Support for the DHCP Relay Agent on a
Layer 3 Interface") <<egress (out)
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3548/sw/security/6-
x/b_N3548_Security_Config_602_A11/ b_N3548_Security_Config_602_A11_chapter_01011.html

QUESTION 30
Which command is used to verify trunk native VLANs?

show access ports

show interfaces trunk

show trunk

show vlan native trunk

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Question about voice VLAN. (Choose two.)

Disabled by default

Enters on untrusted port

Default CoS value of 5 for untagged.


D. Needs manual enable of PortFast.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
Question about UDLD aggressive. (Choose two.)

UDLD messages are sent every 15 seconds.

UDLD tries to reestablish link once before declaring the link down.

When unidirectional fail is detected, port state is determined by spanning tree.

When unidirectional fail is detected, port is turned to errdisable.

UDLD sends messages four times the message interval by default.

UDLD automatically sends message interval based on configured timers.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33

Diagram is: with 1 core, 2 DSW connected with EtherChannel, 2 ALSW, 2 PCs per ALSW. Per diagram current
root for VLAN 10 is DSW2.

Question is how to make DSW1 the primary root for VLAN 10. (Choose two.)

DSW2: change bridge priority to 61440 (highest).

DSW1: change bridge priority to 4096 (lowest).

DSW1: change port priority but in global configuration mode.

DSW1: change bridge priority but value is 0.

DSW1: change bridge priority but command is priority root.


Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
How to configure dynamic ARP inspection on a VLAN?

(config)# ip arp inspection vlan

(config-if)# ip arp inspection vlan

(config)# arp inspection default

(config-if)# inspection arp vlan

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Source: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/dynarp.html

QUESTION 35
What keyword in macro command is used to configure a root bridge and automatically adjust STP
timers?

root primary

diameter

reflector

STP bridge root

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Source: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-
122.html
QUESTION 36
Question about interoperability between MST and RSTP.

disable RSTP and uses bpdu type 4

enable RSTP and uses bpdu type 4

disable RSTP and uses bpdu type 2

enable RSTP and uses bpdu type 2

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
802.1w BPDU (Version 2). MST interoperates with Rapid PVST+ with no need for user
configuration.

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0
_1a/CLIConfigurationGuide/MST.html#40909

Bridge Protocol Data Unit fields[edit]


IEEE 802.1D and IEEE 802.1aq BPDUs have the following format:
Protocol ID: 2 bytes (0x0000 IEEE 802.1D)
Version ID: 1 byte (0x00 Config & TCN / 0x02 RST / 0x03 MSTP / 0x04 SPT BPDU)
BPDU Type: 1 byte (0x00 Config BPDU, 0x80 TCN BPDU, 0x02 RST BPDU)
Flags: 1 byte

QUESTION 37
Question about what would be, if write command “spanning-tree portfast trunk”?

Trunk port will be immediately

Trunk port can be portfast mode

BDPU turn this port to err-disabled

The port is removed from trunk

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

Source: https://cciepursuit.wordpress.com/2009/01/20/enabling-portfast-on-trunks/

QUESTION 38
Where is SDM template stored in a Stackwise configuration?

master

slave

NVRAM

flash

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
What statement about MAC address table is true?

Every entry in MAC address table has VLAN assigned.

Extended VLANs doesn’t have VLAN assigned in MAC address table.

Private VLANs doesn't have to be assigned in MAC address table.

Static bindings can't be removed from MAC address table.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
What statements about STP path cost are true? (Choose two.)

A. Long path cost is 64 bits


Short path cost is 32 bits

MST uses long path cost

Default path cost is short

They have equal path cost by default

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

In a Virtual Switching System, DSW1 and DSW2 need to communicate with each other to determine
the role. Which technology is it using?

STP

RSPAN

VSL Protocol (Virtual Switch Link)

LACP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

Source: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-switching-
system1440/prod_qas0900aecd806ed74b.html

QUESTION 42
Which two statements about frame LLDP is true? (Choose two.)

Frame has destination multicast address

Frame has CRC

LLDP frame is compatible with CDP v2

LLDP multicast address is 0100-0CCC-CCCC

Can't be used for POE negotiation


Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
Source: https://wiki.wireshark.org/LinkLayerDiscoveryProtocol

QUESTION 43
Which statement about frame SPAN is true?

Destination and source port SPAN works on L2 (Layer 2).

Source ports SPAN work on L2 (Layer 2).

Destination ports SPAN work on L2 (Layer 2).

Destination and source port SPAN don't work on L2 (Layer 2).

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44

Which two commands is used to remove VLAN 55 from the trunk port? (Choose two.)

switchport trunk allowed vlan add 3, remove 55

switchport trunk allowed vlan remove 55

switchport trunk allowed vlan except 55

switchport remove vlan 55

switchport trunk remove vlan 55

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:
QUESTION 45

AAA question about the command used to login a user and set immediate access to privilege mode.

aaa authorization exec default group radius

aaa authentication default group login

aaa authorization group default radius

aaa authentication exec default group radius

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Question about LACP priority. Which statement is true?

LACP priority is used to determine which port is used to form the EtherChannel.

LACP priority is removed from EtherChannel.

There was a command about LACP priority.

LACP priority is used to determine which port is put in standby mode.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which information is true about RSPAN?

RSPAN VLAN carries only RSPAN traffic

On a switch there can be only one RSPAN VLAN


RSPAN VLAN carries RSPAN traffic along multiple switches

RSPAN can be enable only in a Layer 3 switch

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
What statement is true about PVST?

PVST+ is the default STP mode on Cisco switches

Rapid PVST+ is the default STP mode on Cisco switches

Is the default mode on Cisco switches

STP is the default mode on Cisco switches

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49

What is the value of the TPID/tag protocol identifier in dot1q?

0x8100

0x8a88

0x8b45

0x8200

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
C-TAG (Customer tag, with ethertype 0x8100)

QUESTION 50
What is the value of the TPID/tag protocol identifier of QinQ?

0x8a88 (or 0x88a8 ???)

0x8100

0x8b45

0x8200

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
The outer tag is the one closer/closest to the Ethernet header; its name is S-TAG (Service tag,
ethertype 0x88a8)

QUESTION 51
EXHIBIT INCLUDED. About port priority.

Core switch is connected to 2 distribution switches which are connected to 2 access switches. PC1
is connected to DSW1 and DSW2 root bridge. Link connected from PC1 to DSW2 is 4Gbps and
DSW1 is 10gbps. There is an EtherChannel trunk between DSW1 and DSW2. Default port priority is
configured. Change in port priority so traffic goes through DSW1 to DSW2. (Choose two.)

DSW1: spanning-tree port priority 16

DSW1: interface g1/0

DSW2: spanning-tree port priority 16

DSW2: interface g1/0

DSW1: spanning-tree port priority 0

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 52

Exhibit included which it had BPDU guard configured and received BPDU. Now admin has
entered “no bpdu guard enable” command. How can the port be brought back to operational
status?

With the command: shutdown + no shutdown

With the command: disable autorecovery BPDU guard

With the command: UDLD reset

Rebooting the switch

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which two configurations cause the frames to be tagged? (Choose two.)

interface gi 0/1.116 encapsulation dot1q

trunk allowed vlan 116

interface with access and voice VLAN configured to 116

interface encapsulation native vlan

switchport mode on

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
EtherChannel load balancing with an exhibit.
Which EtherChannel load balancing algorithm should be used to optimize the EtherChannel links between
switches?

Source MAC

Source-dest MAC

Destination IP

Destination MAC

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 55

Which two commands will remove VLAN 100 from the allowed VLAN list? (Choose two.)

EXHIBIT - switchport trunk allowed vlan 1,80,99-250

switchport trunk allowed vlan remove vlan 100

switchport trunk allowed vlan 1-80,99,101-250

switchport trunk allowed vlan except vlan 100

switchport trunk remove vlan 100

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
What is the link called between a VSS? (CONCEPT ONLY)

VSL (Virtual Switch Link)

SVI

DCSP

VLAN

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57
Which statement is true about GLBP?
GLBP uses multicast address 224.0.0.102 with UDP port 3222.

GLBP uses multicast address 224.0.0.2 with TCP port 3222.

GLBP uses multicast address 224.0.0.102 with TCP port 3222.

GLBP uses multicast address 224.0.0.18 with UDP port 3222

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Source: https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

QUESTION 58
How many Active Virtual Gateways (AVG) can be used in a GLBP protocol?

Only one AVG can be elected on a switch

Two AVG could be elected on a switch

Two AVG just could be elected in GLBP v2

GLBP supports 8 AVGs per group

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Source: https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

QUESTION 59
Which statement is true about VRRP?

VRRP uses multicast address 224.0.0.18 and uses IP Protocol 112

VRRP uses multicast address 224.0.0.28 and uses UDP port 112

VRRP uses multicast address 224.0.0.2 and uses IP Protocol port 3222

VRRP uses multicast address 224.0.0.18 and uses TCP port 112

VRRP uses multicast address 224.0.0.9 and uses UCP port 112
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
Which statement is true about HSRP?

HSRP uses multicast address 224.0.0.2 and uses UDP port 1985.

HSRP uses multicast address 224.0.0.22 with TCP port 1122

HSRP uses broadcast address 224.0.0.2 with UDP port 1985

HSRP uses broadcast address 224.0.0.22 with UDP port 32229

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

Source: https://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/9234-
hsrpguidetoc.html

QUESTION 61
A question about the priority of a Stackwise switch. (CONCEPT ONLY)

Master member is selected based on member’s priority.

Master member will never be selected based on member’s priority.

Master member does not completely exist.

Master member is based on user aggression.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 62
What is the benefit of UDLD?

provides backup for fiber

help in preventing loops

removes loops

determines switch path

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63

When no spanning-tree bpdu guard enable is configured in f0/7, which is true?

(There's an exhibit that shows f0/7 receive BPDU.)

We have to configure shutdown and no shutdown.

Have to use errdisable recovery.

UDLD reset

Network administrator must disable spanning-tree protocol

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
An exhibit with spanning-tree. Protocol used was IEEE. (Choose two)

The command spanning-tree mode IEEE was implemented.

The spanning-tree mode is IEEE.


The protocol is Cisco proprietary.

The protocol is supported per MEC basis.

The protocol does not supported by switches that utilizes EtherChannel.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65
What is the multicast address for HSRP?

224.0.0.102

127.0.0.1

224.1.1.2

224.1.1.102

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
A question about UDLD.

udld setting
udld setting
int f0/5
udld setting aggressive

What happens if interface f0/5 has been damaged?

A. Other interface will recover


All links go down

Link stays up

Reset interface

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
Question about the difference between RSPAN and SPAN.

Monitor Port

Access Port

Forwarding Port

Destination Port

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68

What will be the behavior of an access port when a tagged packet is received, with a VLAN ID of an access
port?

The tag is removed and packet is forwarded to a VLAN of access port.

The tag is removed and packet is forwarded of the VLAN mentioned in the tag.

The tag is not removed and packet is forwarded of the VLAN mentioned in the tag.

Packet is dropped.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
STP Topology Exhibit Included.

DSW1 connected to DSW2 with 10G link and to ASW1 with 10G link also
DSW2 connected to ASW1 with 1G link

What is the path for traffic sourced from a PC connected to ASW1 to reach DSW1?

ASW1 were connected to DSW2

DSW1 were connected to ASW1

DSW1 were connected to loopback interface

ASW1 were connected to ASW2

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70

When using EtherChannel misconfiguration guard, which technology is used to PREVENT this type of
misconfiguration from affecting the network?

A. LACP
Port security

STP

PAgP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71

When using EtherChannel misconfiguration guard, which technology is used to SUPPORT this type of
misconfiguration from affecting the network?

LACP

Port security

STP

PAgP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72

An engineer needs to add a customer private VLAN to the network. What configuration is required to isolate
the customer's traffic on the network?

Configure transparent mode

Enable VTP v3

Configure VTP in server mode

Disable VTP and manually configure the customer VLAN

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
What SPAN configuration is required to enable on a switch?

A monitor VLAN is created for the SPAN traffic.

Configure a source and destination port.

Disable VTP pruning on trunk links.

LLDP must be enable in an interface.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74
EXHIBIT INCLUDED. Question about the best load balancing method with an exhibit.

Source IP

Source MAC

Destination MAC-Source

Source Port

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75

What is the behavior of an access port when a tagged packet is received other than the access VLAN value?
Tag is removed and packet is forwarded of the VLAN mentioned in the tag.

Tag is removed and packet is forwarded on the VLAN of the access port.

Not available

Packet is dropped

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76

Refer to the exhibit. - (Picture was showing from CLI “show spanning-tree vlan xx” that running on mode
rapid-pvst).

If you have a new switch (that runs spanning-tree mode pvst+) connect to the exist switch, which
statement is true?

It will not working between two switches.

It will work, the new switch will communicate exist switch with PVST+

It will work, the new switch will communicate exist switch with Rapid-PVST

It will work, the new switch will communicate exist switch with MSTP

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
About VRRP configuration. Which statement is true?
[Question just short like this because in each option will have CLI for config 1 group of VRRP]

Switch-A(config)# interface vlan 1 Switch-A(config-if)# ip address 192.168.1.10 255.255.255.0


Switch-A(config-if)# vrrp 1 ip 192.168.1.1 Switch-A(config-if)# vrrp 1 priority 200

Switch-A(config)# interface vlan 1 Switch-A(config-if)# ip address 192.168.1.11 255.255.255.0


Switch-A(config-if)# vrrp 2 ip 192.168.1.1 Switch-A(config-if)# vrrp 2 priority 100

Switch-A(config)# interface vlan 2 Switch-A(config-if)# ip address 192.168.1.10 255.255.255.0


Switch-A(config-if)# vrrp 1 ip 192.168.1.10 Switch-A(config-if)# vrrp 1 priority 200

Switch-A(config)# interface vlan 2 Switch-A(config-if)# ip address 192.168.1.10 255.255.255.0


Switch-A(config-if)# vrrp 1 ip 192.168.1.10 Switch-A(config-if)# vrrp 1 priority 100

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78

Your company wants to connect an internal switch to the uplink provider switch. What method /
feature / functions you need to enable to prevent initial / potential broadcast of internal
information / topology? (forgot the correct wording)

A. BPDU Filter
BPDU Guard

BPDU Loop

BPDU Bridge

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79

What happens if an interface within channel group is configured as SPAN destination?

Portchannel will forward traffic to source span

will not be operational

the link will be in error-disable

will operate normal

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80

EtherChannel guard misconfig is configured on a switch, which technology supports that?

LACP

PagP

STP

Port Security

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 81
Which will identify the master switch in stackwise?

The switch that is currently the stack master

The switch with the highest stack member priority value

The switch that uses the non-default interface-level configuration

The switch with the lower priority stack member priority value

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
MCQs June 2017 - Contribute

QUESTION 1

There was an EtherChannel configured and one of the port was used as SPAN destination. What will be
the result?

The EtherChannel will not be operational because the port cannot be used as SPAN
destination.

EtherChannel will discard the port used.

The EtherChannel will shutdown.

The EtherChannel will no longer exist.

EtherChannel will operate as normal.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
What do subordinate switches in a switch stack keep?

Subordinate switches keep their own spanning trees for each VLAN that they support.

Subordinate switches keep entire VLAN database.

Store running configuration on all the switches.

Subordinate switches does not keep their own spanning trees.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which two statements apply to topology-based switching? (Choose two.)
It is functionally equivalent to Cisco Express Forwarding.

It is the preferred switching mode in Cisco multilayer switches.

It uses loop free protocol for switching.

Disabled by default.

Multi-vendor Protocol

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which two statements apply to LLDP? (Choose two.)

It runs on the data link layer.

It is not enabled by default on Cisco devices.

It runs on the network layer.

Enabled on Cisco devices by default.

Hold-time is 100 seconds on Cisco devices

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which two statements about SDM templates are true? (Choose two.)

They are used to allocate system resources.

Changing the SDM template will not disturb switch operation.

You can verify the SDM template that is in use with the show sdm prefer command.

SDM templates are defined by the switch model and can't be changed
E. SDM templates changes don't require switch to be rebooted

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6

Question about the behavior of VLAN 1 BPDUs in a situation where the native VLAN configured as VLAN 99
and the native VLAN is tagged. (Choose two.)

Normal STP VLAN 1 BPDU travel across VLAN 99 untagged

PVST+ VLAN 1 BPDU travel across VLAN 99 tagged

Normal STP VLAN 1 BPDU travel across VLAN 1 untagged

PVST+ VLAN 99 BPDU travel across VLAN 99 tagged

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
What is the default violation status of port security?

none

shutdown

trap

enabled

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 8
What is the storm control violation defined by default on a Cisco switch?

Disabled

Enabled

Enabled by broadcast only

Enabled by multicast only

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

What happens when a destination SPAN port that is configured as EtherChannel receives traffic?

Shutdown

Err-disable

Nothing

Broadcast threshold is doubled in an interface

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
A question regarding to redundancy protocol (or VRRP).

VRRP uses UDP port number something (or IP protocol 112)

VRRP uses TCP IP protocol 20


VRRP uses UDP protocol 200

An IP protocol does not exist

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
MCQs August 2017 - Contribute

QUESTION 1
Refer to the exhibit. Which two statements about the network environment of the interface that
generated this output are true? (Choose two.)

The configured VRRP priority of the interface is 120.

The device on which the interface resides is acting as a standby router.

The Skew time is .531 seconds.

The configured VRRP priority of the interface is 105.

If the priority of another router is higher than the priority of the master router, it becomes the
master router after 3.351 seconds.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
Answer A is correct because skew time-> (256-configured priority)/256-configured.

Answer C is correct because there was priority 105 in exhibit but there was also line: Track object
1 state “down” decrement 15 -> so the configured priority is 120.
Answer E is NOT correct because even though the hello interval in the exhibit is 1s (hold interval is
3x hello + skew time (0.351)) but notice that there was hold down timer 3.351 instead of 3.531.

QUESTION 2

Which two commands sequences must you enter on a pair switches so that they negotiate an EtherChannel
using an IEEE-standard...? (Choose two.)

channel-protocol lacp channel-group 1 mode auto

channel-protocol lacp channel-group 1 mode passive

channel-protocol pagp channel-group 1 mode on

channel-protocol pagp channel-group 1 mode auto

channel-protocol lacp channel-group 1 mode active

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which two prerequisites for HSRP to become active on an interface are true? (Choose two.)

Cisco Express Forwarding must be disabled globally.

The VIP must be in the same subnet as the primary IP address.

A Virtual-MAC address must be configured on the interface.

An IP address must be configured on the interface.

PIM routing must be disabled on the interface.

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 4
Which two authentication types does VRRP support? (Choose two.)

Plain-text

CHAP

PAP

802.1x

MD5

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which two limitations of local SPAN are true? (Choose two.)

The source and destination ports must reside in the same switch or switch stack.

It can monitor only traffic that ingresses or egresses on the source interface or VLAN.

A SPAN session can support multiple destination ports only if they are on the same VLAN.

Each SPAN session supports only one source VLAN or interface.

A switch can support only one local SPAN session at a time.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
A. Correct
It’s obvious, you can’t destinate a port or vlan that’s doens’t exist on the local switch or stack.

“The destination port used in one SPAN session cannot also be used as the destination port for another SPAN
session.”
Correct

Incorrect
“You can also create a SPAN session to monitor multiple VLAN sources and choose only VLANs of
interest to transmit on multiple destination ports. For example, you can configure SPAN on a trunk port
and monitor traffic from different VLANs on different destination ports.”

D. Incorrect
“You can also create a SPAN session to monitor multiple VLAN sources and choose only VLANs of
interest to transmit on multiple destination ports. For example, you can configure SPAN on a trunk port
and monitor traffic from different VLANs on different destination ports.”

E. Incorrect
“You can create up to 64 total SPAN sessions (Local SPAN plus ERSPAN) on your local device.”

Source:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3/system_manageme
nt/configuration/guide/ n1000v_system/n1000v_system_9span.html#pgfId-1054894

QUESTION 6
Which statement about the default switch database management template is true?

Template disables routing and supports the maximum number of unicast MAC addresses.

Template maximises system resources for access control lists.

Template maximises system resources for unicast routing.

Template gives balance to all functions.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which results happens when a nontrunking port that is configured with BPDU guard is connected
to a device that is transmitting….

The port is moved into the spanning-tree blocking state.

Their port is error-disabled.

A routing loop can occur on the network.


D. The port transitions to the connected state.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8

Which two settings are part of a default LLDP configuration? (Choose two.)

or

Which two settings are the parts of a Default LLDP configuration? (Choose two.)

The LLDP hold time is 60 seconds.

The LLDP global state is disabled.

The LLDP reinitialisation delay is 5 seconds.

The LLDP interface state is enabled.

The LLDP timer is 60 seconds.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
Which two statements about GLBP are true? (Choose two.)

The AVF responds to ARP request for the virtual IP address.

The LAN client traffic is handled by the active AVF only.

The AVG assigns virtual MAC addresses to GLBP group members.

The AVF assigns virtual MAC addresses to GLBP group members.


E. The AVG responds to ARP requests for the virtual IP address.

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10

Refer to the exhibit. If switch SW6 is operating VTP server and the other devices have the
same configuration as SW4, which statement about the VLANs network is true?
Traffic on VLANs 1 through 9 is flooded to all switches in the network.

VLANs 1 through 101 are operational on all switch trunks.

VLANs 1 through 9 are pruned on the link between SW1 and SW4.

VLANs 1 through 101 are pruned on the link between SW1 and SW2.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 11
Which two pieces of information are carried in a Cisco Discovery Protocol advertisement?
(Choose two.)

Processor Type

VTP Domain Name

Routing Protocol

Memory Usage

Spanning-Tree Mode

Native VLAN-ID

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12

Refer to the exhibit. You have configured routers R1 and R2 with VRRP for load sharing as
shown. Which two effects of this configuration are true? (Choose two.)
Router R2 is the primary gateway for 10.1.0.1 and Router R1 is the primary gateway for 10.1.0.10.

PC2 and PC4 use router R1 as the primary gateway.

The four PCs send all request to router R1, which forward traffic to router R2 as necessary.

Router R1 is the primary gateway for 10.1.0.1 and router R2 is the primary gateway for 10.1.0.10.

PC1 and PC3 use router R1 as the primary gateway.

The four PCs send packets round-robin between routers R1 and R2.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:
The exhibit (goo.gl/5tZwUm) is not correct.
The client 1 and 3 have default gateway 10.1.0.1 and client 2 and 4 has default gateway
10.1.0.10.
The interfaces on the routers have IP as per question-> R1 as 10.1.0.2 and R2 has 10.1.0.3.
This mean that R1 is primary for group 1 and R2 is primary for group 2.
The PC1 and PC3 uses R1 as primary gateway.

QUESTION 13
Which two DTP negotiated interface mode combinations negotiate to form an access port?
(Choose two.)

Dynamic Desirable and Dynamic Auto

Dynamic Desirable and Access

Dynamic Auto and Dynamic Auto

Nonegotiate and Trunk

Dynamic Auto and Trunk

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14

Refer to the exhibit. Which two statements about the network environment of the device that generated
this output are true? (Choose two.)
The exhibit hello and hold timer values are in use.

The standby router can take the active HSRP if it fails to receive a hello packet from the active router
within 1.616 seconds.

The priority value of the HSRP group is 1.

HSRP version 2 is in use.

The standby router can take the active HSRP role if it fails to receive a hello packet from the active router
within 10 seconds.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
There was a show standby brief exhibit.

Answer A is correct - There were timers: 3s hello and 10s hold.

Answer B is NOT correct because 1.616 is time when the router will send the next hello
message.

Answer C is NOT correct because the priority value wasn’t 1.

Answer D is NOT correct because there was nothing line HSRP version 2.
Answer E is correct - This also mean that after 10 second the standby router will take the active role
because is there as 3 missing hello messages.

QUESTION 15
Which statement about the VTPv2 is true?

It supports the use of multiple instances.

It propagates VLANs 1 – 1005 only.

It can be enabled on a per-port basis.

It performs consistency checks only when a new VLAN is manually added.

It can be enabled on a per-interface basis.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

VTPv3 offers support for extended range VLAN (VLANs 1006 to 4094) database propagation.
VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended VLANs are configured, you
cannot convert from VTP version 3 to version 1 or 2.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-
2_52_se/configuration/guide/3560scg/ swvtp.html#wp1316856

In addition to propagating VTP information, version 3 can propagate Multiple Spanning Tree
(MST) protocol database information. A separate instance of the VTP protocol runs for each
application that uses VTP -> Only VTPv3 supports multiple VTP instances -> Answer A is not
correct.

VTP version 1 and version 2 support only normal-range VLANs (VLAN IDs 1 to 1005). VTP version 3
supports the entire VLAN range (VLANs 1 to 4094). Extended range VLANs (VLANs 1006 to 4094)
are supported only in VTP version 3. You cannot convert from VTP version 3 to VTP version 2 if
extended VLANs are configured in the domain. Only VTPv3 allows to turn on/off per-port basis ->
Answers C, E are not correct.

Consistency Checks: In VTP version 2, VLAN consistency checks (such as VLAN names and
values) are performed only when you enter new information through the CLI or SNMP.
Consistency checks are not performed when new information is obtained from a VTP message
or when information is read from NVRAM. Therefore Answer D is not correct.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-
2_52_se/configuration/guide/3560scg/swvtp.html

QUESTION 16
Which three options of VLAN IDs are in extended range? (Choose three.)
99

999

1001

1006

3003

4021

Correct Answer: DEF


Section: (none)
Explanation

Explanation/Reference:
Source: https://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t15/ht_xvlan.html

QUESTION 17
A question about security and the choices were...

(Which of these options supports to maintain the network architechture and stability of the root bridge in a
spanning-tree service?)

BPDU Filter

BPDU Guard

Root Guard

Loop Guard

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

Source: https://supportforums.cisco.com/t5/network-infrastructure-documents/importance-of-bpdu-
guardand-bpdu-filter/ta-p/3120465

QUESTION 18
Which STP feature used to monitor BPDU traffic and enable STP to transition between states?

Root Guard

Loop Guard
BPDU Filter

BPDU Guard

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
BPDU Guard feature allows STP to shut an access port in the event of receiving a BPDU.

Root Guard ensures that the port on which root guard is enabled is the designated port. If the
bridge receives superior BPDUs on a root guard-enabled port, root guard moves this port to a root-
inconsistent STP state (which is equal to STP listening state). No traffic is forwarded across this
port. In this way, the root guard enforces the position of the root bridge.

