Question 1
Question
F1/0 and F1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport F1/1 as a primary port?
Answer
-
Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16
-
Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0
-
Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16
-
Modify the spanning-tree port-priority on SW2 f1/1 to 16 and f1/0 to 0
Question 2
Question
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?
Question 3
Question
Which will identify the master switch in stackwise?
Answer
-
The switch with the lower priority stack member priority value
-
The switch that is currently the stack master
-
The switch with the highest stack member priority value
-
The switch that uses the non-default interface-level configuration
Question 4
Question
Which option is the most likely explanation of the duplicate address message logged?
Question 5
Question
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts towards the promiscuous ports and the gateway?
Answer
-
primary VLAN
-
community VLAN
-
isolated VLAN
-
promiscuous VLAN
Question 6
Question
A network engineer configures port security and 802.1x on the same interface. Which option describes what this configuration allows?
Answer
-
It allows port security to secure the IP address that 802.1x authenticates
-
It allows 802.1x to secure the IP address that port security authenticates
-
It allows 802.1x to secure the MAC address that port security authenticates
-
It allows port security to secure the MAC address that 802.1x authenticates
Question 7
Question
Which technique allows specific VLANs to be strictly permitted by the administrator?
Answer
-
trunk allowed VLANs
-
transparent bridging
-
L2P tunneling
-
VLAN access-list
-
VTP pruning
Question 8
Question
What happens when a spoofed packet or an UN-trusted packet is detected? Choose Three
Answer
-
It is accepted
-
It is deleted
-
It is logged
-
It is intercepted
-
It is discarded
Question 9
Question
When you design a switched network using VTPv2 how many VLANs can be used to carry user traffic?
Answer
-
1001
-
1024
-
4096
-
1000
-
4095
-
2048
Question 10
Question
After an EtherChannel is configured between two Cisco switches, interface port channel 1 is in the down/down state. Switch A is configured with channel-group 1 mode active, while switch B is configured with channel-group 1 mode desirable. Why is the EtherChannel bundle not working?
Answer
-
The channel group identifier must be different for Switch A and Switch B.
-
The switches are using mismatched EtherChannel negotiation modes.
-
The switch ports are not configured in trunking mode
-
LACP priority must be configured on both switches.
Question 11
Question
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the IP verify source port-security command is configured under the interfaces that connect all DHCP clients on the switch. However, clients are not receiving and IP address via the DHCP server. Which option is the cause of this issue?
Answer
-
The DHCP client interfaces have storm control configured.
-
The DHCP server does not support information option 82.
-
DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address allocation.
-
Static DHCP bindings are not configured on the switch.
Question 12
Question
A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?
Question 13
Question
What percentage of bandwidth is reduced when a stack cable is broken?
Question 14
Question
Which statement about restrictions for multi-chassis LACP is true?
Answer
-
It is available on only a Cisco Catalyst 6500 series chassis.
-
It does not support 1 Gb links.
-
Converting a port channel to mLACP can cause a service disruption.
-
It is not available in VSS.
Question 15
Question
Why would the switch be considered as a root bridge?
Answer
-
The bridge priority is 1 and all ports are forwarding
-
The switch priority for VLAN 1 and the macro specifies "This Bridge is the root"
-
The bridge priority is 128.19 and all ports are forwarding
-
The switch priority is zero, it has the lowest priority value for VLAN 1
Question 16
Question
%GLBP-4-DUPADDR: Duplicate Address
Which option describes the reason for this message in a GLBP configuration?
Answer
-
Layer 2 loop
-
HSRP configured on the same interface as GLBP
-
Incorrect GLBP IP address
-
Unavailable GLBP active forwarder
Question 17
Question
Which type of information does the DHCP snooping binding database contain?
Answer
-
Untrusted hosts with available IP addresses
-
Trusted host with leased IP addresses
-
Trusted host with available IP addresses
-
Untrusted host with leased IP addresses
Question 18
Question
Which statement about the use of PagP link aggregation on a Cisco switch is true?
Answer
-
PAgP modes are active, desirable, and on. Only the combinations active-desirable, desirable-desirable, and on-on allow the formation of a channel.
-
PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on allow the formation of a channel.
-
PAgP modes are active, desirable, and on. Only the combinations active-active, desirable-desirable, and on-on allow the formation of a channel.
-
PAgP modes are off, active, desirable, and on. Only the combinations auto-auto, desirable-desirable, and on-on allow the formation of a channel.
Question 19
Question
If GiE1/0/1 on DSW2 is shutdown, what will be the resulting priority value of the VLAN 105 HSRP group on router DSW2?
Question 20
Question
While doing network discovery using CDP, it is found that rapid error tracking is not currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms using CDP?
Question 21
Question
In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded?
Answer
-
180 seconds
-
300 seconds
-
100 seconds
-
600 seconds
Question 22
Question
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to SW4. Which of the following configuration steps will allow creating private VLANs?
Answer
-
Disable VTP pruning on SW1 only
-
Disable VTP pruning on SW4 only
-
Disable VTP pruning on SW2, SW4 and New_Switch
-
Disable VTP pruning on SW4 and New_Switch
-
Disable VTP pruning on SW2
Question 23
Question
When port security is configured on a switch which violation mode is the default?
