CCNP-SWITCH

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

58. Which option describes a limitation of LLDP? A. LLDP cannot provide information about VTP. B. LLDP does not supports TLVs. C. LLDP can discover only windows servers D. LLDP can discover up to two devices per port.

A. LLDP cannot provide information about VTP.

86. Refer to the exhibit. Which statement about switch S1 is true? A. Physical port Fa0/13, Fa-/14, and Fa0/15 successfully formed a layer 2 port-channel interface using an open standard protocol. B. Logical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a layer 2 physical port-channel interface using a Cisco proprietary protocol. C. Physical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a Layer 3 port-channel interface using a Cisco proprietary protocol. D. Logical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a layer 3 physical port-channel interface using an open standard protocol.

A. Physical port Fa0/13, Fa0/14, and Fa0/15 successfully formed a layer 2 port-channel interface using an open standard protocol. These three ports show that they are in Port Channel 1, and the (SU) means they are in use and operating at layer 2. The protocol used for this port channel shows as LACP, which is a standards based protocol, as opposed to PagP, which is Cisco proprietary.

16. After the recent upgrade of the switching infrastructure, the network engineer notices that the port roles that were once "blocking" are now defined as "alternate" and "backup". What is the reason for this change? A. The new switches are using RSTP instead of legacy IEEE802.1D STP. B. IEEE 802.1D STP and PortFast have been configured by default on all newly implemented Cisco Catalyst switches. C. The admin has defined the switch as the root in the STP domain. D. The port roles have been adjusted based on the interface bandwidth and timers of the new Cisco Catalyst switches.

A. The new switches are using RSTP instead of legacy IEEE 802.1D STP. RSTP works by adding an alternative port and a backup port compared to STP. These ports are allowed to immediately enter the forwarding state rather than passively wait for the network to converge.

19. What effect does the mac address-table aging-time 180 command have on the MAC address-table? A. This is how long a dynamic MAC address will remain in the CAM table. B. The MAC address-table will be flushed every 3minutes. C. The default timeout period will be 360 seconds. D. ARP requests will be processed less frequently by the switch. E. The MAC address-table will hold addresses 180 seconds longer than the default of 10 minutes

A. This is how long a dynamic MAC address will remain in the CAM table. You can configure the amount of time that an entry (the packet source MAC address and port that packet ingresses) remain in the MAC table.

76. A network engineer must improve bandwidth and resource utilization on the switches by stopping the inefficient flooding of frames on trunk ports where the frames are not needed. Which Cisco IOS feature can be used to achieve this task? A. VTP pruning B. access list C. switchport trunk allowed VLAN D. VLAN access-map

A. VTP pruning Cisco advocates the benefits of pruning vlans in order to reduce unnecessary frame flooding. The "vtp pruning" command prunes vlans automatically, which stops the inefficient flooding of frames where they are not needed.

43. A manager tells the network engineer to permit only certain VLANs across a specific trunk interface. Which option can be configured to accomplish this? A. allowed VLAN list B. VTP pruning C. VACL D. L2P tunneling

A. allowed VLAN list When a trunk link is established, all of the configured VLANs are allowed to send and receive traffic across the link. VLANs 1 - 1005 are allowed on each trunk by default. However, VLAN traffic can be removed from the allowed list. This keeps traffic from the VLANs from passing over the trunk link. Note: the allowed Vlan list on both the ends of the trunk link should be the same.

40. When you design a switched network using VTPv2 how many VLANs can be used to carry user traffic? A. 1000 B. 1001 C. 1024 D. 2048 E. 4095 F. 4096

B. 1001 VTP versions 1 and 2 supports normal VLAN numbers 1-1001.

64. What is the size of the VLAN field inside an 802.1q frame? A. 8-bit B. 12-bit C. 16-bit D. 32-bit

B. 12-bit The VLAN field is a 12-bit field specifying the VLAN to which the frame belongs. The hexadecimal values of 0x000 and 0xfff are reserved. All other values may be used as VLAN identifiers, allowing up to 4094 VLANs.