Loop Guard feature provides additional protection against STP loops. An STP loop is created when an
STP blocking port in a redundant topology erroneously transitions to the forwarding state. This usually
happens because one of the ports of a physically redundant topology (not necessarily the STP blocking
port) no longer receives STP BPDUs. In its operation, STP relies on continuous reception or
transmission of BPDUs based on the port role. The designated port transmits BPDUs, and the non-
designated port receives BPDUs. When one of the ports in a physically redundant topology no longer
receives BPDUs, the STP conceives that the topology is loop free. Eventually, the blocking port from the
alternate or backup port becomes designated and moves to a forwarding state. This situation creates a
loop. The loop guard feature makes additional checks. If BPDUs are not received on a non-designated
port, and loop guard is enabled, that port is moved into the STP loop-inconsistent blocking state,
instead of the listening/learning/forwarding state. Without the loop guard feature, the port assumes the
designated port role. The port moves to the STP forwarding state and creates a loop. So all three
features above do not support STP to transition between states.

How about BPDU Filter?

At the global level, you can enable BPDU filtering on Port Fast-enabled interfaces by using the
spanning-tree portfast bpdufilter default global configuration command. This command prevents
interfaces that are in a Port Fast-operational state from sending or receiving BPDUs. The interfaces
still send a few BPDUs at link-up before the switch begins to filter outbound BPDUs. You should
globally enable BPDU filtering on a switch so that hosts connected to these interfaces do not
receive BPDUs. If a BPDU is received on a Port Fast-enabled interface, the interface loses its Port
Fast-operational status, and BPDU filtering is disabled.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-
2_55_se/configuration/guide/3560_scg/swstpopt.html

The first and second underlined sentences are very contradictory. The first one says it prevents an
interface from receiving BPDUs while the second one says when it receives BPDUs, BPDU filtering
is disabled! The fact is this command will prevent an interface from sending BPDUs only. But if it
receives BPDUs, it will lose its PortFast feature and return to a normal switching port (with STP
enabled). There are two ways to configure BPDU filtering feature, one in global configuration mode
and one under a specific interface:

Configuring BPDU filter globally:


Switch(config)#spanning-tree portfast bpdufilter default
Configure BPDU Filter on the interface:
Switch(config-if)#spanning-tree bpdufilter enable (this overrides the global bpdufilter
command above)
But the effect of these two commands are different and you should remember:
When BPDU filtering is enabled globally; and if BPDUs are seen, the port loses its PortFast
status, BPDU filtering is disabled, the port returns to normal state
When BPDU filtering is enabled on a specific port, it prevents this port from sending or receiving BPDUs
(so if BPDUs are seen, they will be dropped)

Therefore in this question we can only think about the BPDU Filter under global configuration mode. In
this mode the port can transit between STP states.

QUESTION 19
A question about TACACS+ with three choices. (Choose three.)

Supports backwards compatible with TACACS+

Encrypts the header

Encrypts the whole payload

Utilizes TCP port

Utilizes UDP port

Separates authentication and authorization

Correct Answer: CDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which two possible EtherChannel load balancing mechanisms are based on Layer 3? (Choose
two.)

MAC Source

MAC Source-destination

IP Source

IP Source-destination

MAC Destination
Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
A question about what carries voice VLAN to a Cisco phone?

SIP

LLDP

CDP

SKINNY

RSPAN

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

You must enable CDP on the switch port connected to the Cisco IP Phone to send the
configuration to the phone (which includes the Voice VLAN to be used).

QUESTION 22
VRRP authentication. (Choose three.)

SHA-124

SHA-254

No authentication

WAP

Plain text authentication

MD5

Correct Answer: CEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

DTP question was about how to form an access port. (Choose two.)

(CONCEPT ONLY)

dynamic auto + dynamic auto = access

dynamic auto + dynamic desirable = trunk

dynamic desirable + dynamic desirable = trunk

dynamic auto or dynamic desirable + trunk = trunk

dynamic auto or dynamic desirable + access = access

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which two statements about MST are true? (Choose two.)

It can operate without a root bridge.

It supports one STP instance per VLAN.

It is vendor neutral.

All VLANs must reside in a single MST region.

It can map multiple VLANs to a single STP instance.

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:

QUESTION 25
Which two statements about HSRP are true? (Choose two.)

You must manually configure ICMP redirect messages on HSRP interfaces.

It is supported on switch virtual interfaces and routed ports.

Primary and secondary HSRP switches forward traffic in a round-robin style.

The interfaces in a HSRP group share a virtual MAC address.

An HSRP group can support a maximum of eight switches.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

ICMP (Internet Control Message Protocol) redirect messages are automatically enabled on
interfaces configured with HSRP (therefore answer A is not correct). This feature filters outgoing
ICMP redirect messages through HSRP, in which the next hop IP address might be changed to an
HSRP virtual IP address. ICMP is a network layer Internet protocol that

provides message packets to report errors and other information relevant to IP processing. ICMP provides
diagnostic functions, such as sending and directing error packets to the host. When the switch is running
HSRP, make sure hosts do not discover the interface (or real) MAC addresses of routers in the HSRP group. If
a host is redirected by ICMP to the real MAC address of a router and that router later fails, packets from the
host are lost.

Routers in an HSRP group can be any router interface that supports HSRP, including routed ports
and switch virtual interfaces (SVIs) on the switch -> Answer B is correct.

In a group of router interfaces, the active router is the router of choice for routing packets; the
standby router is the router that takes over the routing duties when an active router fails or when
preset conditions are met -> Answer C is not correct.

When HSRP is configured on a network or segment, it provides a virtual MAC address and an IP address that
is shared among a group of configured routers. HSRP allows two or more HSRP-configured routers to use
the MAC address and IP network address of a virtual router -> Answer D is correct.

HSRP can be configured on a maximum of 32 VLAN or routing interfaces. So its support depends
on VLAN or interface only, it does not depend on the number of router/switch.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/metro/me3600x_3800x/software/release/12-
2_52_ey/configuration/guide/3800x3600xscg/ swhsrp.pdf
QUESTION 26
Which VTPv2 mode does the switch operate without participating in VTP?

client

server

transparent

off

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which two features can you configure on a access port? (Choose two.)

QinQ

PortFast

Voice VLAN

STP Mode

802.1q

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

The Portfast feature can be configured on both access or trunk port. This feature instructs the
port to skip listening and learning state and move to forwarding state immediately. The voice
VLAN feature enables access ports to carry IP voice traffic from an IP phone. The simple
example below shows how to configure voice VLAN on an interface:
Note: This is not a trunk port (although two VLANs are configured on an interface). Cisco calls this a
Multi-VLAN access port.

QUESTION 28
How to disable CDP? (Choose two.)

no cdp run on interface

no cdp run in global configuration

cdp disable on interface

no cdp enable on interface

no cdp enable in global configuration

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Storm control options apart from the default one. (Choose two.)

log

shutdown

trap

err-disable

let admin know

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:

QUESTION 30
Which two statements about GLBP is true? (Choose two.)

Can have 128 AVFs on an interface

Maximum 4 AVFs allowed in a group

Can work with dual active AVGs

Can have 6 AVFs in a group

GLBP supports up to 1024 virtual routers per group.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
Source: https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

QUESTION 31
Which of these two options are true about RADIUS? (Choose two.)

Uses TCP port 49

Uses client server model

Uses UDP to exchange traffic

Support for multiple protocols

Is compatible with TACACS+

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-
radius/13838-10.pdf (page 2)

QUESTION 32
A question on TACACS+. (Choose two.)
Backward compatible with TACACS.

More secure then RADIUS as it uses UDP.

Has support for multiple protocols other than IP.

Separates authentication and authorization.

Encrypts just the header.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-
radius/13838-10.pdf (pages 3 and 4)

QUESTION 33

Refer to the exhibit. Which three statements about the network environment of the interface that generated
the exhibit is true? (Choose three.)

(NOTE: Original question similar to this asks for two (2) answers, but this is just a concept only
based on exhibit.)

A. The configured VRRP priority of the interface is 120.


The device on which the interface resides is acting as a standby router.

The Skew time 0.531 seconds.

The configured VRRP priority of the interface is 105.

If the priority of another router is higher than the priority of the master router, it becomes the
master router.

Correct Answer: ACE


Section: (none)
Explanation

Explanation/Reference:
Original question was to choose only two (2) answers.

Explanation about the Skew Time can be found here: https://|khill.com/vrrp-skew-time-and-


always-be-learning/

We can determine that the configured priority was 120, because the Tracked Object is down in
the exhibit and decrement value was 15 and the current priority is 105. (120 - 15 = 105).

We can also confirm the configured priority by manually calculating the Skew Time. The Down
Interval is 3 seconds + Skew Time. The formula for the Skew Time is (256 - configured
priority) / 256.

256 — 120 = 136, 136/256 = 0.531 (this is the Skew Time)

In the exhibit, we saw Master Down interval is 3.531 sec.

QUESTION 34
A question about DHCP snooping feature. (Choose two.)

limit / intercept messages from untrusted

limit traffic from untrusted

correlate IP to domain name

drops all traffic outside the domain

resource not available in 12.2 IOS

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 35

A question about how to recover err-disable. (Choose two.)

UDLD reset

Err-disable auto recovery

Shut and restart

UDLD recovery

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

A question about which is true about CDP? (Choose two.)

disabled when native VLAN mismatched

can be disable on interface only

send periodic broadcast

send periodic multicast

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

A question about how to tag native VLAN X. (Choose two.)

A. switchport trunk native vlan x


encapsulation dot1q native vlan x

Config#….

Config#…....

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38

A question about port security (mac). (Choose two.)

Err-disabled when max allowed mac

???

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39

A question about AAA with TACACS+ (Choose three.)

uses TCP 49

uses UDP 49

Cisco proprietary

uses standard...

uses extended...
Correct Answer: ACD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
A question about how to disable CDP. (Choose two.)

no cdp run on global configuration

no cdp enable to disable per interface

no cdp run on sub-interface

no cdp enable to shutdown per interface

no cdp run on enable mode

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

Refer to the exhibit. You can change the SDM template to maximize the number of supported
MAC addresses. You noticed that the switch routing performance has been significantly
degraded. Which action do you take to correct the problem?
Configure sdm prefer vlan

Configure sdm prefer routing

Execute clear ip route command to reset the routing table.

Configure sdm prefer default

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

Answer D is correct cause the question asks to maximize supported MAC address.

QUESTION 42
Which three characteristics of AAA with RADIUS are true? (Choose three.)

It uses a client-server architecture.

It uses standards-based implemented.

It runs on UDP port 1812.

It is a Cisco proprietary implementation.

It runs on TCP port 49.


F. It uses a client-private cloud architecture.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 43

Which two statements about an access port with voice VLAN are true? (Choose two.)

They support a single VLAN for data traffic.

They require VTP.

Frame on the voice VLAN are tagged with a Layer 2 CoS value.

They can be configured on VLANs 1 through 1001.

They can be configured on trunk ports and access ports.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44

Why the network administration can want to to disable MAC address learning on the router?

To free up space in MAC address table.

To use space in MAC address table.

To wipe space in MAC address table.

There was a security violation.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 45
Where can you disable MAC address learning on the switch?

On the VLAN interface.

Per switch port.

A VLAN filter template is necessary.

With the global command mac-address disable.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

To re-enable MAC address learning on an interface or VLAN, use the default mac address-table learning
global configuration command.

https://www.cisco.com/c/en/us/td/docs/wireless/mwr_2941_dc/software_config/guide/3_3/2941_33_
Config_Guide/mac_lrn.pdf

QUESTION 46
Which three advantages of TACACS+ are true? (Choose three.)

It integrates authentication and authorization

It controls access to network devices

It controls access to endpoint devices

It encrypted the passwords

It encrypted the whole transition

It separates authentication and authorization

Correct Answer: BEF


Section: (none)
Explanation

Explanation/Reference:

RADIUS encrypts only the password in the access-request packet, from the client to the server. The remainder
of the packet is unencrypted. Other
information, such as username, authorized services, and accounting, can be captured by a
third party.

TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header.
Within the header is a field that indicates whether the body is encrypted or not. For debugging
purposes, it is useful to have the body of the packets unencrypted. However, during normal
operation, the body of the packet is fully encrypted for more secure communications.

QUESTION 47
Which two restrictions of the port security feature are true? (Choose two.)

trunk ports

SPAN ports

tunnel ports

EtherChannel

private VLANs

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
How to tag native VLAN 99?

switchport trunk native vlan 99

encapsulation dot1q native vlan 99

switchport mode trunk native vlan 99

switchport vlan native 99

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 49
A question about voice VLAN. (Choose two.)

Need to be configured on a separated VLAN.

Need to disable CDP.

Can be configured on the same port and keep CoS.

Need to enable LLDP.

Not available

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50
What happens if we add "line" on AAA command?

Disable TACACS+ authentication

Disable RADIUS authentication

It's a last resource (or resort) login

Is the prefer logging method in Cisco switches

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
Which one is related to Stackwise technology?

Switches can be stack with port-channel.

Multiple switch can be stack.


Master switch and backup switch is listed in line.

ProStack with mix switch.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

A switch which was connected with 2 fiber cable attached to another switch. After initial boot (I
think another switch), one of the link get error-disable or shutdown. What was the reason for
that?

Due to STP.

Due to UDLD aggressive mode, the other switch didn't get the BPDU message.

Due to UDLD normal mode, the other switch didn't get the BPDU message.

Due to port security configuration.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which technique will control broadcast, multicast and unicast problem?

port security

STP

storm control

SPAN

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54

A question about how to disable CDP? (Choose two.) - CONCEPT

(config)# no cdp run

(config)# cdp disable

(config-if)# no cdp enable

(config-if)# no cdp run

(config-if)# cdp disable

(config)# no cdp enable

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55

How to recover err-disable after an UDLD failure? (CONCEPT)

UDLD reset

Err-disable auto recovery

Shut and no shutdown (restart)

Reboot the switch

UDLD recovery

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 56

Which configuration do you apply to an interface so that it port security to learn and commit the first MAC
address? (CONCEPT)

sticky

restrict

shutdown

protect

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

How to configure DHCP snooping and DAI (Dynamic ARP Inspection) in VLAN? (Choose all that apply.) -
CONCEPT ONLY

Define and configure a DHCP server

Enable DHCP snooping on at least one VLAN

Ensure that DHCP server is connected in a trusted interface

Configure DHCP snooping DB agent

Enable DHCP snooping globally

Redirect DHCP snooping locally

Disable DHCP snooping on at least one VLAN

Prevent DHCP server from connecting to a trusted interface

Correct Answer: ABCDE


Section: (none)
Explanation

Explanation/Reference:
Concepts:
– Define and configure a DHCP server
– Enable DHCP snooping on at least one VLAN
– Ensure that DHCP server is connected in a trusted interface
– Configure DHCP snooping DB agent
– Enable DHCP snooping globally

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/snoodhcp.html#wp1114907

QUESTION 58
Which three feature sets are used in Stackwise technology? (Choose three.) - CONCEPT ONLY

LAN Base

IP Base

WAN Services

IP Services

ARP Base

LAN Agent

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

The switch port monitor provides data on network switches by port in use, CPU load, memory used, etc.
You can even drill down into specific port data to obtain active and historical port utilization information.
These reports are integral for meeting compliance needs. As a best practice for safeguarding your
network from security risks, accurate information on unused switch ports helps the administrator keep
these ports closed.

QUESTION 59
Which statement is true about Stackwise? - CONCEPT ONLY

When building a switch stack, you cannot mix software feature sets.

When building a switch stack, you can mix software feature sets.

When building a Switch stack, a broadcast storm would occur.

When building a Switch stack, performance will be degraded.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

There are three main software feature sets: LAN Base, IP Base, IP Services. When building a
Switch stack, you cannot mix software feature sets. For example, you cannot have some
switches with LAN Base and some with IP Services.

QUESTION 60
Which three statements about SPAN and RSPAN are true? (Choose three.) - CONCEPT ONLY

The switch port monitor provides data on network switches by port in use, CPU load and
memory used.

It provides specific port data to obtain active and historical port utilization information.

Accurate information on unused switch ports helps the administrator keep these ports closed
for security risk best practices.

Does not provide specific port data to obtain active and historical port utilization information.

Accurate information on unused switch ports is not neccessary.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

The switch port monitor provides data on network switches by port in use, CPU load, memory used,
etc. You can even drill down into specific port data to obtain active and historical port utilization
information. These reports are integral for meeting compliance needs. As a best practice for
safeguarding your network from security risks, accurate information on unused switch ports helps
the administrator keep these ports closed.

QUESTION 61
Refer to the exhibit. Which two statements about the flag of the EtherChannel is true? (Choose
two.)
Flag S indicates Layer 2 is operational.

Flag U indicates EtherChannel is operational.

Flag R indicates Layer 2 is operational.

Flag U indicates Layer 2 is operational.

Flag H indicates EtherChannel is operational.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 62

Refer to the exhibit. Which three actions you need to perform to make the traffic goes through DSW1 to
DSW2? (Choose three.) - CONCEPT ONLY

DSW1(config-if)# spanning-tree port priority 16

DSW1(config)# interface g1/0

DSW2(config-if)# spanning-tree port priority 16

DSW2(config)# interface g1/0

DSW2(config-if)# spanning-tree port priority 0

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:

QUESTION 63

Refer to the exhibit. Which three statements about the flag of the EtherChannel is true? (Choose three.) -
CONCEPT ONLY

(BASED ON THE ORIGINAL WITH 2 ANSWERS)

Flag S indicates Layer 2 is operational.

Flag U indicates EtherChannel is operational.

Port-Channel protocol is Cisco proprietary.

Port-Channel is bundled in Group 10.


E. Flag SU indicates the EtherChannel is suspended.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 64

Refer to exhibit: How to make DSW1 the primary root for VLAN 10. (Choose two.) - CONCEPT ONLY
Change DSW2 bridge priority to VLAN 20 to 61440

Change DSW1 bridge priority to VLAN 10 to 4096


Change DSW1 bridge priority to VLAN 20 for 4096

Change DSW1 bridge priority to VLAN 10 for 1

Change DSW1 bridge priority to VLAN 10 with the command priority root

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65

Which information does the subordinate switch in a switch stack keep for all the VLANs that are configured
on it? (CONCEPT ONLY)

VLAN database

DHCP snooping database

Spanning trees information

Routing information

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
Which three settings are part of a default LLDP configuration? (Choose three.)

The LLDP hold time is 120 seconds.

The LLDP global state is disabled.

The LLDP reinitialisation delay is 5 seconds.

The LLDP interface state is enabled.

The LLDP timer is 60 seconds.

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)

Network Policy TLV

VTP Management Domain TLV

System Name TLV

Inventory Management TLV

Native VLAN TLV

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68

Which fallback method can you configure to allow all AAA authorization requests to be granted if the
other methods do not respond or return an error?

enable

RADIUS

none

TACACS+

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 69
Which two new features are included in VTPv3? (Choose two.)

VTPs can now be configured in off mode.

It can be configured to prevent the override of the VLAN database.

VTP now supports MD5 passwords.

VLANs configured for token ring are now eligible to participate in VTP.

VLANs in the extended range are now eligible to participate in VTP.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
http://brbccie.blogspot.com/2014/07/vtp-v3.html

Supports extended VLANs (1006 - 4094)


VTP can now be turned off completely, as opposed to just transparent mode
Fixes the bane of VTP v1/2, the accidental-high-configuration-revision-wipes-out-your-network issue, by design
it does this no configuration is necessary.

QUESTION 70
Which two statements about VRRP advertisements are true? (Choose two.)

They are sent from the master router and standby routers.

They include VRRP timer information.

They are sent only from the master router.

They include priority information.

They are sent every three seconds by default.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
https://yurmagccie.wordpress.com/2015/08/07/virtual-router-redundancy-protocol/#_jmp0_

QUESTION 71
Which two StackWise configuration setting types are applied at the system level? (Choose two.)

802.1x settings

speed/duplex settings

port-security settings

VLAN settings

SNMP settings

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-
2_40_se/configuration/guide/scg1/swstack.pdf

Switch Stack Configuration Files


The configuration files record these settings:
System-level (global) configuration settings—such as IP, STP, VLAN, and SNMP settings—that apply to
all stack members

Stack member interface-specific configuration settings, which are specific for each stack member

QUESTION 72
A question about the effective way to handle unknown traffic?

broadcast storm

unicast storm

multicast storm

ARP

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
Which three values can Cisco IOS device use as the basis for EtherChannel load-balancing?
(Choose three.)
MAC address

port number

IP address

VLAN ID

IP precedence

DSCP

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 74
Which command can you enter to set the time between BPDUs in an MST environment by route
bridge?

spanning-tree mst 1 cost 5

spanning-tree mst mst forward-time 5

spanning-tree mst hello-time 2

spanning-tree mst max-age 20

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75

Which two tasks must you perform on a device to ensure that an Etherchannel operate at Layer 3? (Choose
two.)

configure no switchport on physical interface

configure EtherChannel directly on the interface

switchport mode trunk


configure switchport on

configure switchport mode access

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76

Which two configuration requirements for port security are true? (Choose two.)

Port must be in access mode

Port security must be enabled on the port level

Port must be in interface VLAN mode

Port security must be disabled on the port level

Port must be in encapsulation mode

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77

A question about how PortFast works in access and trunk ports. (Choose two.)

Skip STP (802.1D) timers.

State immediately bypassing the listening and learning states.

PortFast just can be connected to a workstation or server.

The port is put in err-disable if connected in a trunk port.

State does not immediately bypassing the listening and learning states.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
This article is very helpful.

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/stp_enha.html

QUESTION 78

Which two ISP devices should have trust Port-Statement with DHCP Snooping feature? (Choose two.)

User responsible to control ISP edge devices

Only ISP edge devices

Edge devices

Network devices

Local only devices

Nobody is responsible to control ISP edge devices

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79
A question about dymanic MAC address learning.

You can enable and disable dynamic MAC address learning only on VLAN.

Dynamic MAC address learning is standard function in Ethernet networks.

It is not possible to enable and disable dynamic MAC address learning only on VLAN.

Dynamic MAC address learning is not a standard function in Ethernet networks.

Dynamic MAC address learning is not possible on a Ethernet switch.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80
A question about StackWise. (Choose two.)

Stack works with single management IP.

Stack works with single management console to monitor.

Stack works like a single device.

Stack works with multicast only addresses.

Stack does not work with single management IP.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 81

A question about using CDP and LLDP at the same time on one switch. (Choose two.)

Can use CDP and LLDP at the same time

Can not use at the same time

Only CDP

Only LLDP

LLDP use multicast advertisement

LLDP use unicast advertisement

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 82
A question about voice LAN port. (Choose three.)

Voice needs their own VLAN

Traffic tagged or untagged

Interface should be trunk or access

QoS works with QoS queue if the port state is set to trust

Port must be untrust

Port must be trust

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 83
A question about port security violation.

Always shutdown by violations

Always error-disable by violations

Always log by violations

Always trap by violations

Always disable by violations

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 84
Which two requirements are required to form a Layer 2 EtherChannel? (Choose two.)

Ports should be contiguous.

Ports should be in same module of switch stack.

Same trunking protocol should be used on all ports.

No port should be a part of SPAN destination session.

All ports should be a part of SPAN source and destination session.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
Same trunking protocol (dot1q or ISL) should be used on all ports.
The ports can be source of a SPAN session but not destination.

QUESTION 85

Which two port err-disabled recovery options are used to detect the reason? (Choose two.) - CONCEPT
ONLY

show errdisable detect

show errdisable recovery

error-disable notifications/traps are active by default.

error-disable notifications/traps are disabled by default.

error-disable notifications/traps is never possible.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
MCQs Sept-Oct-Nov 2017 - Contribute

QUESTION 1

A question about a Layer 2 switch has been moved over to a Layer 2 and Layer 3 environment but high CPU
spike during work hours.

show sdm prefer vlan (config)# sdm prefer vlan

show sdm prefer routing (config)# sdm prefer routing

show sdm prefer


(config)# sdm prefer routing

show sdm prefer


(config)# sdm prefer default

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Default SDM gives balance to all functions.

QUESTION 2
Which switch is chosen as the stack master during a stack master election or re-election?

the switch with the highest stack member priority value

the switch with the lowest stack member priority value

the switch with the highest stack member ID

the switch with the lowest stack member ID

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which of the following commands are valid to configure DHCP snooping with Dynamic ARP
Inspection for a VLAN? (Choose all that apply.) - CONCEPT ONLY

(config)# ip dhcp snooping vlan arp trust

(config)# ip dhcp snooping

(config)# ip dhcp snooping vlan 10

(config)# ip arp inspection vlan 10

(config)# interface ethernet 0/0 (config-if)# ip dhcp snooping trust (config-if)# ip arp inspection trust

(config)# interface ethernet 0/0 (config-if)# ip dhcp arp inspect-snoop trust

Correct Answer: BCDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
A question about storm control based on optimal storm-control configuring.

storm-control broadcast level 10bps

storm-control broadcast level 10pps

storm-control broadcast level 10 20

storm-control broadcast enable

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
A question related to security violation mode which drop unknown packets and then sends trap.
inhibit

drop

restrict

shutdown

protect

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6

Which two statements about extended-range VLANs are true? (Choose two.)

Created in VTP server mode in VTP version 3.

Created when switch is in VTP server mode.

They support pruning.

VTP version 3 stores extended-range VLAN in VLAN database.

VTP version 1 and 2 stores extended-range VLAN in VLAN database.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7

How many VLANs can be assigned to a user access port configured for VoIP?

3
D. unlimited

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
In which two circumstances does a port security violation occur? (Choose two.)

(A question about port security violation occur in which two circumstances)

When a port with secure MAC address attempt to use a different port in same VLAN.

When the same MAC addresses enters a port more than once.

When the CAM table overflows with dynamically learned MAC address.

When the port has received more MAC address than allowed.

When sticky MAC address learning is enabled and the port has a link down condition.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
Which three authentication methods does VRRP use? (Choose three.)

802.1x authentication

Cipher authentication

SHA-256 authentication

No authentication

Plain text authentication

MD5 authentication
Correct Answer: DEF
Section: (none)
Explanation

Explanation/Reference:
VRRP has three authentication schemes:
No authentication

Plain text authentication

MD5 authentication

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-
4-book/fhp-vrrp.html#GUID-B1CB24C0-2526-4790-A701-0105FDA69FC8

QUESTION 10
Which three authentication methods does GLBP use? (Choose three.)

