CCNP Switch 5

Description

300-115 40 questions
Tyson Mckay
Quiz by Tyson Mckay, updated more than 1 year ago
Tyson Mckay
Created by Tyson Mckay almost 7 years ago
11
0
1 2 3 4 5 (0)

Resource summary

Question 1

Question
F1/0 and F1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport F1/1 as a primary port?
Answer
  • Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16
  • Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0
  • Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16
  • Modify the spanning-tree port-priority on SW2 f1/1 to 16 and f1/0 to 0

Question 2

Question
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?
Answer
  • ip dhcp snooping trust
  • ip dhcp trust
  • ip dhcp snooping information
  • ip dhcp snooping

Question 3

Question
Which will identify the master switch in stackwise?
Answer
  • The switch with the lower priority stack member priority value
  • The switch that is currently the stack master
  • The switch with the highest stack member priority value
  • The switch that uses the non-default interface-level configuration

Question 4

Question
Which option is the most likely explanation of the duplicate address message logged?
Answer
  • HSRP misconfiguration
  • A PC with IP of 10.10.1.1
  • spanning-tree loop
  • A hardware problem

Question 5

Question
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts towards the promiscuous ports and the gateway?
Answer
  • primary VLAN
  • community VLAN
  • isolated VLAN
  • promiscuous VLAN

Question 6

Question
A network engineer configures port security and 802.1x on the same interface. Which option describes what this configuration allows?
Answer
  • It allows port security to secure the IP address that 802.1x authenticates
  • It allows 802.1x to secure the IP address that port security authenticates
  • It allows 802.1x to secure the MAC address that port security authenticates
  • It allows port security to secure the MAC address that 802.1x authenticates

Question 7

Question
Which technique allows specific VLANs to be strictly permitted by the administrator?
Answer
  • trunk allowed VLANs
  • transparent bridging
  • L2P tunneling
  • VLAN access-list
  • VTP pruning

Question 8

Question
What happens when a spoofed packet or an UN-trusted packet is detected? Choose Three
Answer
  • It is accepted
  • It is deleted
  • It is logged
  • It is intercepted
  • It is discarded

Question 9

Question
When you design a switched network using VTPv2 how many VLANs can be used to carry user traffic?
Answer
  • 1001
  • 1024
  • 4096
  • 1000
  • 4095
  • 2048

Question 10

Question
After an EtherChannel is configured between two Cisco switches, interface port channel 1 is in the down/down state. Switch A is configured with channel-group 1 mode active, while switch B is configured with channel-group 1 mode desirable. Why is the EtherChannel bundle not working?
Answer
  • The channel group identifier must be different for Switch A and Switch B.
  • The switches are using mismatched EtherChannel negotiation modes.
  • The switch ports are not configured in trunking mode
  • LACP priority must be configured on both switches.

Question 11

Question
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the IP verify source port-security command is configured under the interfaces that connect all DHCP clients on the switch. However, clients are not receiving and IP address via the DHCP server. Which option is the cause of this issue?
Answer
  • The DHCP client interfaces have storm control configured.
  • The DHCP server does not support information option 82.
  • DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address allocation.
  • Static DHCP bindings are not configured on the switch.

Question 12

Question
A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?
Answer
  • No configuration must be added
  • stack ID
  • VLAN information
  • IP address
  • VTP information

Question 13

Question
What percentage of bandwidth is reduced when a stack cable is broken?
Answer
  • 0
  • 25
  • 100
  • 50
  • 75

Question 14

Question
Which statement about restrictions for multi-chassis LACP is true?
Answer
  • It is available on only a Cisco Catalyst 6500 series chassis.
  • It does not support 1 Gb links.
  • Converting a port channel to mLACP can cause a service disruption.
  • It is not available in VSS.