Answer
-
shutdown
-
error-disable
-
no change
-
log
Question 24
Question
On DSW2 what will be the priority of HSRP group if link Gi1/0/1 goes down?
Configuration
sw(config)# interface VLAN 105
sw(config-if)#ip address 192.168.105.2 255.255.255.0
sw(config-if)#standby ip 192.168.105.254
sw(config-if)#standby 5 preempt
sw(config-if)#standby 5 track GiE1/0/1
Question 25
Question
When a Cisco Catalyst switch that is configured in VTP mode is first booted, which two VLAN ranges are loaded on the switch?
Answer
-
VLANs greater than 1005 in the VLAN database file
-
The first 1005 VLANs in the startup-config file
-
All VLANs are in the VLAN database
-
The first 1005 VLANs in the VLAN database file
-
VLANs greater than 1005 in the startup-config file
Question 26
Question
What is the configuration for STP EtherChannel misconfig?
Answer
-
Spanning tree portfast feature must be disabled per interface
-
(config)#spanning-tree etherchannel guard misconfig global configuration
-
these are not the droids you are looking for
-
(config-if)#spanning-tree etherchannel guard misconfig
Question 27
Question
Which FHRP is an IEEE standard?
Question 28
Question
The network manager has requested that several new VLANs (VLAN 10, 20, 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
Answer
-
VTP pruning removed all unused VLANs
-
ISL was unable to encapsulate more than the already permitted VLANs across the trunk
-
Allowing additional VLANs across the trunk introduced a loop in the network
-
The command effectively removed all other working VLANs and replaced them with the new VLANs
Question 29
Question
Which statement describes what happens if all VSL connections between the virtual switch members are lost?
Answer
-
Both virtual switch members cease to forward traffic
-
The VSS transitions to the dual active recovery mode and both virtual switch members continue to forward traffic independently.
-
The virtual switch members reload.
-
The VSS transitions to the dual active recover mode and only the new virtual switch continues to forward traffic.
Question 30
Question
A network engineer is installing a switch for temporary workers to connect to. The engineer does not want this switch participating in spanning tree with the rest of the network, however, end users connectivity is still required. Which spanning-tree feature accomplishes this?
Answer
-
BPDUdisable
-
BPDUignore
-
BPDUguard
-
BPDUblock
-
BPDUfilter
Question 31
Question
Which statement about the UDLD protocol is true?
Answer
-
UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
-
UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.
-
UDLD is a standardized Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
-
UDLD is a standardized Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.
Question 32
Question
What is the default amount by which the hot standby priority for the router is decremented or incremented when the interface goes down or comes back up?
Question 33
Question
What is the maximum number of switches that can be stacked using Cisco Stackwise?
Question 34
Question
Which statement describes what happens when a switch enters dual active recovery mode?
Answer
-
The switch shuts down and waits for the VSL link to be restored before sending traffic.
-
All interfaces are shut down in the formerly active virtual switch member but the new active virtual switch forwards traffic on all links.
-
The switch continues to forward traffic out all links and enables spanning tree on VSL links and all other links to prevent loops.
-
The VSS detects which system was last in active state and shuts down the other switch.
Question 35
Question
An engineer is configuring an EtherChannel between two switches using PAgP. If the EtherChannel mode on switch 1 is configured to auto, which modes on switch 2 establish and operational EtherChannel?
Answer
-
active
-
auto
-
on
-
desirable
-
passive
Question 36
Question
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?
Answer
-
Verify the source MAC address of all untrusted interfaces with "ip dhcp snooping verify mac-address" command.
-
Trust the interface that is connected to the sever with the "ip dhcp snooping trust" command.
-
Disable DHCP snooping information option.
-
Configure a static DHCP snooping binding entry on the switch.
Question 37
Question
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?
Answer
-
(config)#aaa authentication login default local radius
-
(config)#aaa authentication login radius local
-
(config)#aaa authentication login default radius local
-
(config)#aaa authentication login login radius local
Question 38
Question
When EtherChannel guard is enabled and a misconfiguration is detected on a port, how does the port respond?
Answer
-
It enters the channel-error state
-
It enters the errdisable state
-
It enters the shutdown state
-
The port remains up but it is unable to pass traffic
-
The port state remains unchanged but the EtherChannel stays down
Question 39
Question
Enablement of which features puts the port into err-disable state when the port has portfast enabled and it receives BPDUs?
Answer
-
BPDU filtering
-
BackboneFast
-
EtherChannel
-
BPDU guard
Question 40
Question
For client server failover puposes the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning-tree feature satisfies this requirement?
Question 41
Question
How can the traffic that is mirrored out the GiE0/48 port be limited to only traffic that is received or transmitted in VLAN 10 on the GiE0/1 port?
Answer
-
Change the monitor session source VLAN 10 instead of the physical interface
-
Add an access list to GiE0/48 to filter out traffic that is not in VLAN 10
-
Apply the monitor session filter globally to allow only traffic from VLAN 10
-
Change the configuration for GiE0/48 so that it is a member of VLAN 10