Single Sign On authentication

MD5 authentication

No authentication

Plain text authentication

DCSP authentication

6-to-4 authentication

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:
GLBP has three authentication schemes:
No authentication

Plain text authentication

MD5 authentication

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-
4-book/fhp-glbp.html

QUESTION 11
Which two authentication methods does HSRP use? (Choose two.)
WPA2 authentication

SHA-128 authentication

MD5 authentication

Plain text authentication

Teredo

No authentication methods do exist

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
HSRP has two authentication schemes:
Plain text authentication

MD5 authentication

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-
book/fhp-hsrp.html

QUESTION 12
Which three HSRP exchange states are used in multicast messages? (Choose three.)

err-disabled

coup

inherit

hold

hello

resign

Correct Answer: BEF


Section: (none)
Explanation

Explanation/Reference:
Coup - When a standby router wants to assume the function of the active router, it sends a coup
message.
Hello - The hello message conveys to other HSRP routers the HSRP priority and state information
of the router.
Resign - A router that is the active router sends this message when it is about to shut down or
when a router that has a higher priority sends a hello or coup message.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-
4/fhp-12-4-book/fhp-hsrp.html#GUID-0C469257-64CB-4779-B9FC-964A2E051789

QUESTION 13
Which two tasks can be accomplished to configure multiple HSRP client groups? (Choose
two.)

Use the standby priority command to configure an HSRP group to become a backup of
another HSRP group.

Use the standby follow command to configure an HSRP group to become a slave of another
HSRP group.

Use the standby track command to configure an HSRP group to become a primary HSRP
group.

Use the standby mac-refresh <seconds> command to change the refresh interval of the HSRP
client group.

Use the standby mac-resurrect <seconds> command to change the refresh interval of the
HSRP client group.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
Perform this task to configure multiple HSRP client groups.

The standby follow command configures an HSRP group to become a slave of another HSRP
group.

HSRP client groups follow the master HSRP with a slight, random delay so that all client
groups do not change at the same time.

Use the standby mac-refresh seconds command to directly change the HSRP client group
refresh interval. The default interval is 10 seconds and can be configured to as much as 255
seconds.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-
4/fhp-12-4-book/fhp-hsrp.html#GUID-EBDA2930-B8E5-4E54-9ECC-F9F232EC2955

QUESTION 14
Which three statements about RSPAN VLAN are true? (Choose three.)

RSPAN VLAN traffic only flows on trunk ports.

RSPAN VLAN prevents from carrying traffic.

RSPAN VLAN can not be a private primary VLAN or secondary VLAN.

All RSPAN VLAN traffic is flooded.

RSPAN VLAN traffic only flows on access ports.

RSPAN VLAN does not support Spanning-Tree Protocol.

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. It has
these special characteristics:

All traffic in the RSPAN VLAN is always flooded.

No MAC address learning occurs on the RSPAN VLAN.

RSPAN VLAN traffic only flows on trunk ports.

RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN
configuration mode command.

STP can run on RSPAN VLAN trunks but not on SPAN destination ports.

An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.

For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its
associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the
extended VLAN range (1006 to 4094), you must manually configure all intermediate switches.

It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a
network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can
contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions
throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN
VLAN ID separates the sessions.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-
2_55_se/configuration/guide/3750xscg/ swspan.html

QUESTION 15
Which two statements about RSPAN VLAN are true? (Choose two.)

RSPAN VLAN must be configured in VLAN configuration mode using the remote-span command.

RSPAN VLAN trunks can handle Spanning-Tree protocol, except for SPAN destination ports.

RSPAN VLAN access ports can handle Spanning-Tree protocol in conjunction with SPAN
destination ports.

RSPAN VLAN does not support any protocols.

RSPAN VLAN traffic does not get flooded.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. It has
these special characteristics:

All traffic in the RSPAN VLAN is always flooded.

No MAC address learning occurs on the RSPAN VLAN.


RSPAN VLAN traffic only flows on trunk ports.

RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN
configuration mode command.

STP can run on RSPAN VLAN trunks but not on SPAN destination ports.

An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.

For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its
associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the
extended VLAN range (1006 to 4094), you must manually configure all intermediate switches.

It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a
network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can
contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions
throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN
VLAN ID separates the sessions.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-
2_55_se/configuration/guide/3750xscg/ swspan.html

QUESTION 16
Which two functions of DHCP snooping are true? (Choose two.)

It rate-limits DHCP traffic from trusted and untrusted sources.

It listens to multicast messages between senders and receiver.

It helps build the route table.

It filters invalid messages from untrusted sources.

It correlates IP address to hostnames.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted
DHCP servers. The DHCP snooping feature performs the following activities:

Validates DHCP messages received from untrusted sources and filters out invalid messages.

Rate-limits DHCP traffic from trusted and untrusted sources.

Builds and maintains the DHCP snooping binding database, which contains information about
untrusted hosts with leased IP addresses.

Utilizes the DHCP snooping binding database to validate subsequent requests from untrusted
hosts.

Other security features, such as dynamic ARP inspection (DAI), also use information stored in the
DHCP snooping binding database.
DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all
VLANs. You can enable the feature on a single VLAN or a range of VLANs.

The DHCP snooping feature is implemented in software on the route processor (RP).
Therefore, all DHCP messages for enabled VLANs are intercepted in the PFC and directed to
the RP for processing.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/snoodhcp.html

QUESTION 17
Which two restrictions of the port security feature are true? (Choose two.)

Static port MAC address assignments are not supported.

It is not supported on PVLAN ports.

It is not supported on EtherChannel port-channel interfaces.

A single device can learn a maximum of three sticky MAC addresses.

It is supported on destination SPAN ports.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
Port Security Guidelines and Restrictions

Follow these guidelines when configuring port security:


A secure port cannot be a trunk port.

A secure port cannot be a destination port for Switch Port Analyzer (SPAN).

A secure port cannot belong to an EtherChannel port-channel interface.

A secure port and static MAC address configuration are mutually exclusive.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/25ew/configuration/guide/conf/port_sec.pdf (see page 32-3)

QUESTION 18
Which configuration do you apply to an interface so that it uses port security to learn and
commit the first MAC address?

A. Configure the switchport switch-port security violation restrict 1 command.


Enable the sticky MAC addresses feature.

Enable the static secure MAC addresses feature.

Configure the switch for port-security aging type inactivity command.

Configure the switchport port-security maximum 1 command.

Disable the sticky MAC addresses feature.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
Which two commands can you enter to configure load-balancing at Layer 2? (Choose two.)

port-channel load-balance dst-ip

port-channel load-balance src-dst-ip

port-channel load-balance src-mac

port-channel load-balance src-dest-mac

port-channel load-balance src-ip

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which two statements about CDP are true? (Choose two.)

It can be disabled only at the interface level.

Devices with Cisco Discovery Protocol configured send advertisement messages to a multicast address on a
periodic basis.

It is disabled when switches have mismatched native VLANs.

Devices with Cisco Discovery Protocol configured send advertisement messages to a broadcast address on a
periodic basis.
E. VTP relies on Cisco Discovery Protocol to carry VTP domain information.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
A is FALSE - CDP can be disabled at global and interface level

B is TRUE - Multicast MAC address for CDP is 01:00:0c:cc:cc:cc

C is FALSE - CDP operation is not disabled if ports have mismatched VLANs. With CDPv2 there is a Native
VLAN TLV used to advertised the Native VLAN.

Switches are thus able to report any mismatch, but this condition doesn’t disable CDP.

D is FALSE - See answer A above.

E is TRUE - Read the answer carefully: “VTP relies on Cisco Discovery Protocol to carry VTP
domain information”

It’s not saying that CDP carries actual VTP protocol (advertisements and and updates). Its saying that
CDP carries VTP domain information. This is true.
CDPv2 has a VTP Management Domain TLV to advertise the configured VTP Domain name to
neighbouring devices.

Its easy to misinterpret this answer as meaning VTP protocol is dependent on CDP protocol, which
of course it isn’t. But it is true to say that VTP relies on Cisco Discovery Protocol to carry VTP
domain information. It’s true.

QUESTION 21

Which two command sequences must you enter on a pair of switches so that they negotiate an
EtherChannel using the Cisco proprietary port-aggregation protocol? (Choose two.)

channel-protocol lacp channel-group 1 mode on

channel-protocol pagp channel-group 1 mode auto

channel-protocol lacp channel-group 1 mode active

channel-protocol pagp channel-group 1 mode desirable

channel-protocol pagp channel-group 1 mode on


Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which two ways can you use to disable Cisco Discovery Protocol? (Choose two.)

Enter the no cdp enable command to disable it on a device.

Enter the no cdp run command to disable it in the global configuration.

Enter the no cdp run command to disable it on an individual interface.

Enter the cdp disable command to disable it on an individual interface.

Enter the no cdp enable command to disable it on an individual interface.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which two statements about errdisable recovery are true? (Choose two.)

You can use the show errdisable recovery command to view the reason a port was error-disabled.

Errdisable detection is enabled by default on ports with port security enabled.

You can use the show errdisable detect command to view the reason a port was error-disabled.

Errdisabled autorecovery is enabled by default.

Errdisabled detection is disabled by default on ports with port security enabled.

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 24
What are the prerequisite for HSRP interface to come up? (Choose two.)

VIP on same subnet.

Physical IP address must be set.

Virtual MAC address need to be configured.

VIP on a separate subnet.

There are no prerequisites required to configure HSRP.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25

Which two prerequisites are required for an HSRP interface to come up? (Choose two.) - CONCEPT
ONLY

The virtual IP address must be in the same subnet as the interface IP address.

Configure an physical IP address for the interface and enable that interface before HSRP becomes active.

It requires to configure more than one first-hop redundancy protocol on the same interface.

Configure HSRP version 2 to interoperate with HSRP version 1.

The virtual IP address is prohibited to be in the same subnet as the interface IP address under IPv4.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 26
A question based on MAC address table. (Choose two.)

Fa0/1, Fa0/2 cannot communicate in Layer 2 switch.

Fa0/1, Fa0/3 cannot communicate in Layer 2 switch.

Fa0/2, Fa0/3 can communicate Layer 2 switch.

Two MAC address aaa.aaa.aaa.aaa must be in same VLAN.

Two MAC address aaa.aaa.aaa.aaa must be in different VLAN.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
A question about HSRP that have these options.

R1 have x.x.x.x in routing table.

???

???

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Refer to the exhibit. Which two statements about the network environment are true? (Choose two.)

Interface fa0/1 and fa0/2 cannot communicate via Layer 2 switching.

Interface fa0/1 and fa0/3 cannot communicate via Layer 2 switching.

Interface fa0/2 and fa0/3 can communicate via Layer 2 switching.

The two aaaa.aaaa.aaaa MAC address entries must be from the same VLANs.

The two aaaa.aaaa.aaaa MAC address entries must be from different VLANs.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
A question with two VRRP routers and there is an IP reachability.

When R1 lose route to 10.x.x.x then R2 will take mastership because it will be decrement of 20 the
priority of R1 is 110 – minus 20 = 90 and the R2 is on default priority (100).

When R2 lose route to 10.x.x.x then R1 will take mastership because it will be increment of 20 the
priority of R2 is 120.
When both R1 and R2 lose route to 10.x.x.x then either R1 or R2 will take mastership because it will be
decrement of 10 the priority of R1 is 110.

When R2 lose route to 10.x.x.x then R1 will take mastership because it will be increment of 20 the
priority of R1 is 130 – minus 20 = 110 and the R1 is on default priority (90).

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
How can you set VLAN 99 on a trunk to become a native VLAN?

switchport trunk native vlan 99

switchport trunk vlan 99 native

switchport native vlan 99 trunk

switchport native trunk vlan 99

switchport vlan 99 native

switchport vlan native trunk 99

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Which type of packet does DHCP snooping continuously check in a production network?

(What kind of packets is DHCP snooping continuously check in a production network? -


contributed in Certprepare)

DHCP Snooping

DHCP Relay

DHCP Request
DHCP Acknowledge

DHCP Reply

DHCP Allow

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
If VLAN 99 is set to trunk, how can you set it to untagged from trunk VLAN 99?

(If VLAN 99 trunk is set, how to untagged trunk VLAN 99? - contributed in Certprepare)

switchport access vlan 99

switchport vlan 99 access

switchport vlan 99 allow access

switchport allow access vlan 99

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33

A question with the MAC address aaaa.aaaa.aaaa with a show mac-address output based on Layer 3.
(Choose two.)

(New question with the MAC aaaa.aaaa.aaaa. It shows a show mac-address output. - contributed in
Certprepare)
Fa0/1 and Fa0/3 can communicate without a Layer 3 switch.

Fa0/1 and Fa0/3 cannot communicate without a Layer 3 switch.

Device with MAC address of aaaa.aaaa.aaaa is connected to the same VLAN.

Device with MAC address of aaaa.aaaa.aaaa is connected to different VLAN.

Fa0/1 and Fa0/2 cannot communicate via Layer 3 switch.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
A question related to a MAC address output. (Choose two.)

(ANOTHER CONTRIBUTED VARIATION FROM CERTPREPARE)

Fa0/1 and Fa0/2 are in the same VLAN.

Fa0/1 and Fa0/2 are not in the same VLAN.


Fa0/1 and Fa0/3 can not communicate on the Layer 2 switch.

Fa0/3 and Fa0/2 can communicate on the Layer 2 switch.

Fa0/1 and Fa0/2 can not communicate on the Layer 2 switch.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35

EXHIBIT INCLUDED - R1 is the VRRP master virtual router, which statement is true about R1 and R2?

R2 becomes master if R1 reboots or track in R1 does not fail.

Communication between VRRP members is encrypted using MD5.

R2 does not have a route to 10.10.1.1/32 in routing table.

R1 has a route to 10.10.1.1/32 in routing table.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
A question related to constant checking of DHCP messages and filtering.

IGMP ???

IGMP Snooping

ARP Inspection

DHCP Snooping

DHCP Inspection

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

Which two statements are true about StackWise? (Choose two.)

It looks like one device.

It can use one IP address.

It can use multiple IP address.

It looks like a multiple device.

StackWise manages like a hybrid device.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which feature rate-limits DHCP traffic?

DHCP Snooping

DHCP Acknowledge

DHCP Request

DHCP Spoofing

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 39
Which two statements are true about StackWise? (Choose two.)

It groups multiple switch ports as a single EtherChannel.

It can use one IP address to communicate with n/w (network).

It monitors multiple switches from a central console.

It enables multiple switch ports to share a single master configuration.

It allows multiple switches to operate as a single switch.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-
switches/prod_white_paper09186a00801b096a.html

QUESTION 40
Which two conditions must be met to establish a Layer 2 EtherChannel? (Choose two.)

SPAN must be disabled on the ports.

LAN ports in the EtherChannel must be contiguous.

The trunking protocol must be the same for all links in the EtherChannel.

All ports in the EtherChannel must be on the same module.

All ports in the EtherChannel must operate in half duplex.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
Which command configures VLAN 99 as an untagged VLAN on a trunk?

A. switchport access vlan 99


switchport trunk pruning vlan except 99

switchport trunk allowed vlan 99

switchport trunk native vlan 99

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=7

QUESTION 42

Refer to the exhibit. Which two statements about the network environment of the device that generated
this output are true? (Choose two.)
The hello and hold timers are set to custom values.

If the local device fails to receive a hello from the active router for more than 5 seconds, it can
become the active router.

The virtual IP address of the HSRP group is 10.1.1.1.

If the router with a higher IP address and same HSRP priority as the active router becomes
available, that router becomes the new active router 5 seconds later.

The local device has higher priority setting that the active router.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43
Refer to the exhibit. Currently, R1 is the VRRP master virtual router. Which statement about the
VRRP configuration on R1 and R2 is true?
Communication between VRRP members is encrypted using MD5.

R1 has a route to 10.10.1.1/32 in its routing table.

R2 does not have a route to 10.10.1.11/32 in its routing table.

R2 becomes master if R1 reboots or track in R1 does not fail.


Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44

Which feature actively validates DHCP messages and drops invalid messages?

IGMP snooping

DHCP host tracking

CGMP binding

DHCP snooping

DHCP inspection

Dynamic ARP inspection

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
MCQs Dec 2017_Feb-March 2018 - Contribute

QUESTION 1
Which statement about GLBP is true?

Unused bandwidth is never utilized.

They communicate under TCP port 3222 for both source and destination.

They become active if any of the existing forwarding switches fail.

They become restricted if any of the existing forwarding switches fail.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
In which state does the standby virtual gateway take election?

learn

listen

init

reply

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which statement is true when one of its virtual gateway redundancy with an AVF has failed?

A. If an AVF has failed, one of the primary virtual forwarders in the listen state assumes responsibility for
the virtual MAC address.
If an AVF has failed, one of the secondary virtual forwarders in the listen state assumes responsibility for
the virtual MAC address.

If an AVF has failed, one of the secondary virtual forwarders in the listen state will also fail.

If an AVF has failed, one of the primary virtual forwarders in the listen state will also fail.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which three design types of capable Ethernet LANs does HSRP support? (Choose three.)

Multicaccess

Multicast

Broadcast

Unicast

Token Ring

FDDI

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which hot standby groups numbers are used in a HSRP token ring?

0, 1 and 2

3, 5, and 7

0 and 1

2 and 4
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6

Which component does the GLBP client cache stores for each host of a particular GLBP group?

IP address

MAC address

VLAN

Token ring

DCSP

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which command is required for root guard for Cisco device to place ID:2071948x?

(Where x is the last digit ID)

(config if)# spanning-tree guard root

(config)# spanning-tree guard root

(config-if)# spanning-tree root guard

(config)# spanning-tree root guard

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 8

What will extend a trust boundary (There is a switch interface configuration with separate voice
VLAN and data VLAN to, also showing endpoint (host), IP Phone, Access Switch, Distribution
Switch, Core Switch and Data Centre Aggregation switch)?

Multiple Layers PC

IP Phone

Access Switch

Distribution Switch

Core Switch

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

A Catalyst switch can detect an IP phone via CDP and can instruct the phone to extend a trust
boundary to its auxiliary data port. The voice traffic from the phone should be implicitly trusted
because the phone is both a Cisco device and a small switch that can be configured and controlled.

Reference: CCNP BCMSN Exam Certification Guide: CCNP Self-study

QUESTION 9
Which two TLVs are mandatory? (Choose two.)

Chassis ID

Port ID

???

???

???

???

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 10
Which of the following mandatory TLVs are valid for basic management? (Choose five.) - CONCEPT
ONLY

Port description TLV

System name TLV

System description

System capabilities TLV

Management address TLV

Isolated address TLV

Source and destination capabilities TLV

Correct Answer: ABCDE


Section: (none)
Explanation

Explanation/Reference:
The switch supports these basic management TLVs. These are mandatory LLDP TLVs.

Port description TLV


System name TLV
System description
System capabilities TLV
Management address TLV

Source: https://www.cisco.com/c/en/us/td/docs/switches/metro/me3400/software/release/12-
2_58_se/configuration/guide/ME3400_scg/swlldp.pdf (page 24-2)

QUESTION 11
Which two of the following organizationally specific LLDP TLVs are also advertised to support
LLDP-MED? (Choose two.) - CONCEPT ONLY

Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs)

MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs)

IP Address TLV (IEEE 802.9 organizationally specific TLVs)


DSCP TLV (IEEE 802.3 organizationally specific TLVs)

Descriptive TLV (IEEE 802.5 organizationally specific TLVs)

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
These organizationally specific LLDP TLVs are also advertised to support LLDP-MED.

Port VLAN ID TLV ((IEEE 802.1 organizationally specific TLVs)


MAC/PHY configuration/status TLV(IEEE 802.3 organizationally specific TLVs)

Source: https://www.cisco.com/c/en/us/td/docs/switches/metro/me3400/software/release/12-
2_58_se/configuration/guide/ME3400_scg/swlldp.pdf (page 24-2)

QUESTION 12
A question about LLDP TLVs with two choices. (Choose two.)

System description

System name

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
The switch supports these basic management TLVs. These are mandatory LLDP TLVs.

Port description TLV


System name TLV
System description
System capabilities TLV
Management address TLV
Source: https://www.cisco.com/c/en/us/td/docs/switches/metro/me3400/software/release/12-
2_58_se/configuration/guide/ME3400_scg/swlldp.pdf (page 24-2)

QUESTION 13
Which two mandatory TLV types does LLDP advertise? (Choose two.)

Native VLAN TLV

Platform TLV

Network TLV

Hostname TLV

Port ID TLV

Chassis ID TLV

Correct Answer: EF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Which four mandatory TLVs are valid? (Choose four.) - CONCEPT ONLY

End of LLDPDU

Chassis ID

Port ID

Time To Live

VLAN ID

System name ID

Description ID

Correct Answer: ABCD


Section: (none)
Explanation
Explanation/Reference:

QUESTION 15
Which six optional TLVs are valid? (Choose six.) - CONCEPT ONLY

Port description TLV

System name TLV

System description TLV

System capabilities TLV

Management address TLV

Specific TLVs

Source ID TLV

Native hostname TLV

Correct Answer: ABCDEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
When you enable MST on the switch, what happens?

Enables RSTP and use BPDU type 2, maximum 16 instances to be used.

Enables RSTP and use BPDU type 4, maximum 16 instances to be used.

Disables RSTP and use BPDU type 2, maximum 16 instances to be used.

Disables RSTP and use BPDU type 4, maximum 16 instances to be used.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 17

Which two methods are used to configure a trusted option 82? (Choose two.) - CONCEPT ONLY

(config)# ip dhcp snooping information option (config)# do show ip dhcp snooping | include 82
(config)# ip dhcp snooping information option allow-untrusted

(config-if)# ip dhcp snooping information option allow-untrusted

(config)# ip dhcp untrusted-allow information

(config-if)# ip dhcp snooping trust-allow information

(config)# dhcp allow-untrusted option information

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which of the following commands to configure a DHCP trust is valid? - CONCEPT ONLY

(config)# interface FastEthernet 0/1 (config-if)# ip dhcp snooping trust


(config-if)# do show ip dhcp snooping | begin pps

(config)# interface FastEthernet 0/1 (config-if) ip dhcp snooping granted (config-if)# do show ip
dhcp snooping | enable pps

(config)# interface FastEthernet 0/1 (config-if) ip dhcp snooping allowed-enable (config-if)# do


show ip dhcp snooping | start pps

(config)# interface FastEthernet 0/1 (config-if)# ip dhcp snooping enable (config-if)# ip dhcp show snoop |
begin pps

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
What will happen if R1 or R2 reboot which will take the priority.

R1 will become active when reboot.

R2 will become active when reboot.

Both R1 and R2 will still become active and does not require a reboot.

It is not possible for either R1 or R2 to take the priority when both rebooted.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20

If switch SW1 is connected in a mesh with four other switches and all switches retain the default
configuration, which command do you enter on SW1 interface to make it the root bridge for all
VLANs?

SW1(config)#spanning-tree port-priority 129

SW1(config)#spanning-tree port-priority 127

SW1(config-if)#spanning-tree port-priority 129

SW1(config-if)#spanning-tree port-priority 127

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which two statements about VRRP are true? (Choose two.)

It is assigned multicast address 224.0.0.8.

The TTL for VRRP packets must be 255.

It is assigned multicast address 224.0.0.9.

Its IP address number is 115.

Three versions of the VRRP protocol have been defined.

It supports both MD5 and SHA1 authentication.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22

Which two attributes must match across the member ports, when a Layer 2 EtherChannel is configured?
(Choose two.)

switchport mode

spanning-tree cost

spanning-tree priority

VLAN membership

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which tool can error-disable an interface if the storm control threshold is exceeded?

storm control action shutdown

storm control action default


storm control enable

storm control action trap

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24

A switch has a pair of fiber and it has been damaged. Which two statements is true about the configuration
below? (Choose two.)

It would prevent loops.

It would be in shutdown mode until fiber is replaced.

It would be up for 15 minutes after fiber is fixed.

The port would try to actively repair the damaged fiber after 15 seconds.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
Which statement is true about SPAN on a switch?

It would double the source traffic.

On every source port configured, there would be another port that can not be used normally.

Hence source traffic.... (???)...


D. ???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
What would happen if a switch gets a packet with Option 82 with the IP address of 192.168.1.254?

Drop it

Forward it

Stop the Option 82 and replace the source MAC address, and forward it (with its own source MAC address).

Stop the Option 82 and replace the source IP address to the switch management IP address and forward it.

Stop the Option 82 and forward it.

Stop the Option 82 and make an proxy ARP request for the IP address 192.168.1.254.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which two statements about PortFast is true? (Choose two.)

It will skip all spanning-tree states.

Only when the port is active when it moves to the forwarding state.

It is mostly used when connecting to workstations and servers.

It skips the learning state.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Which two statements about HSRP is true? (Choose two.)

It required all the groups to have the same routing protocols.

It must have an IP address that is active.

It must have the same virtual MAC address for all groups.

It must have the same VIP address in all groups.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Which two statements about VLAN database is true? (Choose two.)

It supports VLANs 1-1001.

It supports extended VLAN.

Information about VLANs are stored in the configuration.

It can have different VLANs with the same VLAN ID, but must have the same name.

It can be configured in VTP transparent, but must be in the VLAN database mode.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Which two statements about err-disable is true? (Choose two.)

When the port goes to err-disabled, the link of the switch light goes to solid orange.

It is on auto when port-security is on.

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Which two statements about stack is true? (Choose two.)

It is using one IP address to manage all switches.

It shares one IP address in all switches, but they all work independently.

???

It uses proprietary modules.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
What would happen if IEEE was VLAN 99 as native? (Choose two.)

VLAN 1 tagged as 99

VLAN 1 untagged as 99

VLAN 99 tagged as 1

VLAN 99 untagged as 1
Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which command is used to configure DHCP snooping for Option 82?

dhcp snooping trust

dhcp snooping information option untrust

ip dhcp snooping option replace

ip dhcp snooping information option allow-untrusted

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34

Which three commands are valid to configure DHCP snooping for Option 82? (Choose three.) - CONCEPT
ONLY

On the interface configuration mode; (config-if)# ip dhcp snooping trust

On the global configuration mode;


(config)# ip dhcp snooping information option allow-untrusted

On the interface configuration mode;


(config-if)# ip dhcp snooping information option allow-untrusted

On the interface configuration mode; (config-if)# ip dhcp snooping granted

On the global configuration mode;


(config)# ip dhcp snooping information option enable-untrusted
On the interface configuration mode;
(config-if)# ip dhcp snooping information option enable-untrusted

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 35

Which database is used to determine the validity of an ARP packet based on a valid IP-to-MAC address
binding?

Port Security

IP Source Guard

DHCP Snooping

Dynamic ARP Inspection

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
Which two advantages of LLDP are used over CDP? (Choose two.)

(2 advantages of LLDP over CDP)

It supports topology change notification.

It supports ATM.

It supports checksum.

It supports vendor-agnostic.

It supports FrameRelay
Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Which statement about RSPAN session is true?

Only the source switch in a session must support RSPAN.

The same RSPAN VLAN is used for a RSPAN session on all switches.

At least one access port must be configured in the RSPAN VLAN.

RSPAN support by default monitors at Layer 2.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38

Which two VLAN ranges can you add, modify or delete on a switch? (Choose two.)

VLANs 1-1001

VLANs 1005-4094

VLANs 1006-4094

VLANs 2-1001

VLANs 2-4094

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 39
Which two statements in relation to RSPAN are true? (Choose two.)