Question 15

Question
Why would the switch be considered as a root bridge?
Answer
  • The bridge priority is 1 and all ports are forwarding
  • The switch priority for VLAN 1 and the macro specifies "This Bridge is the root"
  • The bridge priority is 128.19 and all ports are forwarding
  • The switch priority is zero, it has the lowest priority value for VLAN 1

Question 16

Question
%GLBP-4-DUPADDR: Duplicate Address Which option describes the reason for this message in a GLBP configuration?
Answer
  • Layer 2 loop
  • HSRP configured on the same interface as GLBP
  • Incorrect GLBP IP address
  • Unavailable GLBP active forwarder

Question 17

Question
Which type of information does the DHCP snooping binding database contain?
Answer
  • Untrusted hosts with available IP addresses
  • Trusted host with leased IP addresses
  • Trusted host with available IP addresses
  • Untrusted host with leased IP addresses

Question 18

Question
Which statement about the use of PagP link aggregation on a Cisco switch is true?
Answer
  • PAgP modes are active, desirable, and on. Only the combinations active-desirable, desirable-desirable, and on-on allow the formation of a channel.
  • PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on allow the formation of a channel.
  • PAgP modes are active, desirable, and on. Only the combinations active-active, desirable-desirable, and on-on allow the formation of a channel.
  • PAgP modes are off, active, desirable, and on. Only the combinations auto-auto, desirable-desirable, and on-on allow the formation of a channel.

Question 19

Question
If GiE1/0/1 on DSW2 is shutdown, what will be the resulting priority value of the VLAN 105 HSRP group on router DSW2?
Answer
  • 150
  • 90
  • 100
  • 200

Question 20

Question
While doing network discovery using CDP, it is found that rapid error tracking is not currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms using CDP?
Answer
  • CDP version 2
  • logging buffering
  • Cisco IOS Embedded Event Manager
  • CDP logging options
  • CDP source interface

Question 21

Question
In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded?
Answer
  • 180 seconds
  • 300 seconds
  • 100 seconds
  • 600 seconds

Question 22

Question
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to SW4. Which of the following configuration steps will allow creating private VLANs?
Answer
  • Disable VTP pruning on SW1 only
  • Disable VTP pruning on SW4 only
  • Disable VTP pruning on SW2, SW4 and New_Switch
  • Disable VTP pruning on SW4 and New_Switch
  • Disable VTP pruning on SW2

Question 23

Question
When port security is configured on a switch which violation mode is the default?
Answer
  • shutdown
  • error-disable
  • no change
  • log

Question 24

Question
On DSW2 what will be the priority of HSRP group if link Gi1/0/1 goes down? Configuration sw(config)# interface VLAN 105 sw(config-if)#ip address 192.168.105.2 255.255.255.0 sw(config-if)#standby ip 192.168.105.254 sw(config-if)#standby 5 preempt sw(config-if)#standby 5 track GiE1/0/1
Answer
  • Default priority 100, default track int decrement 10=90
  • Don't choose this answer

Question 25

Question
When a Cisco Catalyst switch that is configured in VTP mode is first booted, which two VLAN ranges are loaded on the switch?
Answer
  • VLANs greater than 1005 in the VLAN database file
  • The first 1005 VLANs in the startup-config file
  • All VLANs are in the VLAN database
  • The first 1005 VLANs in the VLAN database file
  • VLANs greater than 1005 in the startup-config file

Question 26

Question
What is the configuration for STP EtherChannel misconfig?
Answer
  • Spanning tree portfast feature must be disabled per interface
  • (config)#spanning-tree etherchannel guard misconfig global configuration
  • these are not the droids you are looking for
  • (config-if)#spanning-tree etherchannel guard misconfig

Question 27

Question
Which FHRP is an IEEE standard?
Answer
  • OSPF
  • HSRP
  • GLBP
  • VRRP

Question 28

Question
The network manager has requested that several new VLANs (VLAN 10, 20, 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
Answer
  • VTP pruning removed all unused VLANs
  • ISL was unable to encapsulate more than the already permitted VLANs across the trunk
  • Allowing additional VLANs across the trunk introduced a loop in the network
  • The command effectively removed all other working VLANs and replaced them with the new VLANs

Question 29

Question
Which statement describes what happens if all VSL connections between the virtual switch members are lost?
Answer
  • Both virtual switch members cease to forward traffic
  • The VSS transitions to the dual active recovery mode and both virtual switch members continue to forward traffic independently.
  • The virtual switch members reload.
  • The VSS transitions to the dual active recover mode and only the new virtual switch continues to forward traffic.