(Which of the 2 below answers are related to RSPAN.)

RSPAN port will not learn MAC address.

RSPAN should be a trunk.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
Where does the VLAN information get saved to?

The information is saved to the vlan.dat file.

The information is saved to the running configuration file.

The information is saved to the vlan.txt file.

The information is saved to the vlan.conf file.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

Which two statements are true in regards to normal and extended range VLANs? (Choose two.)
Normal range VLANs from 1-1005 are stored in vlan.dat.

Extended range VLANs from 1006-4096 are stored in the startup configuration.

Normal range VLANs from 1-1005 are stored in the startup configuration.

Extended range VLANs from 1006-4096 are stored in vlan.dat.

Both normal and extended VLANs are stored in vlan.dat file.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42

Which normal VLAN range are valid and is stored in the vlan.dat configuration file?

VLANs 1-1005

VLANs 1005-2030

VLANs 2094-4094

VLANs 4094-8030

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43

Which extended VLAN range are valid and is stored in the startup configuration?

VLANs 1006-4096

VLANs 2006-6096

VLANs 1-1005

VLANs 1005-2060
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Refer to the exhibit. Which two statements abiout the network environment of the device that
generated this output are true? (Choose two.)

The local device has a higher priority setting than the active router.

The virtual IP address if the HSRP group is 10.1.1.1.

If a router with a higher IP address and same HSRP priority as the active router becomes available,
that router becomes the new active router 5 seconds later.

If the local device fails to receive a hello from the active router for more than 5 seconds, it can
become the active router.

The hello and hold timers are set to custom values.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45

Which type of MAC address can be dropped by a switch that is configured for MAC address filtering?

unicast

router

multicast

CPU-destined

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Which feature prevents from sending BPDUs on a portfast enabled port?

BPDU guard

PortFast

root guard

BPDU filtering

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47

Which two StackWise configuration setting types are applied at the system level? (Choose two.)
port-security settings

VLAN settings

speed/duplex settings

SNMP settings

802.1k settings

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
Which two restrictions of the port security feature are true? (Choose two.)

It is not supported on destination SPAN ports.

It is not supported on EtherChannel port-channel interfaces.

Static port MAC address assignments are not supported.

A single device can learn a maximum of three stick MAC addresses.

It is not supported on PVLAN ports.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49

Which feature do you implement so that a physical port enter the loop inconsistent state if it fails to receive
BPDUs?

loop guard

loop disable

root guard
flex links

BPDU ignore

loop block

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Which feature places a port in an err-disabled state when it receives an unanticipated BPDU?

loop guard

root guard

BPDU guard

BPDU filtering

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
On which PVLAN type can host ports communicate with promiscuous ports?

primary

community

promiscuous

isolated

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

Which statement about the configuration of a trunk port as the source of a SPAN session is true?

Only VLANs that are configured individually as SPAN sources are monitored.

All VLANs in the trunk are monitored.

The trunk is errdisabled automatically.

All VLANs in the trunk are monitored, provided the SPAN destination port is a trunk.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which virtual MAC address does HSRP group 37 use with default configuration?

C0.00:00:255:00:00

00:00:0c:07:ac:25

C0:00:00:37:00:00

00:00:00c:07:ac:37

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54

Which configuration do you apply to a device to place interface GigabitEthernet0/0 info VRRP group 10?
interface GigabitEthernet0/0
ip address 172.16.13.2 265 255.255.0 standby 10 ip 172.16.13.254 255.255.255.0 standby 10 priority
120

standby 10 preempt

interface GigabitEthernet0/0
description to Executive Offices A 08-38338 ip address 172.16.13.2 265.255.255.0 vrrp 10 ip
172.16.13.254 255.255.255.0 vrrp 10 active

interface GigabitEthernet0/0
description to Executive Offices A 08-38338 ip address 172.16.13.2 255.255.250.0
vrrp group 10 ip 172.16.13.254 255.256.255.0 vrrp group 10 priority 120

interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0 vrrp 10 ip 172.16.13.254
vrrp 10 priority 120 vrrp 10 preempt

interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0 vrrp 10 ip 172.16.13.254 256.255.255.0 vrrp 10 priority 120

vrrp 10 preempt

interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0 standby 10 ip 172.16.13.254

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
Which two statements about the monitored traffic in a SPAN session are true? (Choose two.)

You cannot configure two separate SPAN or RSPAN source sessions with separate or
overlapping sets of SPAN source ports and VLANs

By default, all monitored packets are captured without the IEEE 802.1Q tag

Egress SPAN monitors packets sent by the source interface before any QoS modifcations

Sources can be ports or VLANs or any combination in the same session

By default, all monitored packets include the IEEE 802.1Q tag that they had on the source port

Ingress SPAN monitors packets received by the source interface before any QoS modifications

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:
Check this Cisco SPAN/RSPAN configuration guide. Most of the answers are found here:
- https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/53SG/configuration/config/span.html

A is FALSE. You can configure separate SPAN/RSPAN source sessions with separate or
overlapping source ports. You cannot configure separate sessions to use the same destination
output port.

B is TRUE - “Receive SPAN - The goal of receive (or ingress) SPAN is to monitor as much as
possible all the packets received by the source interface or VLAN before any modification or
processing is performed by the switch… Packets that are modified because of routing or
quality of service (QoS) — for example, modified DSCP – are copied before modification.”

C is FALSE - “Transmit SPAN - The goal of transmit (or egress) SPAN is to monitor as much as possible
all the packets sent by the source interface after all modification and processing is performed by the
switch….The copy is provided after the packet is modified. Packets that are modified because of routing

for example, with modified time-to-live (TTL), MAC-address, or QoS values—are duplicated
(with the modifications) at the destination port.”

D is FALSE - By default all monitored packets DO NOT include the dot1Q tag that they had on
the source port “The default configuration for local SPAN session ports is to send all packets
untagged”

E is TRUE - The ‘encapsulation’ options on the ‘monitor session destination’ command must be specified
to include the tagging. Its not included by default.

F is FALSE - Source SPAN/RSPAN sessions can monitor ports and VLAN’s, but a mixture of ports
and VLANs cannot be combined in the same session.

QUESTION 56
Which statement about the default behavior of a Cisco switch MAC address table is true?
MAC addresses are not learned on extended VLANs.

MAC addresses are aged out of the MAC table after 600 seconds.

MAC addresses are associated with a VLAN.

MAC address filtering is enabled on trunk ports.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

When a Layer 2 EtherChannel is configured, which statement about interaction with the Spanning Tree
Protocol is true?

Spanning Tree uses only the member ports for forwarding.

Spanning Tree uses the port channel for forwarding.

Spanning Tree uses the port channel and member ports for forwarding.

Spanning Tree does not use port channels in loop prevention.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
Which two statements about HSRP, GLBP, and VRRP are true? (Choose two.)

HSRP is the preferred protocol to be used in multivendor environments.

VRRP has one master router, one standby router, and many listening routers.

GLBP allows for a maximum of four MAC addresses per group.

HSRP supports up to 255 groups in the same switch or router.

VRRP is a Cisco proprietary protocol.


Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59

Which command can be used to block a frame with an unknown destination MAC address from being
forwarded out of an interface?

switchport protected

It is not forwarded if the destination MAC address is unknown.

switchport port-fast

switchport block unicast

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
For which reason does an administrator disable MAC address learning within a VLAN?

to configure a VLAN as an SVI

to free up space in the MAC address table

to implement port security

to reduce flooding in the network

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 61
Which two statements about manually-configured LACP EtherChannels are true? (Choose
two.)

LACP negotiation must be disabled on both devices in the EtherChannel.

They require Cisco Discovery Protocol.

Each physical port in the EtherChannel must have the same speed and duplex settings.

LACP negotiation must be disabled on one device in the EtherChannel.

They use an MD5 hash for equal load balancing.

If the physical port configurations on the two devices are different, the ports are placed into the
errdisabled state.

Correct Answer: CF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which two statements correctly describe the benefits of GLBP? (Choose two.)

It can load-share LAN traffic across up to four AVFs in a GLBP group.

It uses dual active AVGs for redundancy.

LAN traffic can be distributed to up to six routers in a GLBP group.

It supports up to 128 virtual routers per physical interface.

It can automatically adjust group weighting when an interface goes down.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63
Refer to the exhibit. Which two statements about the network environment are true? (Choose
two.)
The two aaaa.aaaa.aaaa MAC address entries must be from the same VLAN.

Interfaces Fa0/1 and Fa0/3 cannot communicate via Layer 2 switching.

Interfaces Fa0/1 and Fa0/2 cannot communicate via Layer 2 switching.

The two aaaa.aaaa.aaaa MAC address entries must be from different VLANs.

Interfaces Fa0/2 and Fa0/3 can communicate via Layer 2 switching.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64

When a Layer 2 trunking EtherChannel is configured, which two attributes must match across the
member ports? (Choose two.)

interface description

spanning-tree cost

spanning-tree priority

allowed VLANs

trunking mode
Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65
Which method is used to prevent from ARP poisoning?

(The question is about ARP poisoning, and the method to prevent it.)

Dynamic ARP Inspection

DHCP Snooping

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
Which two statements about native VLANs are true? (Choose two.)

VLAN 1 and VLAN 1001 are native VLANs by default.

The native VLAN is untagged over trunks.

The native VLAN can be changed on a per port basis.

Only one VLAN can be the native VLAN on a device.

Cisco Discovery Protocol versions 1 and 2 can carry native VLAN information.

Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:

QUESTION 67
Refer to the exhibit.

Which effect of this configuration is true?

The switch port continues to negotiate an EtherChannel even when there are configuration
discrepancies between the two ports.

Spanning tree blocks EtherChannel formation on the device.

The switch port error disables when a port attempts to form an EtherChannel with a port that has a
different configuration.

Spanning tree is disabled if the switch port establishes an EtherChannel.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68

Which keyword can be applied to the spanning-tree priority command that allows the IT department
to adjust the timers based on the number of switches between any two end stations?

root primary

priority

cost

diameter

hello-time

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 69
Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?

SW1(config-vlan)# ip arp inspection vlan 15

SW1(config-vlan)# ip arp inspection trust

SW1(config-if)# ip arp-inspection trust

SW1(config)# ip arp inspection vlan 15

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?

(If this question asks for two answers.)

SW1(config-vlan)# ip arp inspection vlan 15

SW1(config-vlan)# ip arp inspection trust

SW1(config-if)# ip arp-inspection trust

SW1(config)# ip arp inspection vlan 15

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
Refer page 8
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-
2_20_se/configuration/guide/3560scg/swdynarp.pdf

This example shows how to configure dynamic ARP inspection on Switch A in VLAN 1. You would
perform a similar procedure on Switch B:
Switch(config)# ip arp inspection vlan 1
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# ip arp inspection trust

QUESTION 71
Which three restrictions of port security features are true? (Choose three.)

It is not supported on EtherChannel port-channel interfaces.

Static MAC address assignments are not supported.

It is not supported on destination SPAN ports.

It is not supported on PVLAN ports.

A single device supports up to two sticky MAC addresses.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:
Port Security Guidelines and Restrictions

Follow these guidelines when configuring port security:


A secure port cannot be a trunk port.

A secure port cannot be a destination port for Switch Port Analyzer (SPAN). <-Answer A secure port
cannot belong to an EtherChannel port-channel interface. <-Answer

A secure port and static MAC address configuration are mutually exclusive. <-Answer

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-
2/25ew/configuration/guide/conf/port_sec.html

QUESTION 72
Which type of attack does dynamic ARP mitigates?

Man-in-the-middle

DDoS attack

Virus

???

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
Which two types of protocols use VLAN 1 as the default? (Choose two.)

CDP

STP

VTP

???

???

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74

For which reason would you configure RSPAN instead of SPAN on your network?

RSPAN provides more complete monitoring of the traffic on a single switch.

Only RSPAN devices can monitor traffic on other device.

Only RSPAN can log traffic on a VLAN that spans multiple switches.

Only RSPAN supports STP on multiple switches across a campus.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 75
Which benefit of Stackwise is true?

It allows multiple switches to operate independently while sharing a single management


address.

It enables a Layer 2 switch to be converted to a Layer 3 switch when additional switches are added to the
stack.

It allows multiple switches to be managed by a single management address.

It supports single-chassis EtherChannel mode option.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76
Refer to the exhibit.

One pair of fibre that is connected to Gi0/1 has been damaged. What is likely to happen?

The interface is shut down until the fiber pair is replaced.

The interface is prevented from causing spanning-tree loops.

After the fiber pair is replaced, the interface recovers within 15 minutes.

The interfaces actively tries to fix the damaged fiber link.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 77
Which two statements about error-disabled ports are true? (Choose two.)

When a port is error-disabled, it may continue to pass management traffic.

When a port is error-disabled, all traffic on the port stops.

By default, error-disabled ports automatically recover once the issue is resolved.

When a port is error-disabled, the port LED changes to solid orange.

They can be recovered only by resetting the interface.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78
Which statement describes the result of configuring SPAN on a Cisco device?

SPAN doubles traffic internally.

SPAN halves the capacity of the source port.

SPAN blocks for normal use on one additional port for each configured source port.

If not carefully planned, SPAN can lead to loops between source and destination ports.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79
Which two statements about PortFast are true? (Choose two.)

It forces the port to skip all spanning-tree states.

The port is error-disabled if it attempts to move into the listening or learning states.
It allows the port to skip the learning state only.

The port moves immediately to the forwarding state when a device is connected.

It is most appropriate for ports that provide connectivity to individual workstations or servers.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80

Which configuration do you apply to an interface so that a host can be placed into VLAN 593?

interface GigabitEthernet0/0.593 encapsulation dot1q 593 switchport access vlan 593

interface GigabitEthernet0/0 switchport trunk encapsulation dot1q switchport trunk native vlan 593
switchport access vlan 593

interface GigabitEthernet0/0 switchport mode trunk switchport trunk allowed vlan 593

interface GigabitEthernet0/0 switchport mode access switchport access vlan 593 switchport host

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
MCQs April-May 2018 - Contribute

QUESTION 1

A question about voice VLAN with the possibility of two answers. (Choose two.)

(Question about the voice VLAN.)

The voice VLAN must be on a different VLAN database.

The voice VLAN must be configured on a trusted port.

The voice VLAN must be configured on an untrusted port.

The voice VLAN must be on the same VLAN database.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
A question about the advantage of of VSS.

It only has one single point of management and IP address.

It only has one multiple point of management and IP address.

It only has one single point of management and MAC address.

It only has every single protocol as the point of management to be used.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3

Which four multicast addresses for HSRP, GLBP and VRRP are valid? (Choose four.)
HSRP version 1 uses the multicast IP address of 224.0.0.2.

HSRP version 2 uses the multicast IP address of 224.0.0.102.

GLBP uses the multicast IP address of 224.0.0.102.

VRRP uses the multicast IP address of 224.0.0.18 with IP protocol 112.

HSRP versions 1 and 2 both use the multicast IP address of 224.0.0.102.

GLBP uses the multicast IP address using the loopback IP address of 127.0.0.1.

Correct Answer: ABCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 4

EXHIBIT INCLUDED - A question about UDLD. It shows a picture of 7 times and UDLD is set to aggressive
mode. The port is set to shutdown error-disabled.

The port is set to shutdown because UDLD is set to aggressive mode.

The port is set to shutdown because STP...

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which three of these VLANs are a valid extended VLAN? (Choose three.)

4095

4096

4094

3000
1006

1005

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
Which two commands are used to configure a trusted DHCP Option 82 for untrusted-host?
(Choose two.)

Use the ip dhcp snooping information command to enable data...

Use the ip dhcp snooping information option allow-untrusted command to enable DHCP Option 82.

Use the ip dhcp snooping information command to enable DHCP Option 82.

???

???

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which three new features of VTPv3 are true? (Choose three.)

It offers better administrative control over which device is allowed to update other devices view of VLAN
topology.

Unintended and disruptive changes are reduced and availability has increased.

The functionality of the VLAN environment has been expanded.

It supports up to VLAN range of 2094.

The functionality of the VLAN environment has reduced for improvement.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:
Key Benefits of VTP Version 3
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to
update other devices' view of the VLAN topology. The chance of unintended and disruptive
changes is significantly reduced, and availability is increased. The reduced risk of unintended
changes will ease the change process and help speed deployment.

Functionality for the VLAN environment has been significantly expanded.

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-
switches/solution_guide_c78_508010.html

QUESTION 8
Which two beneficial features are used for VTPv3? (Choose two.)

It supports the whole IEEE 802.1Q VLAN range up to 4095.

It can transfer information based on PVLAN structure.

It supports the whole IEEE 802.1Q VLAN range up to 1005.

It can transfer information based on CDP structure.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
Functionality for the VLAN environment has been significantly expanded. Two enhancements
are most beneficial for today's networks:
In addition to supporting the earlier ISL VLAN range from 1 to 1001, the new version supports
the whole IEEE 802.1Q VLAN range up to 4095.

In addition to supporting the concept of normal VLANs, VTP version 3 can transfer information
regarding Private VLAN (PVLAN) structures.

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-
switches/solution_guide_c78_508010.html

QUESTION 9
Which major feature is supported using VTPv3?

It supports databases other than VLAN.

It supports databases other than FDDI.


It supports databases other than DSCP.

It supports databases other than DLCI.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
The third area of major improvement is support for databases other than VLAN (for example,
MST).

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-
switches/solution_guide_c78_508010.html

QUESTION 10
Which three feature advantages are supported in VSS? (Choose three.)

It supports single point of management, IP address and routing instance for virtual switches.

It supports Multichassis EtherChannel.

It supports flexible deployment options.

It support Singlechassis EtherChannel.

It supports multiple point of management, MAC address and routing instance for virtual
switches.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:
VSS increases operational efficiency by simplifying the network, reducing switch management
overhead by at least 50 percent.

• Single point of management, IP address, and routing instance for the Cisco Catalyst 6500
virtual switch
– Single configuration file and node to manage. Removes the need to configure redundant
switches twice with identical policies.
– Only one gateway IP address is required per VLAN, instead of the three IP addresses per
VLAN used today.
– Removes the need for Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol
(VRRP), and Gateway Load Balancing Protocol (GLBP)

– CiscoWorks LAN Management System (LMS) 3.0 can be used to centrally manage a Cisco
Catalyst 6500 virtual switch as a single entity.

Multichassis EtherChannel® (MEC) is a Layer 2 multipathing technology that creates simplified


loop-free topologies, eliminating the dependency on Spanning Tree Protocol, which can still
be activated to protect strictly against any user misconfiguration.
Flexible deployment options. The underlying physical switches do not have to be colocated.
The two physical switches are connected with standard 10 Gigabit Ethernet interfaces and as
such can be located any distance based on the distance limitation of the chosen 10 Gigabit
Ethernet optics. For example, with X2-10GB-ER 10 Gigabit Ethernet optics, the switches can be
located up to 40 km apart.

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-
switching-system-1440/prod_qas0900aecd806ed74b.html

QUESTION 11
Which statement about SPAN are true?

It is an industry-standard protocol for mirroring traffic.

SPAN destinations participate in spanning-tree instances.

It uses a specific VLAN to transfer mirrored traffic.

It mirrors traffic from a source port to a destination port on the same switch only.

SPAN destinations also can be SPAN sources.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Which two tasks must you perform on a device to ensure that an EtherChannel operates at
Layer 3? (Choose two.)

Configure the channel-group 10 mode on command on the port channel.

Configure EtherChannel directly on the interface.

Configure the switchport mode access command on the device.

Configure the no switchport command on the physical interface(s).

Configure the switchport mode trunk command on the device.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 13

Refer to the exhibit. Which two statements about the spanning-tree operation of this switch are true?
(Choose two.)

The switch is operating in the default Cisco spanning-tree mode.

The spanning-tree operation mode for this switch is PVST+.

The spanning-tree operation mode for this switch is PVST.

The spanning-tree mode stp ieee command was entered on this switch.

The spanning-tree operating mode for this switch is IEEE.


Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Which statement about configuring an RSPAN session is true?

Only the source switch in a session must support RSPAN.

The same RSPAN VLAN is used for a RSPAN session on all the switches.

RSPAN supports by default the monitoring of Layer 2 switch protocols.

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
A question about HSRP with two answers. (Choose two.)

HSRP uses a shared VIP among HSRP group.

HSRP uses a single address among HSRP group member.

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
QUESTION 16

Which two statements about LLDP frames are true? (Choose two.)

LLDP frame sends to multicast address.

LLDP frame has its own CRC.

LLDP frame contains unicast address within its fields.

LLDP frame consists of sequence of TLVs.

???

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17

Which command do you use to configure EtherChannel guard feature?

(How you configure etherchannel guard feature?)

SW(config)# spanning-tree etherchannel guard misconfig

SW(config)# portchannel etherchannel guard misconfig

SW(config-if)# portchannel etherchannel guard misconfig

SW(config-if)# spanning-tree etherchannel guard misconfig

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
A question about root path election.

A. interface bandwidth
load

reliability

interface usage

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
EXHIBIT INCLUDED - A question about UDLD port disable.

When a link is repaired, the admistrator must enter udld reset command to recover disabled
interfaces.

When a link is repaired, the administrator must enter err-disable recovery cause udld command to recover
disabled interfaces.

UDLD puts the port in STP inconsistent port mode.

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
In which place does all VLANs get stored?

(In which place all VLAN are stored?)

NVRAM: vlan.xml

FLASH: vlan.xml

NVRAM: vlan.txt

FLASH: vlan.txt

NVRAM: vlan.dat
F. FLASH: vlan.dat

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21

Which two commands or combination of commands make native VLAN 99 tagged? (Choose two.)

vlan dot1q tag native

vlan dot1q tag native vlan 99

interface fa0/1
switchport trunk native vlan 99

encapsulation dot1q tag native vlan 99

encapsulation dot1q 99 native

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
To make VLAN 99 as native
(config)# interface fa0/1
(config-if) #switchport trunk native vlan 99

To make VLAN 99 tagged


(config)# vlan dot1q tag native

QUESTION 22
Which two circumstances can cause a port to errdisable? (Choose two.)

It is connected to a host with an NIC that is unable to recognize.

The switch incurred a port security violation.

It detected a collision.
It learned a new MAC address.

It detected a peer with a matching duplex.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which two commands enable loop guard on a Cisco switch? (Choose two.)

switch(config-if)# spanning-tree guard loop

switch(config-if)# spanning-tree loop guard default

switch(config)# spanning-tree loop guard default

switch(config-if)# spanning-tree loopguard

switch(config)# spanning-tree loopguard default

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which two statements about VTP modes are true? (Choose two.)

Private VLANs are supported on devices that run VTP version 2 in transparent mode.

Extended VLANs are supported only on devices that run VTP version 3 in server mode.

When VTP pruning is enabled on a VTP server, it is enabled for the entire management domain.

Extended VLANs are supported only on devices that run VTP version 3 in client mode.

Private VLANs are supported on devices that run any version of VTP in server mode.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
Which two statements about Cisco StackWise are true? (Choose two.)

It supports multiple switches in a stack.

It supports both homogeneous and mixed stacks.

The LAN base feature set is supported on mixed stacks.

Each stack identifier (or identifies) a stack master and a backup stack master.

Stacks running the LAN base feature set support Layer 3 features.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26

A single server in a company is connected via EtherChannel to a single upstream switch.


Which EtherChannel load balancing method on the switch makes optimal use of the redundant
links as traffic flows from the router to the server?

(Or scenario begins with "A switch of a company connected to single web hosting server via
EtherChannel"....)

source and destination MAC address

destination MAC address

source IP address

source MAC address

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 27
A question about an interface received packet with option 82 and 192.168.1.1 (IP might be
different). What would happen?

(There was a question like “an interface received packet with option 82 and 192.168.1.1 (IP might
be somewhat else.) What would happen.)

drop

forward

remove 82 and forward

treat as normal packet

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

Not sure about the answer to this question as the scenario is not completed. However, it looks
similar to a question found under "MCQs April 2017 - Contribute" section.

QUESTION 28

What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do
when it receives a packet with option 82?

QUESTION 28
A question about native VLAN set to 539.

(There was a question like if native VLAN is 539)

STP frames untagged on VLAN 539

STP frames tagged on VLAN 539

STP frames tagged on VLAN 1

STP frames untagged on VLAN 1

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 29
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy
using NSF? (Choose two.)

supported by RIPv2, OSPF, IS-IS, and EIGRP

uses the FIB table

supports IPv4 and IPv6 multicast

prevents route flapping

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

Layers 2–4 convergence time is enhanced in Cisco 4500 and 6500 series switches with redundant
route processors (RP) by using Nonstop Forwarding (NSF) with Stateful Switchover (SSO). When
using this, only one RP is active. The standby RP synchronizes its configuration and dynamic
state information (such as CEF, MAC, and FIB tables) with the active RP. When the active RP fails,
SSO enables the standby RP to take over immediately. NSF keeps the switch forwarding traffic
during the switchover, using the existing route and CEF tables. The goal of NSF with SSO is to
prevent routing adjacencies from resetting, which prevents a routing flap. The switchover to the
new RP must be completed before routing timers expire, or the router’s neighbors will tear down
their adjacency and routing will be disrupted.

QUESTION 30
What does the interface subcommand switchport voice vlan 222 indicate?

The port is configured for both data and voice traffic.

The port is fully dedicated to forwarding voice traffic.

The port operates as an FXS telephony port.

Voice traffic is directed to VLAN 222.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 31
Which two statements about StackWise are true? (Choose two.)

It groups multiple switch ports as a single EtherChannel.

It uses a single IP address to communicate with the network.

It monitors multiple switches from a central console.

It enables multiple switch ports to share a single master configuration.

It allows multiple switches to operate as a single switch.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

You have just created a new VLAN on your network. What is one step that you should include in your
VLAN-based implementation and verification plan?

Verify that different native VLANs exist between two switches for security purposes.

Verify that the VLAN was added on all switches with the use of the show vlan command.

Verify that the switch is configured to allow for trunking on the switch ports.

Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which of the below options is valid for EtherChannel load-balancing?
source MAC, destination IP

source MAC, destination MAC

source IP, source MAC

destination IP, MAC IP

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
Which state by default for port security is set in a switch?

enable

disable

on

off

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35

An exhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that
duplicate with virtual IP address).

misconfigure

PC's IP address

STP loop

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

Where does a subordinate switch in a stack store the information about VLANs?

vlan.dat

vlan.txt

flash.dat

flash.txt

nvram.dat

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

A question on HSRP, VRRP and GLBP. Which two options are correct? (Choose two.)

VRRP topology contains a master router, a standby router and multiple listeners.

The maximum number of virtual MAC addresses that GLBP allows per group is 4.

VRRP is a Cisco proprietary redundancy protocol.

Multivendor devices prefer to use HSRP protocol for redundancy.

Maximum group for HSRP is 255.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 38
A Layer 2 EtherChannel is formed. Where do you assign an IP address?

DHCP

physical interface

logical interface

lowest physical interface

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
There was exhibit for RSPAN with two sessions.

session one had destination port was missing

session two was properly configured

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40

There is a native VLAN mismatch after administrator change native VLAN to VLAN 999. What can be the
reason for the error message?

Native VLAN is not present

???
???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
Refer to the exhibit. Why is there a mismatch?

Port channel has not been configured properly.

Too few ports in Switch2.

Too many ports in Switch1.

Protocol mismatch

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 42
What happens to the sticky address after copy run start and reboot?

Sticky address are still in configuration.

Sticky address are not in configuration.

Sticky address can be unicast or multicast address.

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43

Two switches had two redundant links between them. An interface on the primary link has a
problem and the admin wants to move the traffic to the other link. What action must he
perform?

Change priority for secondary connection to a lower value than the primary.

Change STP mode to RSTP.

Configure a point-to-point connection for the secondary link.

Apply bpdufilter on the primary connection.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
A question with recognition of VLANs 3050 and 3060.
VTP version 3

VTP version 2

VTP version 1

VTP version 4

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45
A question about voice VLAN.

PortFast

Q-in-Q

STP

FastPort

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
What would happen if we delete VLAN that exit on switchport?

Port down and use native VLAN.

Port down and use default VLAN.

Port up and use native VLAN.

Port up and use default VLAN.

Port will remain shutdown/inactive until it is assigned a new VLAN.


Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which two statements about VTP is true? (Choose two.)

(What statements about VTP is true)

Switch send VTP advertisement from trunk ports with multicast address.

VTP advertisement contains VTP password.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
Which two statements about the VLAN database are true? (Choose two.)

VLAN information is stored in the running configuration.

It supports VLANs 1 to 1001.

If the switch is in VTP transparent mode, the VLAN can be configured if it is in VLAN database mode.

It supports extended VLANs.

VLAN IDs can be duplicated, but their names must be unique.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which statement about the default Switch Database Management template is true?

The default template disables routing and supports the maximum number of unicast MAC
addresses.

The default template gives balance to all functions.

The default template maximizes system resources for unicast routing.

The default template maximizes system resources for access control lists.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10? (Choose
two.)
DSW2(config)#spanning-tree vlan 10 priority 61440

DSW2(config)#spanning-tree vlan 10 priority 4066

DSW2(config)#spanning-tree vlan 20 priority 0

DSW2(config)#spanning-tree vlan 10 priority root

DSW2(config)#spanning-tree vlan 10 port-priority 0

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 51

Which two statements about static MAC addresses are true? (Choose two.)

They are configured without an aging time.

They have a default aging time of 300 seconds.

They supersede dynamically learned MAC address.

They can be configured on multiple interfaces in the same VLAN.

They have a default aging time of 60 seconds.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

Under which two circumstances does a stack master lose its role? (Choose two.)

When the stack master is reset.

When the priority value of a stack member is changed to a higher value.

When a switch with a higher priority is added to the stack.

When a stack member fails.

When switch stack resets.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which two statements are true of root guard? (Choose two.)

(Or ...true about root guard)


Configure root guard to automatically change a designated port to a root port.

Configure uplinkfast on an enabled root guard interface to protect the root status of a switch.

Configure root guard to ensure that root guard enabled ports become designated ports.

Configure root guard to prevent an unauthorized switch from becoming the root switch.

Issue a no shutdown command to recover a port from the root-inconsistent state.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which file lists all of the configured VLANs on a switch?

flash:vlan.dat

nvram:vlans.xml

flash:vlans.txt

nvram:vlan.txt

flash.config.txt

flash:vlan.xml

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
Which statement about the configuration of MST on an IOS switch is true?

When MST is enabled, RSTP is automatically enabled and MST will use BPDU version 4, maximum of 16
instances of MST can exist.

When MST is enabled, RSTP is automatically disabled and MST will use BPDU version 2, maximum of 16
instances of MST can exist.
When MST is enabled, RSTP is automatically enabled and MST will use BPDU version 2, maximum
of 16 instances of MST can exist.

When MST is enabled, RSTP is automatically disabled and MST will use BPDU version 4, maximum
of 16 instances of MST can exist.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
Which two statements about RPVST+ are true? (Choose two.)

It automatically enabled uplinkfast and backbonefast.

It elects one root switch per VLAN instance.

It supports two STP instances per VLAN.

It is incompatible with spanning tree portfast.

Backwards compatibility with 802.1d is not supported.

It requires approximately 50 seconds to complete reconvergence.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

Refer to the exhibit. You change a switch SDM template to maximize the number of supported
MAC addresses. You notice that the switch routing performance has been significantly
degraded. Which action do you take to correct the problem?
Configure the sdm prefer routing command.

Execute the clear ip route * command to reset the routing table.

Configure the sdm prefer default command.

Configure the sdm prefer vlan command.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58

Refer to the exhibit. Which two effects of this configuration are true? (Choose two.)
R1 becomes the active router.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

Hello messages are sent to multicast address 224.0.0.5.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

If R1 goes down, R2 becomes active and remains the active device when R1 comes back online.

R1 becomes the standby router.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
Refer to the output below. Which two effects of this configuration are true? (Choose two.)
The device adds an 8-byte VLAN tag to data on VLAN 2.

Data on VLAN 2 remains untagged.

Data on VLANs 4, 6, and 8 remains untagged.

The device adds a 4-byte VLAN tag to data on VLAN 2 only.

The switch adds a 4-byte VLAN tag to data on VLANs 4, 6 and 8.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60

Which command sequence do you enter to configure an RSPAN VLAN?

(or Which two commands sequences???)

vlan 4097 remote-span

vlan 4097 name RSPAN

vlan 51
remote-span

vlan 51 rspan-remote

name rspan

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61

Which security violation mode drops packets with unknown source addresses and increments the
violation counter?

shutdown

restrict

protect

drop

inhibit

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which two statements about VRRP are true? (Choose two.)

Preemption is not supported.

It support clear text authentication only.

It uses a shared VIP to support default gateway redundancy.

It requires each device in the group to participate in the same dynamic routing protocol.

It can use a single virtual address to provide default gateways redundancy.


Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63

Where should the Root Guard be implemented in the network topology that Cisco recommends? (Choose
two.)

All non-root ports of the Access Switches.

Downstream links from Distribution to Access Switches.

Access Switches to uplink ports to Distribution Switches.

On Layer 3 switches.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
Which security feature is used to prevent host spoofing attack?

IP source guard

uRPF

DHCP snooping

dynamic ARP inspection

storm control

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 65
Which statement is true about unknown UDLD?

(What does UDLD unknown mean?)

It is not an error and it will detect a neighbor after 5 seconds.

No issue with UDLD.

UDLD is not configured correctly.

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66

How can you enable Cisco Discovery Protocol on the interface?

(How can you enable on the interface Cisco Discovery Protocol?)

cdp run

cdp enable

cdp default

enable cdp

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
This is how you configure CDP on an individual interface.

Switch1(config)# interface fa0/1

Switch1(config-if)# cdp enable


QUESTION 67

How can you stop propagation of default VLAN through trunk interface? (something like this)

Use VTP pruning on the trunk interfaces.

Storm Control

Configure manual trunk pruning.

Configure transparent mode on both of the switches.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
How can you enable Cisco Discovery Protocol on the global interface?

cdp run

cdp enable

cdp on

cdp execute

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
This is how you configure CDP on a global interface.

Switch1(config)# cdp run

QUESTION 69

Which command on a switchport can cause LLDP to accept LLDP packets but not send them?

A. LLDP run
LLDP advertise

LLDP receive

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
A question about defining remote span.

remote-span

span-remote

remote-span enable

span-remote enable

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71
A question about VTPv3. (Choose two.)

It supports private VLANs.

It can be configured only on one VTP server.

It can be configured on multiple VTP servers.

It supports public VLANs.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72
A question about SDM templates and switch overloading.

sdm prefer default

sdm prefer routing

sdm prefer vlan

sdm prefer enable

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
In which location does the VLANs are located? (Choose two.)

Normal range VLANs are saved in vlan.dat

Extended VLAN range from 1006 to 4096 are saved in the startup configuration

Normal range VLANs are saved in nvram.dat

Extended VLAN range from 1006 to 4096 are saved in the running configuration

Both normal and extended VLAN ranges are saved in vlan.dat

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74
What command provides the output shown in the exhibit?

switch# show glbp

switch# show standby

switch# show glbp status

switch# show standby brief

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 75

What command would display a single line of information for each virtual gateway or virtual forwarder on
a switch?

switch# show glbp

switch# show glbp brief

switch# show standby

switch# show standby brief

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76
Which command enables GLBP on an interface?

glbp

glbp 10 ip 192.168.1.1

standby mode glbp

switchport mode glbp

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
What command disables 802.1x authentication on a port and permits traffic without
authentication?

dot1x port-control disable

dot1x port-control force-unauthorized


dot1x port-control auto

dot1x port-control force-authorized

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78
What command would be used to display detailed information regarding VRRP groups on the
switch?

switch# show vrrp

switch# show standby

switch# show vrrp detail

switch# show standby detail

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79

You have configured switches A and B in a network. The gigabitethernet0/1 interface of switch
A has HSRP enabled on it for VLAN 30. Switch A has a priority of 240 and switch B has a
priority of 200 for the HSRP group. You want to ensure that if the gigabitethernet0/1 interface
of switch A goes down, then switch B becomes the active HSRP switch for the VLANs. You
have executed the standby preempt command on switch B.

Which of the following commands should be used on switch A to achieve the desired results?

standby 30 track gigabitethernet0/1

standby 30 track gigabitethernet0/1 10

standby 30 track gigabitethernet0/1 30

standby 30 track gigabitethernet0/1 45


Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80
What attack technique can be used to force user traffic through an attacking device, causing a
man-in-the-middle attack?

VLAN hopping

DHCP spoofing

Rogue device

MAC flooding

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 81
Assuming that preempt is not configured, when does a router in an HSRP group assume the
role of the active router for the group?

A router in standby status will become the active router if it has a higher priority than the
active router.

A router in standby status will become the active router when it does not detect three
consecutive hello messages from the active router.

A router in standby status will become the active router when it does not detect any hello messages from
the active router within the configured hold time.

A router in listening status will become the active router when it does not detect any hello messages
from the active router within the configured hold time.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 82

You have configured three routers in HSRP group 10 to provide gateway redundancy for VLAN
56. Your intention was for Router 1 to be the active router in the group and for Router 3 to be
the standby router. Furthermore, in the event that Router 1 became unavailable, resulting in
Router 3 becoming active, you intended for Router 1 to resume its role as active when it came
back online. However, you discover that in practice. Router 1 does NOT resume the active role
when it comes back online.

What command should be executed on Router 1?

router1(config)# interface vlan 56 router1(config-if)# standby 10 preempt

router1(config)# interface vlan 10 router1(config-if)# standby 56 preempt

router1(config)# standby 10 preempt

router1(config)# standby 56 preempt

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 83
The partial output displayed in the exhibit is a result of what IOS command?
switch# show running-config

switch# show standby vlan1 active brief

switch# show hsrp 1

switch# show standby

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 84
Which two tasks must you perform to enable DHCP option 82 on an untrusted port? (Choose two.)

Enter the ip dhcp snooping information option replace command to enable DHCP option 82.

Enter the ip dhcp snooping trust command to enable DHCP option 82.

Enter the ip dhcp snooping information option allow-untrusted command to enable the untrusted port.

Enter the ip dhcp snooping information option command to enable option 82.

Enter the ip dhcp snooping trust command to enable data insertion DHCP option 82.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 85
Which two statements about LLDP frames are true? (Choose two.)

The destination MAC address in a LLDP frame is a multicast address.

All switches forward the destination MAC address in a LLDP frame.

Each LLDP frame includes a field containing the CoS value.

They have an EtherType of 0x8080.


They contain a CRC for error checking.

Each LLDP frame contains a sequence of TLVs.

Correct Answer: AF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 86
Which feature is enabled automatically when configuring HSRP?

(Which feature enable automatically when configure HSRP?)

preempt

IGMP

ICMP redirect

STP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 87

Which two commands allow you to verify the operational mode status of interfaces or trunk status? (Choose
two.)

show interface switchport

show interface trunk

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 88
Which feature disrupt incoming and outgoing traffic to receive replicated selected traffic?

SPAN

BPDU guard

root guard

PortFast

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 89
Which two criteria must be met to support SSO redundancy in a Cisco StackWise environment?
(Choose two.)

The two switches must use the same license type.

The software version can be different between switches.

Both switches must be in the same StackWise logical group.

You must manually configure the role of each switch.

The two switches must use the same StackWise virtual configuration.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

Reference - https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
6/configuration_guide/b_166_ha_9500/ b_166_ha_9500_chapter_01.pdf
MCQs June 2018 - Contribute

QUESTION 1
You want to correctly configure IP Source Guard on a switch. Which two tasks must you
perform? (Choose two.)

Enable DHCP snooping on the switch.

Enable DHCP packet validation on the device.

Configure the DHCP snooping relay.

Enable DHCP option 82.

Configure the ip verify source vlan dhcp-snooping command.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
Which command enables you to detect whether both sides of an aggregate link are configured
properly?

spanning-tree loopguard default

spanning-tree etherchannel guard misconfig

spanning-tree backbonefast

spanning-tree guard root

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3

Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among
the remaining operational links?
multiple MEC link failure

standby switch failure

active switch failure

single MEC link failure

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

Single MEC Link Failure - If a link within the MEC fails (and other links in the MEC are still
operational), the MEC redistributes the load among the operational links, as in a regular port.

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-
2/XE_340/configuration/guide/config/vss.html

QUESTION 4
Which two commands verify the DHCP snooping configuration on a device? (Choose two.)

show ip dhcp pool

show ip dhcp relay

show ip dhcp snooping

show running-config | include snooping

clear ip dhcp snooping binding

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which two packet types are used by the TACACS+ authentication process? (Choose two.)

request

reply
start

response

continue

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
TACACS+ Traffic Example

This example assumes login authentication, exec authorization, command authorization, start-
stop exec accounting, and command accounting is implemented with TACACS+ when a user
Telnets to a router, performs a command, and exits the router. (See TACACS+ process diagram
in the link below for the authentication process.)

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-
service-radius/13838-10.html

QUESTION 6
Which two packet types are used by the TACACS+ authorization process? (Choose two.)

request

response

reply

continue

start

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
TACACS+ Traffic Example

This example assumes login authentication, exec authorization, command authorization, start-
stop exec accounting, and command accounting is implemented with TACACS+ when a user
Telnets to a router, performs a command, and exits the router. (See TACACS+ process diagram
in the link below for the authorization process.)

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-
service-radius/13838-10.html
QUESTION 7
Which two packet types are used by the TACACS+ accounting process? (Choose two.)

start

request

continue

response

reply

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
TACACS+ Traffic Example

This example assumes login authentication, exec authorization, command authorization, start-
stop exec accounting, and command accounting is implemented with TACACS+ when a user
Telnets to a router, performs a command, and exits the router. (See TACACS+ process diagram in
the link below for the accounting process.)

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-
service-radius/13838-10.html

QUESTION 8
Which two command types are used by the RADIUS accounting process? (Choose two.)

start

stop

record

reply

request

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
RADIUS Traffic Example
This example assumes login authentication, exec authorization, and start-stop exec accounting is
implemented with RADIUS when a user Telnets to a router, performs a command, and exits the
router (other management services are not available). (See RADIUS process diagram in the link
below for the accounting process.)

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-
radius/13838-10.html

QUESTION 9
What is the command to enable BPDU filter on an access port?

spanning-tree portfast bpdufilter default

spanning-tree portfast bpduguard default

spanning-tree bpdufilter enable

spanning-tree bpdufilter default

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
Which acts like a client when using TACACS+?

router

client workstation

client using wireless

AD server

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
A question about StackWise with ingress, egress, standby switch and active switch.

packet, ingress, standby switch

packet, egress, standby switch

packet, egress, active switch

packet, ingress, active switch

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
How do you recover from dot1x failure?

(How to recover dot1x fail.)

recover-violation

psecure-violation

security-violation

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13

A question about RSPAN command replicate incoming and outgoing traffic in a single interface. (Choose
two.)

monitor session 1 destination

monitor session 1 destination interface remote vlan


monitor session 1 source interface g0/1 tx

monitor session 1 source interface g0/2 rx

monitor session 1 source interface g0/1 both

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14

Which two control protocols make use of the native VLAN 1 by default? (Choose two.)

(What is the control protocol make use of the native VLAN 1 by default?)

STP

NTP

LACP

VTP

CDP

UDLD

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
A question about regarding type of VSL used to VSS connectivity.

all physical links

down link (or downstream links?)

upstream links
D. ???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
A question about load balancing in HSRP.

MHSRP

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17

A question about RSTP is running in a switch in network. PVST+ running switch is connected to the network.
What will happen?

Both will run PVST+

Both will run RSTP

STP will stop operating

Old switch will run RSTP and the new switch will run PVST+

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
When any RSTP port receives legacy 802.1D BPDU, it falls back to legacy STP and the inherent
fast convergence benefits of 802.1w are lost when it interacts with legacy bridges.

https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72836-
rapidpvst-mig-config.html

QUESTION 18
What type of attack is mitigated by DAI?

Man-in-the-middle

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
A question in relation to spanning-tree.

(A question with an exhibit showing a port with about 5 VLANs on it asking what command
had been ran on it.)

spanning-tree portfast access

spanning-tree portfast trunk

spanning-tree trunk portfast

spanning-tree access portfast

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 20
A question about non-default native VLAN vs trunk with two choices. (Choose two.)

(We want non default native VLAN vs trunk something like that…)

encapsulation dot1q 99 native

switchport access vlan 1

switchport mode trunk

switchport access vlan 99

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
A question about message TACACS+ server with two choices. (Choose two.)

(Msg TACACS server - 2 choices)

error

hello

continue

transmit

request

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

ACCEPT - The user is authenticated and service may begin. If the network access server is
configured to requite authorization, authorization will begin at this time.

REJECT - The user has failed to authenticate. The user may be denied further access, or will be
prompted to retry the login sequence depending on the TACACS+ daemon.
ERROR - An error occurred at some time during authentication. This can be either at the
daemon or in the network connection between the daemon and the network access server. If
an error response is received, the network access server will typically try to use an alternative
method for authenticating the user.

CONTINUE - The user is prompted for additional authentication information.

https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_tacacs/configuration/15-
1mt/Configuring_TACACS.html

QUESTION 22
How to bring up the interface which is errdisabled by UDLD after the cable fault is fixed?

udld reset

udld clear

reset udld

udld reload

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

A question about RSPAN. It ask to only monitor VLAN 10 tx/rx traffic only in an efficient
manner. A trunk interface with 100 VLANs is selected as source already.

Implement ACL to filter VLAN 10 and then put this in source of SPAN session.

Delete the previous command and issue new command to make VLAN 10 as source of this
SPAN session only. Not the trunk interface.

Make the destination port of SPAN session the member of VLAN 10.

Change the native VLAN to VLAN 10 on trunk interface.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 24
Which two mandatory TLVs in LLDP are valid? (Choose two.)

(What are 2 mandatory TLVs in LLDP)

Port ID

Chassis ID

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25

Which three AAA methods does TACACS+ support? (Choose three.)

Accounting

Authentication

Authorization

Access

Acknowledge

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
What is the default VTP operating mode for the MST feature?
server

client

transparent

off

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27

If you enable etherchannel guard misconfig on all trunk ports and after switch reboot found that 1
port in trunk is in err-disable state. What would be the cause?

Due to EtherChannel misconfiguration this happened.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Which two statements about source port monitoring in a SPAN are true? (Choose two.)

Traffic through a destination port can be copied and included in the SPAN session.

The entire EtherChannel must be monitored.

It can monitor only FastEthernet and GigabitEthernet port types.

It can monitor individual interfaces within a port channel.


E. It can monitor ingress and egress traffic.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-
2_55_se/configuration/guide/3750xscg/swspan.html

QUESTION 29
Which two commands display the VLANs that are present in the VLAN database? (Choose two.)

show running-config

show vlan database

show vlan brief

show vlan

show vlan id

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Which two options about Multichassis EtherChannel are true? (Choose two.)

supports PagP only

supports LACP only

supports PagP and LACP

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31

When you configure error disable recovery, which keyword will be used if it was due to EtherChannel
misconfig?

security violation

channel-misconfig

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/69980-errdisable-
recovery.html

QUESTION 32
If you want to enable the Layer 3 feature of an interface, which command will you configure?

configure IP address

configure switchport

???

configure no switchport

???

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which keyword will be used if administrator wants to set lower and upper threshold for unicast
storm?

level

limit

pps

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-
2_58_se/configuration/guide/2960scg/swtrafc.pdf

QUESTION 34
Which two options are true about TACACS+? (Choose two.)

(Which options are true about TACACS+?)

Decentralize login to avoid security breach xxxxxx (not remembering full)

Support PAP and CHAP

Combines authentication and authorization

Entire packet is encrypted

???

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
Which two statements about VTP are true? (Choose two.)

A. Advertisements are sent periodically from trunk port to a multicast address.


When you update from VTP version 1 to VTP version 2, the switch must be reloaded.

VTP pruning can be configured on extended-range VLANs only.

A configuration revision number is included in VTP packets.

VTP pruning can be configured on all VLANs.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
Which two statements about sticky MAC address learning are true? (Choose two.)

A single device can learn up to three sticky MAC addresses.

Devices can learn sticky MAC addresses dynamically.

Learned addresses are saved to the startup configuration file by default.

Learned addresses are saved to the running configuration by default.

Learned addresses are automatically preserved when the device reboots.

It can be used only on devices that operate in a single layer.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

Which errdisable recovery command option enables a device to recover from a potential loop condition?

link-flap

security-violation

udld

dtp-flap
Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Under which two conditions does Cisco StackWise Virtual transmit data over a virtual link?
(Choose two.)

Packets are processed on the ingress interface on the active switch.

A VLAN is flooded over Layer 2.

Packets are processed on the ingress interface on the standby switch.

Packets are processed on the egress interface on the active switch.

Packets are processed on the egress interface on the standby switch.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
6/configuration_guide/b_166_ha_9500/ b_166_ha_9500_chapter_01.pdf

QUESTION 39
Which errdisable recovery command option enables a device to recover from an incorrect SFT
state?

link-monitor-failure

sfp-config-mismatch

gbic-invalid

port-mode-failure

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 40
Which command maximizes system resources for ACLs?

sdm prefer vlan

sdm prefer access

sdm prefer default

sdm prefer routing

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

How many active virtual gateways can each GLBP group support?

16

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Which two items are included in a STP BPDU? (Choose two.)

A. MAC address of the sending device.


Bridge ID of the root switch.

Port priority number of the sending device.

IP address of the sending device.

STP timer values.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
Information about Bridge Protocol Data Units

Bridge protocol data units (BPDUs) are transmitted in one direction from the root bridge. Each
network device sends configuration BPDUs to communicate and compute the spanning tree
topology. Each configuration BPDU contains the following minimal information:
The unique bridge ID of the network device that the transmitting network device believes to be the
root bridge.
The STP path cost to the root
The bridge ID of the transmitting bridge
Message age
The identifier of the transmitting port
Values for the hello, forward delay, and max-age protocol timers

QUESTION 43
Which two statements about the LACP port priority of a device are true? (Choose two.)

To manually configure a link within an EtherChannel to come up first, set its LACP port-priority
value lower than the default.

LACP port-priority is used in the hashing algorithm to load-balance links within an EtherChannel.

The systems uses the port priority of the local and remote devices to determine which links in an
EtherChannel group are active.

It determines which links in an EtherChannel group are active.

The system uses the port priority of the local and remote devices to determine which links in an
EtherChannel group are host-standby.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Which switch management feature can you configure to drop traffic from specific source or
destination addresses?

switchport port-security

static address entries

unicast MAC address filtering

MAC threshold notification traps

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
When unicast MAC address filtering is enabled, the switch drops packets with specific source or
destination MAC addresses.

This example shows how to enable unicast MAC address filtering and to configure the switch to
drop packets that have a source or destination address of c2f3.220a.12f4. When a packet is
received in VLAN 4 with this MAC address as its source or destination, the packet is dropped:
Switch(config)# mac address-table static c2f3.220a.12f4 vlan 4 drop

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-
2_58_se/configuration/guide/2960scg/swadmin.html

QUESTION 45
Which two features are new in VTPv3? (Choose two.)

using multiple switches in the server role

extended VLAN support

private VLAN propagation

transparent mode

support for token ring VLANs

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Which two commands or commands sequences configures a switch so that if tags native VLAN 3839? (Choose
two.)

interface GigabitEthernet0/0 description to HR Building M 6490-406 switchport trunk native vlan 3839

interface GigabitEthernet0/0 description to HR Building M 6490-406 encapsulation dot1q tag vlan native 3839

switch(config)#set switch native vlan 3839

switch(config)#vlan dot1q native vlan 3839

switch(config)#vlan dot1q tag native

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which two statements about GLBP are true? (Choose two.)

Member devices send hello messages to multicast address 224.0.0.39.

Member devices must elect exactly one AVG.

Member device can elect one more AVGs.

The AVG assigns virtual MAC addresses to all group members.

It supports up to 32 groups on a single interface.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose
two.)
end host devices

customer edge services

user-facing provider edge devices

provider edge devices

provider devices

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which three of these VLANs are a valid extended VLANs? (Choose three.)

4095

4096

4094

3000

1006

1005

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Which three options are reasons for an interface to go into err-disable state? (Choose three.)

Security violation

Grouping ports into a port channel


Hard-coded speed duplex match on both sides

BPDU guard-violation

ARP inspection

storm-control broadcast

Correct Answer: ADF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
Which feature prevents a newly-added switch from becoming the primary?

BPDU filtering

root guard

loop guard

BPDU guard

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

You want to configure DHCP snooping on a device. Which two tasks must you perform? (Choose two.)

Enable DHCP option 82.

Enable DHCP snooping globally.

Enable DHCP snooping on the VLAN.

Enable DHCP packet validation on the device.

Enable VRF support for the DHCP relay agent.


Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which method is used to prevent from ARP poisoning?

(The question is about ARP poisoning, and the method to prevent it)

Dynamic ARP Inspection

DHCP snooping

MAC snooping

CGMP snooping

Dynamic MAC Inspection

Static ARP Inspection

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54

Which feature can prevent ARP poisoning attacks on a device?

Dynamic ARP Inspection

DHCP snooping

MAC snooping

CGMP snooping

Dynamic MAC Inspection

Static ARP Inspection


Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55

A trunk port configured “switchport trunk allowed vlan 2,3,4,5,6 and switchport trunk native vlan 2”, asking
VLAN 2 packets are tagged or untagged.