Question 30

Question
A network engineer is installing a switch for temporary workers to connect to. The engineer does not want this switch participating in spanning tree with the rest of the network, however, end users connectivity is still required. Which spanning-tree feature accomplishes this?
Answer
  • BPDUdisable
  • BPDUignore
  • BPDUguard
  • BPDUblock
  • BPDUfilter

Question 31

Question
Which statement about the UDLD protocol is true?
Answer
  • UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
  • UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.
  • UDLD is a standardized Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
  • UDLD is a standardized Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.

Question 32

Question
What is the default amount by which the hot standby priority for the router is decremented or incremented when the interface goes down or comes back up?
Answer
  • 1
  • 10
  • 5
  • 15

Question 33

Question
What is the maximum number of switches that can be stacked using Cisco Stackwise?
Answer
  • 4
  • 10
  • 5
  • 13
  • 9

Question 34

Question
Which statement describes what happens when a switch enters dual active recovery mode?
Answer
  • The switch shuts down and waits for the VSL link to be restored before sending traffic.
  • All interfaces are shut down in the formerly active virtual switch member but the new active virtual switch forwards traffic on all links.
  • The switch continues to forward traffic out all links and enables spanning tree on VSL links and all other links to prevent loops.
  • The VSS detects which system was last in active state and shuts down the other switch.

Question 35

Question
An engineer is configuring an EtherChannel between two switches using PAgP. If the EtherChannel mode on switch 1 is configured to auto, which modes on switch 2 establish and operational EtherChannel?
Answer
  • active
  • auto
  • on
  • desirable
  • passive

Question 36

Question
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?
Answer
  • Verify the source MAC address of all untrusted interfaces with "ip dhcp snooping verify mac-address" command.
  • Trust the interface that is connected to the sever with the "ip dhcp snooping trust" command.
  • Disable DHCP snooping information option.
  • Configure a static DHCP snooping binding entry on the switch.

Question 37

Question
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?
Answer
  • (config)#aaa authentication login default local radius
  • (config)#aaa authentication login radius local
  • (config)#aaa authentication login default radius local
  • (config)#aaa authentication login login radius local

Question 38

Question
When EtherChannel guard is enabled and a misconfiguration is detected on a port, how does the port respond?
Answer
  • It enters the channel-error state
  • It enters the errdisable state
  • It enters the shutdown state
  • The port remains up but it is unable to pass traffic
  • The port state remains unchanged but the EtherChannel stays down

Question 39

Question
Enablement of which features puts the port into err-disable state when the port has portfast enabled and it receives BPDUs?
Answer
  • BPDU filtering
  • BackboneFast
  • EtherChannel
  • BPDU guard

Question 40

Question
For client server failover puposes the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning-tree feature satisfies this requirement?
Answer
  • spanning-tree fastport
  • spanning-tree fast forward
  • spanning-tree portfast
  • rapid spanning-tree
  • spanning-tree timers

Question 41

Question
How can the traffic that is mirrored out the GiE0/48 port be limited to only traffic that is received or transmitted in VLAN 10 on the GiE0/1 port?
Answer
  • Change the monitor session source VLAN 10 instead of the physical interface
  • Add an access list to GiE0/48 to filter out traffic that is not in VLAN 10
  • Apply the monitor session filter globally to allow only traffic from VLAN 10
  • Change the configuration for GiE0/48 so that it is a member of VLAN 10
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Practice For First Certificate Grammar I
Alice McClean
Ebola Virus Disease
rubyduggan
AQA - English Language Unit 1
Alice Love
GCSE AQA Biology 2 Enzymes, Digestion & Enzyme Uses
Lilac Potato
Crime and Punishment Flashcards - Edexcel GCSE Religious Studies Unit 8
nicolalennon12
AS Biology Unit 1
lilli.atkin
Electrolysis
lisawinkler10
Topic 1 Quiz - Elements & The Periodic Table
Musicdudejoe
GCSE History – Social Impact of the Nazi State in 1945
Ben C
Salesforce Admin 201 Exam Chunk 6 (156-179)
Brianne Wright