(RESPONSES TBA)

A.

B.

C.

D.

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56

A switch has configured “vlan dot1q tag native”, what happens if a untagged packets (can’t remember it will
be received or sending) on the trunk port?

native VLAN

default VLAN

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 57

An STP question about how to ensure DS1 to be root on VLAN 10 over other 3 switches, DS1
bridge 28xxxx, DS2 bridge 24xxxx, AS1 bridge 32xxxx, AS2 bridge 32xxxx. (Choose two.)

DS1 spanning-tree vlan 10 priority 4096

DS2 spanning-tree vlan 10 priority 4xxxxx

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
A question about default CDP time between protocol frames.

60 seconds

30 seconds

100 seconds

120 seconds

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59

You have deployed a new switch with two physical fiber ports connecting via port-channel to
upstream switch. After the switch had been booted, one of the physical ports went to errdisable
state. What is the most likely cause for this?
UDLD is set to aggressive mode and it received no UDLD message from neighboring device.

Port-channel is misconfigured and EtherChannel guard put the port to errdisable.

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
Which SDM command gives balance to all functions on a switch?

sdm prefer default

sdm prefer vlan

sdm prefer routing

sdm prefer access

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61

Which SDM command select a template that supports both IPv4 and IPv6 routing on a switch?

sdm prefer dual-ipv4-and-ipv6

sdm prefer routing

sdm prefer trunk

sdm prefer access


Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which SDM command maximize routing on the switch?

sdm prefer routing

sdm prefer route-enabled

sdm prefer route-on

sdm prefer access-route

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63

Which SDM command maximize VLAN configuration on the switch with no routing supported in
hardware?

sdm prefer vlan

sdm prefer access vlan

sdm prefer vlan-enabled

sdm prefer vlan-on

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 64
Which SDM command will balance IPv4 and IPv6 Layer 2 and Layer 3 functionality on a switch?

sdm prefer dual-ipv4-and-ipv6 default

sdm prefer ipv4-ipv6 default

sdm prefer default dual-ipv4-and-ipv6

sdm prefer 6to4 default

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65

Which SDM command will provide maximum usage for IPv4 and IPv6 routing, including IPv4 policy-based
routing on a switch?

sdm prefer dual-ipv4-and-ipv6 routing

sdm prefer dual-ipv4-and-ipv6 default

sdm prefer dual-ipv4-and-ipv6 vlan

sdm prefer dual-ipv4-and-ipv6 access

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
Which SDM command will provide maximum usage for IPv4 and IPv6 VLANs on a switch?

sdm prefer dual-ipv4-and-ipv6 vlan

sdm prefer dual-ipv4-and-ipv6 access

sdm prefer dual-ipv4-and-ipv6 default


D. sdm prefer dual-6to4 vlan

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 67

Which command changes time between BPDUs in MST environment?

spanning-tree mst hold-timer 20

spanning-tree mst 1 cost 1

spanning-tree mst hello-timer 2

spanning-tree mst max-age 20

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
Which VLAN range is used in RSPAN?

1-1005

1-2045

MAC address aging timer

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 69
If the port is tagged with VLAN 99, which two answers hold... (Choose two.)

VLAN STP BPDU go tagged in VLAN 1.

VLAN STP BPDU go tagged in VLAN 99.

VLAN STP BPDU go untagged in VLAN 1.

VLAN STP BPDU go untagged in VLAN 99.

VLAN 1 and VLAN 99 BPDU go tagged with VLAN 1.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70

A question about syslog MAC move and 60% threshold notification. The question for MAC move
and 60% threshold notification was for syslog. They gave the syslog configuration where the MAC
move was mentioned along with the MAC address table utilization of 60% threshold configuration
commands. What triggers a syslog? (Choose two.)

When a phone is moved from Fa0/2 to Fa0/5.

When the MAC address table utilization crosses 60%.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71
A question about a trunk interface configuration output with dot1q.

dot1q inserts a 32 bit tag between the header and payload.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72
A question about VRRP with an output.

Skew timer value is 0.352.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73

What happen on an access port when a frame with a dot1q tag comes on it?

The tag is removed and the frame is sent to the VLAN or port.

The frame is sent to the VLAN on the tag.

The frame is dropped.

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74

In what two ways is the IEEE STP BPDU frames sent when you have a native VLAN 953 set? (Choose
two.)

IEEE STP BPDU frames are sent untagged over VLAN 953.

IEEE STP BPDU frames are sent tagged over VLAN 953.

IEEE STP BPDU frames are sent untagged over VLAN 1.

IEEE STP BPDU frames are sent tagged over VLAN 1.

IEEE STP BPDU frames for VLAN 1 and VLAN 953 are sent untagged over VLAN 953.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:
MCQs July-August 2018 - Contribute

QUESTION 1
Which feature to use against IP spoofing at Layer 2?

DHCP snooping

port security

IP source guard

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
A question about VRRP advertisement. (Choose two.)

(VRRP advertisement - 2 to choose)

It sends every 3 second intervals

It sends priority information

It sends timers

It sends only from master router

It sends to master router and standby router

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3

What command will need to be run with storm control to configure thresholds?
set

level

pps

pim

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which is true about the description below?

VLAN range 1 – 2000 are allow to pass, native VLAN is tagged.

VLAN range 1 – 4096 are allow to pass, but native VLAN is not tagged.

VTP pruning enabled by default.

??? by default.

??? to pass, but native VLAN is not tagged.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5

Your switch is connected to an ISP switch. What can you use to prevent broadcast storm from ISP?

A. BPDU filter
BPDU guard

loop guard

flex link

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
If EtherChannel is configured for LACP, what is default mode it has on IOS switch?

mode on

mode off

mode active

mode passive

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

passive - Specifies that when you enable LACP, this command enables LACP only if an LACP
device is detected. The interface is in a passive negotiation state, in which the port responds to
LACP packets that it receives but does not initiate LACP negotiation.

https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/nxos/commands/l2/channel-group-
ethernet.html

QUESTION 7
Question asking if this configuration is on the port what VLANs will be tagged?

A. VLAN 1 through 1005 tagged


VLAN 4096 tagged

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
Which is true about the description below?

VLAN range 1 – 2000 are allow to pass, native VLAN is tagged.

VLAN range 1 – 4096 are allow to pass, but native VLAN is not tagged.

VTP pruning enabled and VTPv3...

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

EtherChannel load balancing uses which of the following? (Choose three.)

VLAN ID

IP priority (or something similar but same meaning)

IP address
MAC address

Port number

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

EtherChannel load balancing can use MAC addresses, IP addresses, or Layer 4 port numbers. Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/etherchannel/12023-4.html
QUESTION 10
Exhibit that shows a trunk interface configuration with the following;

How can you remove VLAN 100 from the allowed VLAN list? (Choose two.)

switchport trunk allowed vlan 81-121 remove 98,100

switchport trunk allowed vlan remove 100

switchport trunk allowed vlan 81-97,99,101-121

???

???

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
Which SPAN limitation is true?

EtherChannel can be source or destination.

EtherChannel can be source but not destination.

EtherChannel can be destination but not source.


D. EtherChannel can not be source or destination.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12

EXHIBIT INCLUDED - A question with a diagram with two routers configured with HSRP groups. Which
two statements are true? (Choose two.)

(There was a diagram with 2 routers configured with HSRP groups)

R1 gateway for PC1 and PC3.

R2 gateway for PC2 and PC4.

R1 primary gateway for 10.1.0.1 and R2 primary gateway for 10.1.0.10.

???

???

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
EXHIBIT INCLUDED - A question with a diagram with 6 switches configured with VTP pruning.
Which statement is true?

(A diagram with 6 switch configured with VTP pruning)

VLAN 1 to 101 allowed on trunks between SW1, SW2 and SW3.

VLAN 10 to 101 allowed on trunks between SW3 and SW4.

VLAN 1 to 101 allowed on trunks between SW4, SW5 and SW6.

VLAN 1 to 9 will be pruned between SW3 and SW4.


Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Which two statements about FHRP are correct? (Choose two.)

(Which is correct statement about FHRP? - by Duternoy, Certprepare July 18th, 2018)

something about GLBP statement

something about HSRP statement

something about VRRP statement

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15

A question about a fiber connected EtherChannel after the switches were powered on the ports went
errdisable.

Due to UDLD errdisable it.

Due to EtherChannel misconfig.

???

???

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 16
A question about a configuration with a dot1q enabled trunk port. (Choose two.)

Supports VLANs 1-4096.

Does not support tagging native VLAN.

Dot1q supports tagging 1000 VLANs including the native VLAN.

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
Which statement is true about CDP?

CDP sends updates every 60 seconds.

CDP does not support SNMP.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18

Which two statements are true when using IP Source Guard with DHCP snooping? (Choose two.)
It is allowed to use an IP address which is in DHCP snooping database.

It is now (or not) allowed to use an IP address which is in DHCP snooping database.

It should be enabled in globally to all interfaces.

???

???

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19

A question with an exhibit of 5 switches and they mention there are switch priorities for each
switch and is asking new VLAN added onto the switches. Which switch will become the root
bridge?

There were 1 switch priority 8192.

All other switch priorities were higher than 8192.

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20

A question with an exhibit of VLAN 1,10,20,30,40. All VLAN port status were designated. The
question was which command happened to put all ports in designated?

spanning-tree vlan 10,20,30,40 root primary

???

???
D. ???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21

A question with an exhibit of 5 switches and they mention there are switch priorities for each
switch. It is asking for new VLAN added onto the switches. Which switch will become the root
bridge?

(There was a switch with a priority of 8192. All other switch priorities were higher than 8192.)

Switch A

Switch B

Switch C

Switch D

Switch E

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which two ports are default or should set as untrusted ports (DHCP Snooping/IP Source Guard)
in an ISP environment? (Choose two.)

Provider edge port

Customer edge port

???

???

Customer facing provider edge port


Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

Which three VLANs are part of the extended range of available VLANs? (Choose three.)

1006

4095

4195

3000

4094

1001

Correct Answer: ADE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which two statements is true about port security? (Choose two.)

(What is true of port security? (pick 2 answers) - contributed at CertPrepare)

It is used on EtherChannel bundle.

It must be used on the switch interface.

It can be configured for SPAN.

It is configured on an access port.

???
Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25

Which Firepower Management Center feature detects and blocks exploits and hack attempts?

intrusion prevention

advanced malware protection (AMP)

contenxsat blocker

file control

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
Which two types of firewalls work at Layer 4 and above? (Choose two.)

application-level firewall

static packet filter

stateful inspection

Network Address Translation

circuit-level gateway

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
QUESTION 27
Which two types of VLANs using PVLANs are valid? (Choose two.)

secondary

community

isolated

promiscuous

backup

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28

Which protocol offers data integrity, encryption, authentication, and antireplay functions for IPsec VPN?

AH protocol

ESP protocol

IKEv2 protocol

IKEv1 protocol

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29

How can you mitigate attacks in which the attacker attaches more than one VLAN tag to a packet?

A. Disable EtherChannel.
Enable transparent VTP on the switch.

Explicitly identify each VLAN allowed across the trunk.

Assign an access VLAN to every active port on the switch.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30

Which effect of the line keyword entered at the end of an AAA method list is true?

It sets last resort failback authentication method.

It override the enable authentication method.

It override the radius authentication method.

It override the tacacs+ authentication method.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Which two benefits of using VSS for chassis virtualization? (Choose two.)

Provide a single point of management for improved efficiency.

Use a single database to manage configuration for multiple switches.

Require only one gateway per VLAN.

Support GLBP to balance VSS traffic.

Provide multiple points of management for redundancy and improved support.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

Which statement is true about TACACS+? - (What is the true statement of TACACS+)

It is a Cisco proprietary technology.

Support several less common protections in address to IP.

More reliable than RADIUS because it communicate with UDP packets.

Backwards compatible with TACACS.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33

Which two statements about isolated private VLAN ports are true? (Choose two.)

They can communicate only with promiscuous ports.

They can be configured on the EtherChannel ports.

They can be configured on only port on a device.

They can be configured on more than one port in the same VLAN.

They can be communicate only with other ports in the private VLAN.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 34
Refer to the exhibit.

Which two statements of the above result is true? (Choose two.) - (Refer to exhibit, what are true -
(choose 2)

As a result of STP, interface was err-disabled.

UDLD reset command recovers the disabled ports after the error is corrected.

UDLD negotiation failed when neighbor switch went offline.

UDLD mode changed from normal to aggressive when the error was detected.

UDLD aggressive mode put the interface into an error disabled state.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
MCQs Sept-Oct 2018 - Contribute

QUESTION 1

Which VSS technology allows you to share downstream resources?

MEC

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2

Which two benefits of using VSS for chassis virtualization? (Choose two.)

single point of management

single gateway (no need for FHRP)

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
A question about isolated port private VLAN.
It can communicate only on isolated port.

It can configure more than one on the same port VLAN.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4

Which two of these StackWise virtualization components are in a logical stack? (Choose two.)

management plane

data plane

control plane

???

???

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which of these StackWise virtualization components are in a logical stack?

control and data plane

control and management plane

???

???
Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
A question about something related to validation.

arp inspection validate ip

ip verify source

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
A question about the difference between HSRP and GLBP.

HSRP can share multiple IP for gateway reduncancy in a single standby group.

HSRP can share multiple MAC for gateway load balancing.

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 8
What command makes ARP inspection validate an IP in IP-MAC bindings database?

arp inspection validate ip

ip verify source

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

Which two packet types for authentication and authorization are used in TACACS+? (Choose two.)

request

continue

response

start

stop

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
Which three features about TACACS+ are true? (Choose three.)

It supports TCP port 49

It supports packet encryption


It supports client-server architecture

It supports client-private cloud architecture

???

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 11

Which two encryption features are used for TACACS+ and RADIUS? (Choose two.)

It uses the entire packet.

It uses username and password.

It uses only password.

???

???

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
A question related to Cisco StackWise Virtual.

single control and management plane

distributed data plane

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13

Which command makes ARP inspection validate an IP in IP-MAC bindings database?

ip arp inspection vlan

ip arp inspection trust

ip verify source

ip arp inspection validate ip

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
A question related to dual active detection for StackWise Virtual. (Choose two.)

fast-hello

PAgP

recovery

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:
How does the dual active detection and recovery mechanism work?
The dual active fast hello is a lightweight protocol that operates on a dedicated interface between
two stack member switches of a StackWise Virtual domain. If the SSO active switch receives a fast
hello message after losing all SVL connections, it detects dual active failure and enters recovery-
mode by disabling all network connection ports to minimize disruption.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/switches/catalyst-3850-series-
switches/q-and-a-c67-738577.pdf

QUESTION 15
A question related to FHRP defaults.

Preemption is enabled.

Only GLBP use load-balancing for multiple router.

Only GLBP use MAC address router BIA (Burned In Address).

Only if the AVG fail, standby become the new active router.

If standby router has higher priority became the new active router.

If standby AVG has higher priority became the new active router.

Something on or about VRRP.

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
A question with a VRRP output form of two switches. Which two answers are true? (Choose two.)

The hold timer was 10 seconds.

If the standby didn’t get hello before 10 seconds, it will become active.

???

???

???

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:

QUESTION 17
Which StackWise Virtual components are in a common logical group?

control, management, data plane

control and data plane

control and management plane

???

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which type of port can serve as StackWise Virtual link?

downlink only

uplink only

switched port

any physical port

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
6/configuration_guide/b_166_ha_9500/

b_166_ha_9500_chapter_01.pdf

QUESTION 19
Which command set the interval LLDP send updates to its neighbors?

LLDP tlv-select

LLDP Timer

LLDP Transmit

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which command is used to override the priority of frames arriving on the Cisco IP phone port?

mls qos dscp

mls qos cos

switchport priority extend trust

???

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21

Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)

(How to add VLAN 20 on switch VLAN configuration file?)

A. switchport trunk native vlan 20


switchport access vlan 20

vlan 20

switchport trunk allowed vlan 20

encapsulation dot1q 20

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

Once switchport access vlan 20 command is issued, it will automatically create VLAN 20 in the
configuration database.

QUESTION 22
Which command is used when TACACS+ is unreachable while the device will use the local
database?

aaa authentication login default group TACACS+ local

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
A question about the steps to configure a device to use remote security database. (Choose
two.)

Configure device query remote security database.

Configure user profile in remote security database.

Specifies the IP address or the host name of the remote TACACS+ server host.

Specifies a shared secret text string used between the router and the TACACS+ server.

???
Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:
Specifies the IP address or the host name of the remote TACACS+ server host.
- This host is typically a UNIX system running TACACS+ software.

Specifies a shared secret text string used between the router and the TACACS+ server.
- The router and TACACS+ server use this text string to encrypt passwords and exchange responses.

QUESTION 24
A question about default TACACS+ database.

aaa authentication login default group TACACS+ local

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
A question about security policy on a per-user basis.

network

exec

auto-proxy

command

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 26
A question about recover from an EtherChannel error.

sfp-counting misconfig

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27

Which command is used to determine the native VLAN on a trunk?

(How to determine native VLAN on a trunk?)

show vlan

show vlan trunk

show interface trunk

show ip interface vlan

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
You have three switches working with VLAN 20, then you add a fourth switch through access ports.
What do you need to do in order to prepare the new switch to operate well in the future? (Choose
two.)

Change the access port links to trunk.

Configure SVI with an IP address for the current VLAN 20.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Which command disables STP on multiple interfaces?

no spanning-tree vlan 10

no spanning-tree pvst

no spanning-tree mst

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Refer to the exhibit. Four switches configuration.

SwitchA(config)#interface FastEthernet 0/1


SwitchA(config-if)#switchport mode access
SwitchA(config-if)#switchport access vlan 10
SwitchB(config)#interface FastEthernet 0/1
SwitchB(config-if)#switchport mode access
SwitchB(config-if)#switchport access vlan 10

SwitchC(config)#interface FastEthernet 0/1


SwitchC(config-if)#switchport mode access
SwitchC(config-if)#switchport access vlan 10

SwitchD(config)#interface FastEthernet 0/1


SwitchD(config-if)#switchport mode access
SwitchD(config-if)#switchport access vlan 20

These four switches are connected with trunk links. Which of the following is correct?

All switches are able to communicate without Layer 3 device.

Switches are not able to communicate without Layer 3 device.

Switch D is not able to communicate with other switches without Layer 3 device.

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
A question about vendor neutral AAA protocol.

RADIUS

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

A question about LLDP default configuration. (Choose two.)

Global state is disabled.

LLDP interface is enabled.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
A question about RSPAN.

It can monitor ingress and egress traffic.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
A question about protocol to propagate voice VLAN.

CDP

SIP

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
A question about the difference between HSRP and GLBP.

GLBP supports load balance over multiple routers.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

Which centralized database separates between AAA attributes?

TACACS+

RADIUS

Local Database

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Which command apply fast forwarding on all ports?

spanning-tree portfast

spanning-tree portfast default

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38

Which command apply to verify errdisable on any interface?

show err-disable detect

show interfaces err-disable status

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 39
What happens when configuring VLAN on switches running VTP server mode?

Host on the switch without router can communicate with other on the same VLAN.

VLAN created first will be native VLAN.

VLAN created should be propagated on switch on the same domain.

???

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
Which statement is true about tracking with VRRP?

(What's true about tracking with VRRP)

Track on interface and route

Track only interface

Track only route

Only one track per group

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
Which two statements are true about RADIUS? (Choose two.)

(Which true abouts RADIUS)


client-server mode

client-private mode

standard-based implementation

work only with UDP

work only with TCP

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42

A question about AAA accounting asking what services does it track. (Choose two.)

authentication

authorization

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43
A question about SPAN. (Choose two.)

SPAN is standard.

SPAN can monitor source interface to destination interface only.

???
???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44

A question about RADIUS replays. (Choose three.)

accept

challenge

change password

???

???

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 45

A question about VTPv3 new features. (Choose two.)

AES encryption

SHA2

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46

A question about overriding the priority of IP phone.

auto qos voip cisco-phone

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
A question about EtherChannel misconfig.

spanning-tree etherchannel guard misconfig

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
Which three authentication messages does RADIUS use? (Choose three.)

Access-Accept

Access-Reject

Access-Challenge

Access-Encryption

Access-Protected

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which portion of RADIUS does the packet encrypt?

Password

Entire Packet

Header

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Which command turns on spanning-tree and disables EtherChannel?

switchport spanning-tree portfast

switchport access host

???
D. ???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51

Which mode of PAgP will mean that it will not initiate channel negotiation?

passive

on

off

auto

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

A question regarding to LLDP. What sets the timing of the advertisements?

LLDP Timer

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 53
A question about GLBP

uses UDP port 3222

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which feature can protect a Layer 2 port from spoofed IP addresses?

uRPF

Port Security

IP Source Guard

DHCP Snooping

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55

Which two differences between RADIUS and TACACS+ are true? (Choose two.)

Only TACACS+ can combine authentication and authorization function.

Only RADIUS uses UDP.


Only RADIUS provide granular control over the CLI commands that a user can execute.

Only TACACS+ use user privilege levels to determine which commands the user can execute.

Only TACACS+ uses UDP.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
Which command overrides the default priority of frames on an IP phone?

mls qos trust dscp

switchport priority extended trust

mls qos trust cos

priority-queue out

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

A network engineer has just configured a fibre connection between two switches. The connection
has been set up as an EtherChannel. Shortly after powering the device on, the fibre port err-
disables. What is the most likely cause?

UDLD standard mode has been setup on the interface.

Spanning tree has disabled the port.

UDLD aggressive mode has been setup on the port.

The EtherChannel configuration is incorrect.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58

A question about UDLD mode. Which does not shutdown/error disable the port when UDLD detected.

normal

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
A question about CDP timer.

60 seconds

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
A question about interface trunk is configured with vlan dot1q tag native command. What will happen when it
receives untagged frame?

Drop it.

Send it over the default VLAN.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
A question about local user database.

Can be use as backup when other methods fail.

Authorization of commands can be configured for local database user.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which command disables STP on multiple interfaces?

no spanning-tree vlan 9

no spanning-tree pvst
no spanning-tree mst

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63
Which two commands should we use to check the IP source guard bindings? (Choose two.)

show dhcp snooping binding

show dhcp snooping binding database

show ip verify source

show ip source binding

???

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64

Which industry standard AAA mechanism uses the industry neutral mechanism for user authentication and
authorization?

RADIUS

TACACS+

LDAP

Kerberos

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65
In which VTP mode VLAN configured on the switch are propagated to other switch?

server

client

transparent

on

off

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
How many AVFs can be elected by GLBP member?

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

When the routers are configured to a GLBP group, they first elect one gateway to be the Active Virtual Gateway
(AVG) for that group. The election is based on the priority of each gateway (highest priority wins). If all of them
have the same priority then the gateway with the highest real IP address becomes the AVG. The AVG, in turn,
assigns a virtual MAC address to each member of the GLBP group. Each gateway which is assigned a virtual
MAC address is called
Active Virtual Forwarder (AVF). A GLBP group only has a maximum of four AVFs. If there are
more than 4 gateways in a GLBP group then the rest will become Standby Virtual Forwarder
(SVF) which will take the place of a AVF in case of failure.

QUESTION 67

A question about appropriate EtherChannel load balancing method for user connecting through
network/devices/switches to a single web server.

source MAC

source and destination IP

destination MAC

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
A question about how to verify VLAN in VLAN database. (Choose two.)

show vlan

show vlan brief

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
How can you check the only make addresses learned by the switch dynamically?
show mac address-table dynamic

show mac address-table static

show mac address-table multicast

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
A question about VRRP. There were 4 different switches with different priorities and two of them
they had the same IP address configured.

(From candidate: I think that they were using the physical interfaces. I was confused since I
though that when two of them are using the same IP address would be a conflict and other device
would be used)

Router A which had 192.168.0.1 and priority 120

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71
A question about a VRRP priority when a tracked interface goes down and then recovers.

Current priority decrement

Priority increment

???
D. ???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72
Which UDLD mode does not shutdown/error disable the port when UDLD is detected?

Aggressive mode

Normal mode

Loose mode

Strict mode

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 73

A question about configuring AAA TACACS+ authentication with fall back to local user database and
commands were given?

aaa authentication login default tacacs+ local

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 74
Which SDM feature enables maximize resources for ACL?

access

routing

standard

VLAN

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75
What is the main use of a local database?

As a backup in case of centralized database failure.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76

What is the MAC address of an interface with HSRP group 37?

000.0c07.ac25

000.0c07.ac37
???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
How many AVGs can be elected by GLBP member?

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78

Which three combinations successfully form an access port? (Choose three.)

trunk and auto

access and auto

auto and auto

trunk and access

on and access

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 79

What primarily determines the master switch in StackWise?

Lowest MAC

Lowest start up time

Highest MAC

Highest administrator-configured priority

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
MCQs Nov 2018 - Contribute

QUESTION 1
Which command is used to configure vendor-specific attributes with RADIUS?

radius-server vsa send

vendor-specific attribute

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

To configure the network access server to recognize and use vendor-specific attributes, use
the radius-server vsa send command in global configuration mode.

Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-
networking-services/whitepaper_C11-731907.html

QUESTION 2
Which command on a switchport can cause LLDP to accept LLDP packets but not send them?

lldp run

lldp advertise

lldp receive

no lldp transmit

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
The command no lldp transmit disallows sending LLDP packets on the interface.

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/access_point/atnms-ap-
82/configuration/guide/cg-82-book/cg-chap-LLDP.pdf
QUESTION 3
What types of SDM templates you can use in switch? (Choose four.)

Access

Default

Routing

VLANs

???

???

Correct Answer: ABCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
What feature carries information about the Voice VLAN to a Cisco Phone?

SIP

LLDP

CDP

Skinny Client Control Protocol (SCCP)

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5

Which three combinations of PAgP allow the formation of a channel? (Choose three.)

A. auto-desirable
on-off

on-on

desirable-desirable

on-desirable

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
Which four modes of PAgP are valid? (Choose four.)

passive

off

on

auto

desirable

active

Correct Answer: BCDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 7

Which two actions are possible when you are configuring port-security?

Port will be error disabled

Port will be shutdown

Port will drop traffic

Port will send logs


E. ???

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
A question about how SPAN will react to EtherChannel?

Source port will be monitored.

Destination port will be excluded while the monitor session is active.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

A question about the relationship between RSTP and spanning-tree.

RSTP is compatible with STP.

RSTP is not backward compatible with STP.

It will create STP instance per VLAN.

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 10

A question about PAgP mode that is receiving but will not initiate formation of EtherChannel.

auto

desirable

on

off

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
A question about how port security can be configured in?

static trunk port

dynamic trunk port

dynamic access port

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Refer to exhibit.

monitor session 1 source remote vlan 8 – 10


monitor session 1 destination interface fa0/1
The packet is send to VLAN 8 and 10 and will be received in fa0/1.

The packet is received from VLAN 8 and 10 and will be send to fa0/1.

The packet is send to VLAN 8 to 10 and will be received in fa0/1.

The packet is received from VLAN 8 to 10 and will be send to fa0/1.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
Refer to exhibit.

conf t
vlan 3

Switches A, B, C and D are connected via access ports. What two actions will you do to cater future
expansion of VLAN due to large number of users?

Change the access link to trunk ports.

Configure access VLAN 3 in each switch.

Configure VTP transparent.

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
What is the effect of VTP transparent?
It will pass VTP information.

It will not pass VTP information.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
A question about StackWise Virtual.

Must have same software.

Different software are supported.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16

Which kind of tracking can do in VRRP? (Choose two.)

route

interface state

???

???

???
Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
Which command is used to enable PortFast and disable port-channel?

(What is the command that enable portfast and disable portchannel)

switchport host

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which two statements about the local user database are true? (Choose two.)

For console connections, it can be used only as a backup authentication method.

It can be configured to grant a user-specific privilege level.

It can store passwords in clear text only.

For VTY connections, it can be used only as a backup authentication method.

It can be used as the only method of authentication or as a backup for other methods.

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:

QUESTION 19
Which two features does TACACS+ support? (Choose two.)

Combining authorization and authentication to streamline AAA services.

Decentralizing network access management, reducing the potential impact of a security breach to a
central device.

UDP communication between the network access server and the security server.

Encrypting the entire TCP Packet containing TACACS + information.

PAP and CHAP authentication.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which statement about VSPAN is true?

It can monitor ingress and egress traffic on the source VLAN.

It sends all VLAN traffic to the destination port regardless of the VLAN's status.

It can monitor destination port traffic that belongs to a source VLAN.

It can monitor token ring VLANs.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
BPDU guard

port security

DAI

IP source guard

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which two statements about LLDP are true? (Choose two.)

Switches can run LLDP and Cisco Discovery Protocol simultaneously.

When it is enabled on a switch, Cisco Discovery Protocol must be disabled.

When LLDP is enabled globally, it is enabled on all ports including tunnel ports.

Devices with LLDP configured send advertisement messages to a unicast address on a periodic basis.

Devices with LLDP configured send advertisement messages to a multicast address on a periodic basic.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which three characteristics of AAA with TACACS+ are true? (Choose three.)

It is a Cisco-proprietary implementation.

It is a standard-based implementation.

It runs on UDP port 49.

It uses a client-private cloud architecture.

It uses a client-server architecture.


F. It runs on TCP port 49.

Correct Answer: AEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which AAA authorization method uses a vendor-neutral directory information protocol?

LDAP

RADIUS

TACACS+

Kerberos

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

The Lightweight Directory Access Protocol (LDAP) is a vendor -neutral application protocol
used to maintain distributed directory info in an organized, easy-to-query manner. That means
it allows you to keep a directory of items and information about them.

QUESTION 25
Which statement describes what a port that is configured as an access port does if it receives
an 802.1Q tagged frame?

It drops the frame.

It passes the frame on to the VLAN that the frame is tagged for.

It err-disables the port.

It removes the tag and forwards the frame in the VLAN assigned to the port.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 26
Which option is a primary difference between HSRP and GLBP?

Only GLBP uses a router BIA to provide gateway redundancy.

Only HSRP uses multiple virtual IP address to provide gateway redundancy in a single standby group.

Only HSRP can use multiple MAC address to provide gateway load balancing over multiple routers.

Only GLBP supports gateway load balancing over multiple routers.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which two commands add VLAN 20 to the VLAN configuration file? (Choose two.)

switch(config)# vlan configuration 20

switch(config)# interface vlan 20

switch(config)# vlan 20

switch(config)# switchport access vlan 20

switch(config)# switchport trunk allowed vlan 20

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Which command enables a RADIUS server configuration to use vendor-proprietary attributes?
radius-server configure-nas

radius-server attribute nas-port extended

radius-server host non-standard

radius-server vsa send authentication

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Which statement about VLAN pruning on trunk ports is true?

Broadcast traffic for a manually pruned VLAN is allowed to cross the trunk port.

Manually pruning VLANs reduces unnecessary forwarding of broadcast traffic.

VLANs can be pruned only via VTP pruning.

Manually pruning extended VLANs increases switch security.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Which two mandatory TLV types does LLDP advertise? (Choose two.)

Native VLAN TLV

Platform TLV

Network TLV

Hostname TLV

???
Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31

You have recently deployed an access switch with two fiber cables that connect it to a
distribution switch in EtherChannel mode. Soon after it booted up, one of the uplink ports to
the distribution switch was error-disabled. Which option is the most likely reason for the
problem?

The switch is operating in UDLD aggressive mode and it failed to receieve a UDLD message
from the peer.

The port-channel detected an inconsistent configuration.

The switch is operating in UDLD normal mode and it failed to receive a UDLD message from
the peer.

Spanning tree is detected a loop.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
Which command do you enter to troubleshoot a misconfigured EtherChannel?

CORE-SW (config)#spanning-tree etherchannel guard misconfig

CORE-SW (config-if)#spanning-tree etherchannel guard misconfig

CORE-SW (config-if)#spanning-tree loopguard default

CORE-SW (config-if)#spanning-tree guard root

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 33
Which two reasons to deploy UDLD on a switch are true? (Choose two.)

It can interact with Layer 1 mechanisms to monitor the status of physical links.

It can prevent forwarding loops that result from unidirectional links.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
Which option is a benefit of configuring UDLD on a link between two switches?

UDLD helps prevent switching loops.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35

Which two tasks must you perfom to configure DHCP snooping on a device? (Choose two.)

A. Enable DHCP snooping on the VLAN.


Enable DHCP snooping globally.

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

Which two commands configure RSPAN to capture incoming and outgoing traffic on a single interface?
(Choose two.)

monitor session 1 source interface gigabitethernet 1/0/2 both

monitor session 1 destination remote vlan 910

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

When the switches in a Cisco StackWise stack elect a new master switch, which value is used as the
primary selector?

Highest administrator-assigned priority

???

???

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Refer to the output below.

interface FastEthernet0/1
description to server room A 76-79430
switchport trunk allowed vlan 81-97,99-121
switchport mode trunk
end
!

Which two commands remove VLAN 100 from the VLANs allowed on the trunk port? (Choose two.)

switchport trunk allowed vlan 81-97,99,101-121

no switchport trunk allowed vlan 100

switchport trunk allowed vlan remove 100

switchport trunk allowed vlan 81-121 remove 98,100

switchport trunk vlan remove 100

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
Which two limitations of IP Source Guard are true? (Choose two.)

It is supported only on packets switched in hardware.

It is supported only on ingress Layer 2 ports.


It is supported only on egress Layer 3 ports.

It is supported only an PAgP EtherChannels.

It is supported only on ingress Layer 3 ports.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40

Which command can you enter to most effectively rate-limit multicast traffic based on available
bandwidth?

storm-control multicast level pps 10k

storm-control multicast level bps 10k

storm-control multicast level 20 10

storm-control multicast level 10

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
Which two statements about STP path cost are true? (Choose two.)

The default path cost method is short.

MST supports the short and long path cost methods.

The default path cost method is long.

MST supports only the long path cost method.

The long method uses a 64-bit value for path costs

The short method uses a 32-bit value for path costs.


Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Which two statements are true of loop guard? (Choose two.)

Configure loop guard on root port to help detect and isolate unidirectional link failure.

Configure loop guard when root guard is enabled for optimal loop prevention mechanism.

Configure loop guard on a PortFast-enabled port to ensure optimal loop prevention mechanism.

Configure loop guard on a point-to-point link for an effective loop prevention mechanism.

Configure loop guard to prevent root port from becoming a designated port.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43
Which two statements about normal-range VLANs are true? (Choose two.)

You can delete VLANs 1002 through 1005 in transparent mode only.

The vlan dat file is stored in RAM and copied to the NVRAM when you save the configuration.

Configurations are saved in the vlan.dat file.

You can add, modify, and remove configurations in VTP server mode and VTP client mode.

You can add VLANs in VTP server mode.

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:

QUESTION 44

You move a switch from a network where it performed Layer 2 switching only to a network where it
performs Layer 2 switching and Layer 3 routing. You notice that the switch is showing high CPU
usage and significantly degraded routing performance. Which command sequence do you use to
troubleshoot and fix the problem?

#show running-config (config)#ip routing

#show sdm prefer (config)#sdm prefer vlan

#show sdm prefer (config)#sdm prefer routing

#show sdm prefer (config)#sdm prefer default

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45
Which three statements about extended VLANs are true? (Choose three.)

The lowest extended VLAN number is 1006.

The lowest extended VLAN number is 1002.

Any VLAN ID can be used as an extended VLAN.

They are recognized only by VTP version 3.

They are propagated by VTP by default.

They require the extended system ID to be enabled on the device.

Correct Answer: ADF


Section: (none)
Explanation
Explanation/Reference:

QUESTION 46
Which command must be configured on the physical ports of a Layer 3 EtherChannel?

ip address <subnet mask>

switchport trunk encapsulation dot1q

no switchport

switchport mode access

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which feature can you enable on your network to most effectively limit unknown traffic?

DHCP packet rate limiting

unicast storm control

multicast storm control

broadcast storm control

ARP packet rate limiting

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48

Which statement describes the result of issuing the spanning-tree portfast trunk command under interface
configuration mode?
The port is allowed to go into the forwarding state immediately regardless of whether the
interface is configured as an access or trunk port.

The port enters the errdisable state if BPDUs are received.

Trunk interfaces can be configured for PortFast.

The portfast trunk port immediately replaces the lost root port with an alternate root port.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which two statements about native VLANs are true? (Choose two.)

All outgoing traffic without a VLAN tag is tagged with the native VLAN.

All untagged traffic that arrives on the device is placed into the native VLAN.

The VLAN tag is stripped from all incoming traffic that matches the native VLAN.

They are propagated through VTP.

The default native VLAN is VLAN 11.

All incoming traffic that matches the native VLAN is dropped at the switch.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Refer to the exhibit. An engineer entered the no spanning-tree bpduguard enable on interface
Fa1/0/7 command. Which statement describes the effect of this command?
Interface Fa1/0/7 remains in err-disabled state until the shutdown/no shutdown command is
entered in the interface configuration mode.

Interface Fa1/0/7 returns to an up and operational state.

Interface Fa1/0/7 remains in err-disabled state until the spanning-tree portfast bpuguard
disable command is entered in the interface configuration mode.

Interface Fa1/0/7 remains in err-disabled state until the errdisable recovery bpduguard command is
entered in the interface configuration mode.

Interface Fa1/0/7 remains in err-disabled state until the errdisable recovery cause bpduguard command is
entered in the interface configuration mode.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 51
Which two TLVs are mandatory in LLDP advertisements? (Choose two.)

Platform TLV

System Capability TLV

Network Policy TLV

System Name TLV

Native VLAN TLV

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

Following are the LLDP TLV’s. Only System Capability TLV and System Name TLV are valid LLDP
TLV’s but they are optional, not mandatory. These are the two best answer choices based on the
alternatives, perhaps the question was meant to read “Which two TLVs are optional in LLDP
advertisements”

QUESTION 52
Refer to the output below. Which effect of this configuration is true?

Interface GigabitEthernet1/0
description to IT Room B 9745-173
switchport mode trunk
switchport trunk encapsulation dot1q

It enables tagging support for 1000 VLANs, including the native VLAN.

It enables tagging for up to 4096 VLANs, but tagging on the native VLAN is not supported.

It prevents the port from operating with VTP.

It enables a Cisco-proprietary trunking protocol.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 53

Which statement about the connection of two switches with several links using LACP link aggregation on IOS
is true?

By default, when an LACP channel is configured, the LACP channel mode is off.

By default, when an LACP channel is configured, the LACP channel mode is on

By default, when an LACP channel is configured, the LACP channel mode is active.

By default, when an LACP channel is configured, the LACP channel mode is passive.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which two statements about configuring a voice VLAN on a switch port are true? (Choose two.)

The port must be operating in untrusted mode.

Tagged traffic is not supported.

It must be configured separately from the VLAN that carries data traffic.

If the port is trusted, data traffic that passes through the Cisco IP Phone maintains its QoS values.

The port must be operating in trusted mode.

Cisco Discovery Protocol must be disabled on the switch port.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
Which statement about SPAN functionality for an EtherChannel group is true?
It can be configured as a SPAN source or a SPAN destination port.

It can be configured as a SPAN source but not as a SPAN destination port.

It can be configured as a SPAN destination but not as a SPAN source port.

It cannot be configured as a SPAN source or a SPAN destination port.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
How does the Spanning Tree Protocol determine path cost?

interface hop count

interface reliability

interface bandwidth

interface load

interface delay

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

If EtherChannel guard is configured on a device, which result happens when the device detects a
misconfiguration on a connected device?

Spanning tree is disabled for the VLANs associated with the EtherChannel.

The port generates a syslog message.

The EtherChannel configuration is removed from the running configuration of the device.

The port is error disabled.


Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Understanding EtherChannel Guard
You can use EtherChannel guard to detect an EtherChannel misconfiguration between the
switch and a connected device. A misconfiguration can occur if the switch interfaces are
configured in an EtherChannel, but the interfaces on the other device are not. A
misconfiguration can also occur if the channel parameters are not the same at both ends of
the EtherChannel. For EtherChannel configuration guidelines, see the “EtherChannel
Configuration Guidelines” section.

If the switch detects a misconfiguration on the other device, EtherChannel guard places the
switch interfaces in the error-disabled state, and displays an error message.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-
2_55_se/configuration/guide/3750xscg/ swstpopt.html

QUESTION 58
Which two options are benefits of using VSS for chassis virtualization? (Choose two.)

It supports GLBP to balance VSS traffic.

It provides multiple points of management for redundancy and improved support.

It uses a single database to manage configuration for multiple switches.

It provides a single point of management for improved efficiency.

It requires only one gateway per VLAN.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
Refer to the exhibit. Which two statements about the network environment are true? (Choose
two.)
UDLD aggressive mode put the interface into an error-disabled state.

After the error is corrected, the udld reset command recovers the disabled ports.

The UDLD mode changed from normal to aggressive when the error was detected.

The interface was error-disabled as the result of STP.

UDLD negotiation failed when the neighbor switch went offline.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60

What happens if an interface within channel group is configured as SPAN destination?

A. Portchannel will forward traffic to source SPAN.


It will not be operational.

The link will be in error-disable.

The interface will be removed from the channel group.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
EXHIBIT INCLUDED

A question about VRRP with an exhibit. Which switch becomes the master?

interface .....
ip address x.x.x.2 vrrp 1 priority 100

interface .....
ip address x.x.x.3 vrrp 1 priority 110

interface .....
ip address x.x.x.2 vrrp 1 priority 120

interface .....
ip address x.x.x.1 vrrp 1 priority 95

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which feature is new in RPVST+?

BackboneFast is implemented.

UplinkFast is implemented.

Only the root bridge sends configuration BPDUs.

All ports can generate and send BPDUs.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63

A question about AAA accounting features. (Choose two.)

authentication

authorization

connection

commands

system

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:
MCQs Dec 2018 - Contribute

QUESTION 1

Which type of device can act as a client in a system that uses TACACS+?

(Which device type can act as a client in a system that uses TACACS+?)

router

end user workstation

AD server

end user wireless device

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2

Which two requirements for dot1q trunking in IOS are true? (Choose two.)

The native VLAN must have the same number on each side of the link.

Spanning-tree PortFast must be enabled.

The encapsulation protocol must be the same on each end of the trunk.

MST must be running if extended VLANs are in use.

ISL must be enabled on the same link.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3

Which two statements about IP Source Guard are true? (Choose two.)
It is enabled automatically when DHCP snooping is enabled.

When it is first enabled, it blocks all IP packets except DHCP packets.

It works together with DHCP snooping to verify source IP packets.

When it is configured on a Layer 2 port channel, it is applied only to the port channel interface.

It must be enabled globally for all ports.

When it is first enabled, it allows all IP packets except DHCP packets.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/ipsrcgrd.html

QUESTION 4
Which command sets the interval at which a device sends LLDP updates to its neighbors?

lldp transmit

lldp timer

lldp holdtime

lldp tlv-select

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which statement is true when UDLD is configured on a link and the link is determined to be
unidirectional?

The port remains up for a configured time interval and then error disables if the link remains
unidirectional.

LLDP is enabled on the port.

The port sends a log message to the console.


D. The port is disabled immediately.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
Which command enables PortFast and disables port channel on a physical interface?

switchport host

switchport mode access

spanning-tree portfast

switchport mode dynamic auto

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7

Refer to the exhibit. You have applied this configuration to Switches A, B, C and D, and the
switches are connected to one another on access ports. Which two additional actions must you
take to enable the hosts on VLAN 3 to communicate with one another considering future growth
with hosts on additional VLANs? (Choose two.)

A. Assign VLAN 3 to the ports connecting to the hosts.


Reconfigure the access ports connecting the switches as trunk ports.

Configure VLAN 3 as an SVI with a working IP address.

Configure VTP transparent mode to allow hosts with additional VLANs.

Configure VLAN 3 in VLAN database mode.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
Refer to the exhibit. Which effect of this configuration is true?

Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.

Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.

Traffic sent on VLANs 10 and 12 is copied and sent to interface g0/1.

Traffic received on VLANs 10, 11 and 12 only is copied and sent to interface g0/1.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
How does SPAN interact with STP?

A designed SPAN source port maintains its STP learning status.

STP is disabled on a destination port when a SPAN monitor session is active.


STP is disabled on trunk ports carrying the SPAN VLAN.

Designated SPAN source ports direct traffic to the root bridge of STP.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10

Which errdisable recovery command option enables a device to recover from an EtherChannel error?

sfp-config-mismatch

security-violation

port-mode-failure

channel-misconfig

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11

Which errdisable recovery command option enables a device to recover from an incorrect SFP state?

sfp-config-mismatch

gbic-invalid

port-mode-failure

link-monitor-failure

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 12
Which two statements about VTP are true? (Choose two.)

Switches running in transparent mode pass VTP messages.

In VTPv2, a new switch can learn the VTP domain name from its peer over a trunk port.

It supports only one server switch within a network.

It supports clear-text passwords only.

A switch running in transparent mode saves learned VLANs to its local database.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13

Which command must an administrator use to determine the native VLAN on a trunk?

show ip interface vlan

show vlan

show vlan mapping

show interfaces trunk

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
Which two commands prune VLAN 10 from a switch interface? (Choose two.)
switchport trunk native vlan 10

switchport trunk allowed remove vlan 10

switchport trunk allowed vlan add 10

no vlan 10

switchport trunk allowed except vlan 10

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
Which two VLAN ranges can you add, modify, or delete on a switch? (Choose two.)

2 through 4094

2 through 1001

1 through 1001

1005 through 4094

1006 through 4094

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16

Which keyword must you use with the storm-control command to set both upper and lower thresholds for
unicast, multicast, and broadcast?

limit

pps

set
D. level

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17

You want a device to use the local user database if the TACACS+ server is unreachable. Which AAA login
authentication command must you configure?

aaa authentication login default group local tacacs+

aaa authentication login default group tacacs+ local

aaa authentication login default group local

aaa authentication login TACACS group tacacs+ local

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which information in a RADIUS access-request packet is encrypted?

entire header

username and password

entire payload

password

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 19
Which AAA authorization type applies security policies on a per-user basis?

EXEC

command

auto-proxy

network

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Method lists are specific to the authorization type requested:
Auth-proxy – Applies specific security policies on a per-user basis. For detailed information on
the authentication proxy feature, refer to the chapter “Configuring Authentication Proxy” in the
“Traffic Filtering and Firewalls” part of this book.
Commands – Applies to the EXEC mode commands a user issues. Command authorization
attempts authorization for all EXEC mode commands, including global configuration
commands, associated with a specific privilege level.
EXEC – Applies to the attributes associated with a user EXEC terminal session.
Network – Applies to network connections. This can include a PPP, SLIP, or ARAP connection.
Reverse Access – Applies to reverse Telnet sessions.

QUESTION 20
Which two accounting types does AAA support? (Choose two.)

connection

privilege

authorization

authentication

system

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 21
Which feature is enabled automatically when you configure HSRP on an interface?

HSRP preemption

ICMP redirect messages

HSRP tracking

IGMP snooping

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which statements describes the result of issuing the spanning-tree portfast trunk command under
interface configuration mode?

Trunk interface can be configured for portfast.

The portfast trunk port immediately replaces the lost root port with an alternative root port.

The port enters the errdisable state if BPDUs are received.

The port is allowed to go into the forwarding state immediately regardless of whether the interface is
configured as an access or trunk port.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

A network engineer configured an Ethernet switch using the following command. Which statement about the
spanning-tree portfast on the switch is true?

A. If an interface is enabled for portfast receives BPDU, the port shutdown immediately.
If an interface is enabled for portfast receives BPDU, the port does not go through the spanning-tree
listening, learning, and forwarding states.

If an interface is enabled for portfast receives BPDU, the port into the spanning-tree
inconsistent state.

If an interface is enabled for portfast receives BPDU, the port goes through the spanning-tree
listening, learning, and forwarding states.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which two statement about voice VLANs are true? (Choose two.)

The VLAN number must be in the range 2000 through 4096

They support static source MAC address

They require PortFast to be enabled manually on the interface

When they are enabled, all CoS values in incoming traffic are untrusted

They are disabled by default

When they are enabled, all untagged traffic is assigned a CoS of 5

Correct Answer: EF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
How many VLANs an be assigned to a user access port configured for VoIP?

unlimited

1
Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26

Which option is the values of the Tag Protocol Identifier for an 802.1Q tagged frame?

0X0806

0X88E

0X8100

0X0800

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Refer to the exhibit. A single server in company ABC is connected via EtherChannel to a single upstream
Layer 2 switch. Which EtherChannel load balancing methods on the switch make optimal use of the
redundant links as traffic flows from the router that is the default gateway to the server?

destination IP address

destination MAC address

source MAC address

source IP address

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Which type of attack can be mitigated by dynamic ARP inspection?

Trojan infiltration

worm infiltration
DDoS attacks

smurf attacks

viruses

man-in-the-middle attacks

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29

Which protocol is used to propagate voice VLANs to a Cisco phone?

DTMF

SKINNY

SIP

LLDP

Cisco Discovery Protocol

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and
switch 2 and receives an error message on switch 1. Which option corrects this error?

enabling BPDU guard on interface Fa0/23 of switch 2.

enabling BPDU guard on interface Fa0/23 of switch 1.

disabling BPDU guard on interface Fa0/23 of switch 2.

disabling BPDU guard on interface Fa0/23 of switch 1.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31

Refer to the exhibit. Which spanning-tree feature is configured on this interface?

The command spanning-tree mst1 vlan 10, 20, 30, 40 in the global configuration mode was
entered.

The command spanning-tree portfast trunk in the interface configuration mode was entered.

The command spanning-tree vlan 10, 20, 30, 40 root primary in the interface configuration
mode for faster convergence.

The command shut then a no shutdown in the interface configuration mode was entered.

The command spanning-tree portfast in the interface configuration mode was entered.
Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

When you connect an internal switch to an upstream provider switch, which feature is most appropriate to
implement to avoid potential broadcast storms?

BPDU ignore

BPDU guard

BPDU filter

loop guard

flex links

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which two statements about 802.1Q are true? (Choose two.)

The header is found within the Ethernet trailer.

Each frame contains a 12-byte VLAN identifier field.

When it is enabled, the minimum Ethernet frame size is 68 bytes.

It inserts a 4-bytes tag field to the Ethernet frame.

Trunking devices add an 8-byte VLAN tag to all VLAN packets.

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 34

Refer to the exhibit. If all switches in this environment are running PVSTP+, which switch is
elected as the STP root switch when a new VLAN is added to the network?

switch 5

switch 2

switch 4

switch 1

switch 3

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 35
Which two control protocols use the native VLAN 1 by default? (Choose two.)

CDP

VTP

NTP

LACP

STP

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

Which technology provides a multichassis IP connection between VSS-enabled switches and downstream
devices?

LAG

PAgP

MEC

ICCP

LACP

BFD

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Which two reasons to deploy UDLD on a switch are true? (Choose two.)
It can interact with Layer 1 mechanisms to monitor the status of physical links.

It can replace Cisco Discovery Protocol.

It can replace spanning tree.

It can prevent forwarding loops that result unidirectional links.

It can interact with Layer 2 mechanisms to monitor the status of physical links.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which option is a benefits of configuring UDLD on a link between two switches?

UDLD remove switching loops.

UDLD helps prevent switching loops.

UDLD determines the best switching path.

UDLD provides a backup mechanism for fiber.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39

If a switch that is configured globally with DHCP snooping receives a packet that has DHCP
Option-82 set to 192.168.1.254, how does the switch handle the packet?

It forwards the packet normally.

It removes the Option-82 information from the packet and forwards the packet.

It drops the packet.


It replaces the source MAC address of the packet with its own MAC address and forwards the
packet.

It replaces the source IP address of the packet with its own management IP address and forwards the packet.

It sends a proxy ARP request for the MAC address of 192.168.1.254.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40

Refer to the exhibit. Which path does PC1 take to reach DSW1?

PC1 goes from ALSW1 to DSW2 to reach DSW1.

PC1 goes from ALSW1 to DSW1.

PC1 goes from ALSW1 to ALSW2 to reach DSW1.

PC1 goes from ALSW1 to DSW2 to ALSW2 to reach DSW1.


E. PC1 goes from ALSW1 to DSW2 to CORE to reach DSW1.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

Refer to the exhibit. All switches are configured with the default port priority value. Which two
commands ensure that traffic from PC1 is forwarded over the Gi1/3 trunk port between DSW1
and DSW2? (Choose two.)

DSW1(config-if)# spanning-tree port-priority 0

DSW2(config)# interface gi1/3

DSW2(config-if)# spanning-tree port-priority 128

DSW1(config-if)# spanning-tree port-priority 16

DSW2(config-if)# spanning-tree port-priority 16

DSW1(config)# interface gi1/3


Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Which three feature of AAA with RADIUS are true? (Choose three.)

It encrypts the password for transmission.

It integrates authorization and authentication functions.

It separates authorization and authentication functions.

It encrypts the entire transmission.

It secures access to endpoint devices.

It secures access to network devices.

Correct Answer: ABF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 43

Which command do you enter on a device so that users are automatically placed in enable mode after
they authenticate with TACACS+?

aaa authorization exec default group tacacs+ if-authenticated

aaa authorization exec default group tacacs+ local-case

aaa authorization exec default group tacacs+ enable

aaa authentication exec default group tacacs+ if-authenticated

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:

QUESTION 44
Which two statements about recovering error-disabled interface are true? (Choose two.)

Reloading the switch recovers it from the error-disabled state.

If errdisable recovery is configured, the interface is recovered automatically when the root problem is
corrected.

Removing and reinserting network media recovers an interface from the error-disabled state.

errdisable recovery is enabled by default and operates normally without additional configuration.

The show errdisable recovery command displays the conditions for which autorecovery is enabled.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45

Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream
switch. Which EtherChannel load balancing method
on the switch makes optimal use of the redundant links as traffic flows from the routers to the
server?

source MAC address

source IP address

source and destination MAC address

destination MAC address

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46

If all devices on an EtherChannel are sending traffic to a single MAC address, which two methods
of load balancing on the EtherChannel are preferred? (Choose two.)

source-MAC

src-dst-MAC

destination-IP

destination-MAC

source-IP

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which two configuration requirements for port security are true? (Choose two.)

The port must be part of a trunk.

Port security must be enable at the port level.


Port security must be enabled at the global level.

The port must be SPAN port.

The port must be part of an EtherChannel bundle.

The port must be in access mode.

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
To which VLAN is a dynamic access port assigned by default?

None, until the VLAN membership of the port is discovered.

The native VLAN.

The same VLAN as the VLAN membership policy server.

VLAN 1, the default VLAN.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which two statements about TACACS+ are true? (Choose two.)

It is a Cisco-proprietary technology.

It support several less-common protocol in addition to IP.

It encrypts only the packet header.

It is more reliable than RADIUS because it communicates with UDP packets.

It is backwards-compatible with TACACS.

It combines accounting and authorization functions.


Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50

Which two commands must you use to configure an interface to send traffic from a non-default
native VLAN across a link that support all VLANs? (Choose two.)

switchport access vlan 1

switchport mode trunk

encapsulation dot1Q 90 native

switchport trunk native vlan 90

switchport access vlan 90

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
Which two commands configure RSPAN to capture incoming and outgoing traffic on a single
interface? (Choose two.)

monitor session 1 source interface gigabitethernet1/0/1 rx

monitor session 1 source interface gigabitethernet1/0/2 rx

monitor session 1 destination interface gigabitethernet1/0/2 rx

monitor session 1 destination remote vlan 910

monitor session 1 source interface gigabitethernet1/0/2 both

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52

Which two tasks must you perform to enable AAA operations with a remote security database? (Choose two.)

Configure Cisco Discovery Protocol on all interface used for authentication.

Configure user profiles on the remote security database.

Configure a user profile in the local database of each device to which the user will have access.

Configure network equipment to query the remote security database.

Configure SSH to provide remote access to network equipment.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which form of centralized device authentication allows each AAA feature to function separately?

local database

RADIUS

TACACS+

kerberos

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which Cisco technology provides network redundancy by combining two physical separate switches to a
single logical switch?

IPPC

PAGP

LACP

VSS

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55

Which command enables you to determine whether any interface on a device was shutdown as a result of a
port security violation?

show port-security

show errdisable detect

show interface err-disabled status

show port-security address

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
Which command displays the current SDM template?

show sdm prefer default

show sdm prefer

show sdm prefer layer-2

show sdm prefer routing


Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57

Which two commands display trunking information on one or more Ethernet interface? (Choose two.)

show interface switchport

show interface trunk

show interface

show interface summary

show interface brief

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
Which type of port can serve as a Cisco StackWise Virtual link?

any physical port

an uplink port only

a switched port only

a downlink port only

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 59
Which two statements about VRRP object tracking are true? (Choose two.)

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object.

VRRP can track the status of interfaces and routes.

The VRRP interface priority must be manually configured by the administrator.

VRRP support only interface tracking.

A VRRP group can track only one object at a time.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60

Which two statements about configuring VLANs on switches in VTP server mode are true? (Choose two.)

Switches in the same domain propagate their VLAN configurations over VTP.

Newly configured VLANs remain in the down state until they are manually enabled.

Devices in a topology without a router can communicate only with other devices on the same VLAN.

VLANs must be configured individually.

The first VLAN configured on a switch becomes the native VLAN.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
Which statement about local database device authentication is true?
It is most appropriate for authentication on a large network with many end users.

It can be used as a fallback authentication method when the connection to the remote network access
service fails.

It is primary used for authentication without usernames.

It supports the full functionally of the AAA accounting feature.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which command prevents all access ports on a switch from sending or receiving BPDUs?

spanning-tree portfast bpduguard default

spanning-tree bpdufilter default

spanning-tree bpdufilter enable

spanning-tree portfast bpdufilter default

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63
Which two statements about configuring EtherChannel are true? (Choose two.)

They can be configured to passively negotiate a channel with a connected peer.

They can be configured with the no switchport command to place them in Layer 3 mode.

They can be configured to load-balancing traffic based on Layer 7 information.

They can be configured to operate with up to 10 links in a single channel.

They can be configured to send Layer 2 packets.


Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
Which two statements about UDLD aggressive mode are true? (Choose two.)

UDLD attempts to re-establish a downed link one time before declaring the link down.

UDLD message are send every 15 seconds.

If a unidirectional link is detected, the port state is determined by spanning tree.

UDLD automatically chooses the messaging interval based on the configured timers.

The UDLD detection timer is four times the message interval by default.

If a unidirectional link is detected, the port state is changed to errdisable.

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65

Refer to the exhibit. Which router is elected as the VRRP virtual router master?

router D

router A

router B

router C
Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66

You are configured dynamic ARP inspection. Which command must you configure on the device to detect
unexpected IP addresses in the ARP packet?

ip are inspection validate ip

ip verify source

ip are inspection trust

ip are inspection vlan

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
Which two commands enable you to determine the native VLAN that is configured on an interface?
(Choose two.)

show interface status

show interfaces

show interface trunk

show running-config

show interface brief

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 68

In a Cisco StackWise Virtual environment, which planes on the component devices are virtually
combined in the common logical switch?

control and management only

control and data only

control, data, and management

management and data only

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
Which statement about Cisco StackWise is true?

When a new switch is added, the master switch suspends traffic forwarding until the new switch is updated
with the least running configuration.

The stack elects a master switch and a standby switch to support rapid failover.

The entire stack communicates using a single management IP address.

If a single interconnect cable in the stack fails, the stack can continue to operate at full bandwidth.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
In which EtherChannel mode does a port receive and respond to PAgP message without initiating
EtherChannel communication?

desirable

active
on

auto

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71
If all switches in a network have the same spanning-tree priority, which switch is elected as the
root bridge?

the switch with the highest physical interface IP address

the switch with the lowest MAC address

the switch with the lowest loopback interface IP address

the switch with the highest MAC address

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72

Which command configures all access ports on a switch to immediately enter the forwarding state when the
switch is reset?

spanning-tree portfast bpduguard default

spanning-tree portfast default

spanning-tree portfast

spanning-tree portfast bpdufilter default

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 73
Which three responses from a RADIUS server are valid? (Choose three.)

CHALLENGE

ACKNOWLEDGE

UPDATE PASSWORD

REJECT

ACCEPT

CONFIRM

Correct Answer: ADE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 74

When the switches in a Cisco StackWise stack elect a new master switch, which value is used as the
primary selector?

highest MAC address

highest administrator-assigned priority

lowest uptime

lowest MAC address

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 75

Which VTP mode must you configure on a VTP domain so that the switch with the highest VTP
configuration revision number in the domain propagates VLAN information to the other
switches?

server mode

transparent mode

off mode

client mode

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76
Which command disables spanning tree on multiple ports?

no spanning-tree mode rapid-pvst

no spanning-tree vlan <vlan_range>

no spanning-tree mode pvst

no spanning-tree mode mst

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
Which Cisco StackWise feature is supported?

using same software feature set on all members

using different SDM templates on each switch


using mixed software feature set on all members

using different versions of the Cisco IOS on each switch

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78

Which command configures an interface to accept LLDP packets without enabling the interface to send the
packet?

lldp transmit

lldp tlv-select

lldp receive

lldp run

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79
Which two commands display IP Source Guard bindings? (Choose two.)

show ip source binding

show ip dhcp binding

show ip verify source

show ip dhcp snooping database

show ip guard source

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80
Which two statements about RADIUS are true? (Choose two.)

It combines authentication and accounting functions.

It support several less-common protocols in addition to IP.

It is less secure than TACACS+ because it encrypts only the user name and password.

It uses UDP packets to communicate.

It combine authentication and authorization function.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 81

Which type of load balancing is most appropriate for an EtherChannel that passes traffic from multiple
sources to a single end device?

destination MAC address forwarding

source MAC address forwarding

source and destination IP address forwarding

destination IP address forwarding

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 82
Which command identifies the learned addresses in the MAC address table for a device?

show mac address-table static

show mac address-table multicast

show mac address-table dynamic

show mac address-table move update

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 83

Refer to the exhibit. You have applied these configuration to SwitchA,B,C, and D respectively,
and the switches are connected to one another on a trunk port that is passing all VLAN traffic.
Which statement about traffic on the network is true?
Unless a Layer 3 device is installed, host on any of the switches will be able to communicate only
with other hosts on the same switch.

Host on all four switches can communicate normally with one another over the trunk port.

Host on all four switches can communicate normally with one another on VLAN 10 only.

Unless a Layer 3 device is installed, host on the FastEthernet 0/1 interfae of switch D will be unable to
communicate with hosts on the other switches.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 84
In which UDLD mode does a link remain up, even when a unidirectional link failure is detected?

aggressive

enable

normal

reset

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 85
Which three features of AAA with TACACS+ are true? (Choose three.)

It secures access to network devices.

It encrypts the entire transmission.

It secures access to endpoint devices.

It encrypts the password for transmission.

It integrates authorization and authentication functions.

It separates authorization and authentication functions.


Correct Answer: ABF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 86
How does SPAN interact with STP?

Designated SPAN source ports direct traffic to the root bridge of STP.

STP is disabled on a destination port when a SPAN monitor session is active.

STP is disabled on trunk ports carrying the SPAN VLAN.

A designated SPAN source port maintains its STP learning status.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 87

Which two tasks must you perform to correctly configure IP Source Guard on a switch? (Choose two.)

Configure the DHCP snooping relay.

Enable DHCP snooping on the switch.

Enable DHCP packet validation on the device.

Configure the ip verify source vlan dhcp-snooping command.

Enable DHCP option 82.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 88

A network engineer is trying to prevent users from connecting unauthorized equipment to a


production network. Which feature can be implemented campus-wide to satisfy this requirement?

switchport block

UplinkFast

BPDU Guard

private VLANs

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 89
Which command sequence do you enter to configure an RSPAN VLAN?

vlan 51 name RSPAN

vlan 51 remote-span

vlan 4097 remote-span

vlan 4097 name RSPAN

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 90
In a Cisco StackWise Virtual environment, which planes on the component devices are virtually
combined in the common logical switch?
control and management only

control and data only

control, data, and management

management and data only

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
MCQs Jan-August 2019 - Contribute

QUESTION 1
How many tables in DHCP snooping database can bind?

(How many table in DHCP snooping database can bindings?)

1000

2000

4000

8000

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2

A question about an engineer request to set half of CDP transmission default time.

cdp timer 60

cdp timer 30

cdp hold time 30

cdp hold time 60

cdp timer 90

cdp hold time 90

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which feature puts the port into err-disabled state when the port has PortFast enabled and
receives BPDUs?

EtherChannel

BackBoneFast

BPDU guard

BPDU filtering

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
In which two cases does packets go through the virtual link? (Choose two.)

(In which case packets go through virtual link (2 ans)

When it is the ingress active router.

When it is the egress active router.

When it is the ingress standby router.

When it is the egress standby router.

When the Layer 2 traffic is overflow.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

The active and standby switches support local forwarding that will individually perform the
desired lookups and forward the traffic on local links to uplink neighbors. If the destination is
a remote switch in the StackWise Virtual domain, ingress processing is performed on the
ingress switch and then traffic is forwarded over the StackWise Virtual link to the egress
switch where only egress processing is performed.

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-
8/configuration_guide/ha/b_168_ha_9500_cg/
b_168_ha_9500_cg_chapter_011.html#concept_xbc_5xx_31b
QUESTION 5
What is the underlying technology used for EtherChannel guard?

STP

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6

Which three parameters in VTP advertisements are checked before being accepted and processed? (Choose
three.)

VLAN ID

password

VTP mode

switch name

revision number

management domain name

Correct Answer: BEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which statement about Stack is true?

(For stack what is true?)


Same IOS must be installed on all switches.

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
Which command set the interval for LLDP?

LLDP timer

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

Which command make the port PortFast and disable EtherChannel?

switchport host

spanning-tree portfast

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10
Which statement is about Rapid-PVST is true?

(Which about rapid-pvst is true?)

It is compatible with 802.1D.

It has uplinkfast feature configured automatically.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11

Which fallback mechanism will be used for authorization if the primary servers are inaccessible or give
errors?

none

TACACS+

RADIUS

enable

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 12
A question about what are RADIUS server responses. (Choose three.)

Accept

Reject

Challenge

Get Password

Cancel

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 13

Which err-disable recovery command option enables a device to recover from an incorrect SFP state?

sfp-config-mismatch

gbic-invalid

port-mode-failure

link-monitor-failure

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
In which mode UDLD detect link issues but does not take any action?

A. normal
aggressive

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
UDLD is a protocol that determine the physical status of a link...

It works with the Layer 1 mechanisms

It works with the Layer 2 mechanisms

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16

Which command is used to check what spanning tree guard features are configured on a switch?

show spanning-tree detail

show spanning-tree summary

show spanning-tree brief

show spanning-tree active

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
A question about how to turn on DHCP snooping. (Choose two.)

Enable globally.

Enable on the interface.

Enable DHCP option 82.

Enable dhcp snooping trust under the interface's configuration mode.

???

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
A question about VRRP. (Choose two.)

Can track only interface.

Can track interface and route.

VRRP group can only track one object at a time.

VRRP priority must be set manually.

???

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
QUESTION 19

You have added a new switch to a Cisco StackWise stack. If the previous master switch remains the
master switch after the master election, which action does the master take?

It checks the IOS and running configuration of the new switch and updates them if necessary to
match the other switches in the stack.

It removes any Layer 3 configuration on the new switch to maintain normal Layer 2 functionality on
the stack.

It suspends traffic forwarding until the new switch is updated with the current running
configuration of the stack.

It clears the MAC table of the stack and relearns the attached devices.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which two statements about MAC address learning are true? (Choose two.)

It can be disabled only on secure ports.

It can be disabled globally and then reactivated on selected VLANs.

It can be disabled only on nonmanagement interfaces.

The administrator must disable MAC address learning only on VLANs with exactly two ports.

It must be disabled on VLANs.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which command can you execute to check if EtherChannel guard is enabled?

A. show spanning-tree detail


show spanning-tree summary

???

???

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22

A question about how to enable DHCP snooping (no commands issued).

Enable globally.

Enable on specific VLAN.

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
A question about EtherChannel load balance.

source ip load balance

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
A question about HSRP misconfiguration where you get duplicate address error.

HSRP is misconfigured

STP loop

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
A question about how to check MAC addresses that are dynamically learnt.

use show mac-address table dynamic

use show mac-address table static

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26

Which command enables you to determine the spanning-tree guard features that are enabled globally?
show spanning-tree detail

show spanning-tree summary

show spanning-tree brief

show spanning-tree active

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which command informs you if root guard is enabled on the switch?

(What is the command which informs you if ”Root guard” is enabled in your switch?)

show spanning-tree

???

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
What is required for adding RADIUS on a switch? (Choose two.)

or

What is required about adding RADIUS server on a device? (Choose two.)


IP address

MAC address

Hostname

RADIUS AVP

CLGN something

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
A question about HSRP identifier at data link layer?

MAC address

virtual IP address

standby group

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30

A question about loop-inconsistent, and was asked what config setting resulted in this.

BPDU guard

BPDU filter

root guard

loop guard

???
F. ???

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
What does GLBP use to communicate with its neighbour nodes?

MAC address

IP address

???

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

Which two commands enable you to determine the native VLAN that is configured on an interface?

show interface status

show interfaces

show interface trunk

show interfaces switchport

show interface brief

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 33
A question about configuring VLAN 10 root bridge with spanning-tree switch priority. (Choose
two.)

EXHIBIT INCLUDED

spanning-tree vlan 10 root primary

spanning-tree vlan 10 priority 4096

???

???

???

???

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
A question asking how the traffic can be pushed to go through the link Gi1/3 (on
EtherChannel) between DSW1 and DSW2.

EXHIBIT INCLUDED

Changing spanning-tree port priority settings only either on DSW1 Gi1/3 or DSW2 Gi1/3 with port priority
numbers such as 0, 16, 128.

Initially all the port priority numbers are default.

It should go to the root switch via Gi0/2 link since it is a direct gigabit connection.

???

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 35
A question about which services AAA RADIUS combined.

authentication and authorization

authentication and accounting

authorization and accounting

???

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36

Which two commands configure SPAN to monitor outgoing traffic across multiple interfaces? (Choose
two.)

monitor session 1 destination interface gigabitethernet1/0/2 rx

monitor session 1 source vlan 10 - 20 tx

monitor session 1 destination interface gigabitethernet1/0/2

monitor session 1 source interface gigabitethernet1/0/1 tx

monitor session 1 source interface gigabitethernet1/0/1 rx

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Which two values do you configure on a switch to authenticate a RADIUS server? (Choose
two.)
(which 2 values do you configure on sw to authenticate a radius srv)

RADIUS AVP

IP

CLNS

MAC

Host Name

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which command removes all MAC addresses from port channel?

(which command removes all Mac @ from Port Channel)

clear mac-address table dynamic

clear mac-address table dynamic address mac address

clear mac-address table dynamic interface interface-id

clear mac-address table dynamic vlan vlan-id

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
How is AAA accounting feature used with RADIUS?

A. It is coupled with authorization feature to identify the feature on a network device to which the user
has access.
It is coupled with authentication feature to determine whether the user can access a device on the
network.

It is a BD that contain user of all users allowed to access the network.

It tracks an individual’s usage of network resources.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
Refer to the output below.

Which effect of this configuration is true?

It enables tagging support for 1000 VLANs, including the native VLAN.

It enables a Cisco-proprietary trunking protocol.

It prevents the port from operating with VTP.

It enables tagging for up to 4096 VLANs, but tagging on the native VLAN is not supported.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41

Which two commands configure SPAN to monitor incoming traffic across multiple interfaces? (Choose
two.)
monitor session 1 destination interface gigabitethernet1/0/2

monitor session 3 source vlan 10 - 20 tx

monitor session 3 destination interface gigabitethernet 1/0/2

monitor session 1 source interface gigabitethernet1/0/1

monitor session 3 source vlan 10 – 20 rx

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
What are two advantages of LLDP over Cisco Discovery Protocol? (Choose two.)

LLDP supports Frame Relay.

LLDP supports ATM.

LLDP is vendor-agnostic.

LLDP supports checksums.

LLDP supports topology-change notification.

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 43

You are configuring Layer 2 EtherChannel, and you want a PAgP port channel to come up only if
the device on the other end is sending negotiations. Which keyword must you see?

desirable

auto

active
D. on

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Which statement about EtherChannels are true?

Ports in on mode accept PAgP requests.

A port in auto mode can form an EtherChannel with another port in auto mode.

Ports in on mode accept LACP requests.

PAgP is a Cisco-proprietary technology.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45

You are configuring an interface, and you want to enable Layer 3 mode on an EtherChannel. Which task
must you perform?

Issue the no switchport command

Set the channel group to desirable

Set the channel group to active

Issue the ip address command

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
MCQs August 2019 - Contribute

QUESTION 1

You are configuring dynamic ARP inspection. Which command must you configure on the device to
detect unexpected IP addresses in the ARP packet?

ip verify source

ip arp inspection validate ip

ip arp inspection trust

ip arp inspection vlan

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
Which two statements about configuring EtherChannels are true? (Choose two.)

They can be configured with the no switchport command to place them in Layer 3 mode.

They can be configured to send Layer 2 packets.

They can be configured to operate with up to links in a single channel.

They can be configured to passively negotiate a channel with a connected peer.

They can be configured to load-balance traffic based on Layer 7 information.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
In which EtherChannel mode does a port receive and respond to PAgP messages without
initiating EtherChannel communication?
on

auto

active

desirable

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which two commands displays IP Source Guard bindings? (Choose two.)

show ip verify source

show ip source binding

show ip dhcp snooping database

show ip guard source

show ip dhcp binding

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5

Which command enables you to determine whether any interface on a device was shut down as a result
of a port security violation?

show interface err-disabled status

show port-security address

show errdisable detect

show port-security
Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6

Which two commands display trunking information on one or more Ethernet interfaces? (Choose two.)

show interface switchport

show interfaces

show interface brief

show interface trunk

show interfaces summary

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which two tasks must you perform to configure DHCP snooping on a device? (Choose two.)

Enable DHCP packet validation on the device

Enable DHCP option 82

Enable DHCP snooping on the VLAN

Enable DHCP snooping globally

Enable VRF support for the DHCP relay agent

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 8
Which two configuration requirements for port security are true? (Choose two.)

Port security must be enabled at the global level

Port security must be enabled at the port level

The port must be part of a trunk

The port must be a SPAN port

The port must be part of an EtherChannel bundle

The port must be in access mode

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9

What Cisco Catalyst switch feature is designed to inspect ARP packets and mitigate ARP spoofing
attacks?

DHCP snppoing

port security

802.1x

DAI

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10

Which PVLAN port types can send frames through a switch to community and promiscuous ports? (Choose
two.)
public

private

isolated

community

promiscuous

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11

What command should be used to view the private VLANs configured on ports and the private VLAN
mappings?

show vlan brief

show pvlan

show interfaces switchport

show mac-address-table

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Which PVLAN port type can only send frames to promiscuous ports?

private

promiscuous

isolated

community
E. public

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 13

You are troubleshooting a problem with two routers configured in a HSRP group. You intended to
configure the routers so that Router A and Router B would each track their respective Fa0/1 interfaces
and decrement their priorities for several VLAN groups if the tracked interface went down. However, you
find that Router A is not taking over as the active device for the HSRP group on VLAN 101 when the
Fa0/1 interface on Router B fails.

Which command would NOT be useful for discovering the problem?

show running-configuration

show vlans

show standby brief

show standby

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
How is load balancing achieved when implementing HSRP?

By configuring multiple gateways on the routers

By using multiple HSRP groups

By configuring the same priority on all HSRP group members

By configuring multiple virtual router addresses

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
In which HSRP state is the router a candidate to become the next active router for the group?

Learn

Backup

Listen

Initial

Standby

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16

What command should you use to quickly view the HSRP state of the switch for all HSRP groups of
which the switch is a member?

switch# show standby brief

switch# show ip interface brief

switch# show hsrp

switch# show standby

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 17

Which of the following sets of commands CANNOT be included in the plan to implement HSRP on a
Layer 3 switch port?

interface port-channel no switchport

interface fastethernet no switchportip address

interface fastethernet switchport mode access

interface vlan
ip address

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Which statement best describes the interaction between a workstation and an HSRP virtual
router?

The workstation must have the real IP address of one of the HSRP routers defined as its
default gateway.

The workstation must support IRDP in order to switch to the alternate router in an HSRP
group.

The active HSRP router replies to the workstation's ARP request with the virtual router's MAC
address.

The workstation sends packets to the active router's real MAC address.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
Which load-balancing algorithm does GLBP use by default?
Random load-balancing

Weighted load-balancing

Round-robin load-balancing

Host-dependent load-balancing

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which statement best describes the function of Hot Standby Router Protocol (HSRP)?

HSRP specifies a single IP address that all routers in the group must use.

HSRP defines a set of routers that represent one virtual, fault-tolerant router.

HSRP provides a round-robin gateway selection process to increase fault tolerance.

HSRP defines a frame-tagging scheme that allows end stations to use any router as a gateway.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21

Which protocol allows the network to fully use standby routers in a redundancy group without additional
administrative burden?

HSRP

VRRP

GLBP

IRDP

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
Which Catalyst 6500 feature provides network-security enforcement based on Layer 2, Layer 3,
and Layer 4 information on a VLAN?

NAM

SPAN

VACL

802.1X

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23

Which IOS commands do you enter in interface configuration mode to configure a switch port
to actively negotiate to be an ISL trunk port if possible? (Choose two.)

switchport trunk isl

switchport mode dynamic auto

switchport trunk allowed vlan

switchport mode dynamic desirable

switchport trunk encapsulation isl

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 24

When provisioning bandwidth for an IP telephony network, which elements are unique to an IP telephony
call? (Choose two.)

voice stream

IGMP packets

call-control signaling

routing protocol packets

speed of the segment to the telephone

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
By default, which VLAN is the Cisco management VLAN?

1001

1005

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
Which are valid configurable VLAN ID numbers for 802.1Q networks?

A. 0-1005
1-4094

0-4095

1-1001

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
You must add a new switch to the existing network using VTP to maintain the VLAN databases.

Which mode should be configured on this switch so that VLANs can be separately maintained on this
switch?

None

Client

Server

Transparent

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28
Which parameters are found in VTP advertisements? (Choose three.)

Password

VTP mode

IP address

Switch name

Revision number
F. Management domain name

Correct Answer: AEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 29

Which of the following statements best describes the purpose of ARP with respect to CEF?

ARP is used to build the FIB.

ARP is used to reindex the routing table.

ARP is used to build the adjacency table.

ARP is used to decrease the amount of time spent searching for an entry within a routing table.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
Which characteristics apply to multilayer switching? (Choose three.)

Uses CPU-based packet forwarding

Performs collision detection

Provides isolation of the collision domain

Provides Network-layer and Transport-layer access controls

Determines the forwarding path based on the Network layer address

Correct Answer: CDE


Section: (none)
Explanation
Explanation/Reference:

QUESTION 31
What Cisco switch feature allows IP phones to be automatically placed into a separate VLAN from
data traffic?

marking

AutoQoS

private VLANs

auxiliary VLANs

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32

Which IOS commands should you enter in interface configuration mode to configure a switch port as an
access port and assign it to VLAN 25? (Choose two.)

trunk on

switchport mode access

vlan-membership static 25

switchport access vlan 25

switchport vlan 25

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which two tables are used by Cisco Express Forwarding? (Choose two.)
FIB

ACL table

Routing table

MAC address table

Adjacency table

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34

What is the first step STP performs to establish a loop-free spanning tree in a switched network?

Elects a root switch

Disables redundant loops in the tree

Sets a priority for each redundant link

Selects a designated switch for each switched segment

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
A question about to use vendor-specific attributes.

RADIUS

???

???

???
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
What feature examines BPDU and let STP transit status?

(or Which feature examines BPDU and let STP transit status?)

BPDU guard

BPDU filter

root guard

loop guard

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37

Which two need to be configured at system level? (Choose two.)

VLAN

port security

802.1x

SNMP

???

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:

S-ar putea să vă placă și