20. While working in the core network building, a technician accidentally bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did not recover. What solution allows the network switch to automatically recover from such an issue? A. macros B. errdisable autorecovery C. IP Event Dampening D. command aliases E. Bidirectional Forwarding Detection

B. errdisable autorecovery There are a number of events that can disable a link on a catalyst switch, such as the detection of a loopback, UDLD failure, or a broadcast storm. By default, manual intervention by an admin is necessary to restore the interface to working order; this can be done by issuing shutdown followed by no shutdown on the interface.

88. When two MST instances (MST 1 and MST 2) are created on a switch, what is the total number of spanning-tree instances running on the switch? A. 1 B. 2 C. 3 D. 4

C. 3 Unlike any other spanning tree protocols, in which all the spanning tree instances are independent, MST establishes and maintains IST, CIST, and CST spanning trees: within each MST region, MST maintains multiple spanning tree instances. Instance 0 is a special instance for a region, known as the IST. All other MST instances are numbered from 1 - 4094. In the case for this question, there will be 2 defined MST instances and the special 0 instance, for a total of 3 instances.

51. In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded? A. 100 seconds B. 180 seconds C. 300 seconds D. 600 seconds

C. 300 seconds

47. A network engineer is setting up a new switched network. The network is expected to grow and add many new VLANs in the future. Which Spanning Tree Protocol should be used to reduce switch resources and managerial burdens that are associated with multiple spanning-tree instances? A. RSTP B. PVST C. MST D. PVST+ E. RPVST+

C. MST Multiple Spanning Tree extends the IEE 802.1w RST algorithm to multiple spanning trees. THe main purpose fo MST is to reduce the total number of spanning-tree instances to match the physical topology fo the network and thus reduce the CPU cycles of a switch. PVST+ runs STP instances for each VLAN and does not take into consideration the physical topology that might now require many different STP topologies. MST uses a minimum number of STP instances to match the number of physical topologies present.

63. Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2? A. transparent B. client C. server D. extended VLANs are only supported in version 3 and not in versions 1 or 2.

D. Extended VLANs are not only supported in version 3 and not in versions 1 or 2. VTP version 1 and 2 support VLANs 1 - 1000 only. Extended-range VLANs are supported only in VTP version 3. If converting from VTP version 3 to VTP version 2, VLANs in the range 1006 - 4094 are removed from VTP control.

25. What is the function of NSF? A. Forward traffic simultaneously using both supervisors B. forward traffic based on Cisco Express forwarding C. provide automatic failover to back up supervisor in VSS mode D. provide nonstop forwarding in the event of failure of on of the member supervisors

D. Provide nonstop forwarding in the event of failure of one of the member supervisors.

83. Study Guide

Study Guide

79. Refer to the exhibit. How many bytes are added to each frame as a result of the configuration? A. 4-bytes except the native VLAN B. 8-bytes except the native VLAN C. 4-bytes including native VLAN D. 8-bytes including native VLAN

A. 4-bytes except the native VLAN In 802.1q trunking, all VLAN packets are tagged on the trunk link, except the native vlan. A vlan tag adds 4 bytes to the frame. Two bytes are used for the tag protocol identifier (TPID), the other two bytes for tag control information (TCI).

87. What happens on a Cisco switch that runs Cisco IOS when an RSTP-configured switch receives 802.1d BPDU? A. 802.1d does not understand RSTP BPDUs because they are different versions, but when a RSTP switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the two switches run 802.1d to communicate. B. 802.1d understand RSTP BPDUs because they are the same version, but when a RSTP switch receives a 802.1d BPDU, it responds with a 802.1d BPDU and eventually the two switches run 802.1d to communicate. C. 802.1d does not understand RSTP BPDUs because they are different versions but when a RSTP switch receives a 802.1d BPDU, it does not respond with a 802.1d BPDU. D. 802.1d understands RSTP BPDUs because they are the same version, but when a RSTP switch receives a 802.1d BPDU, it does not respond with a 802.1d BPDU and eventually the two switches run 802.1d to communicate.

A. 802.1d does not understand RSTP BPDUs because they are different versions, but when a RSTP switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the two switches run 802.1d to communicate. For backward compatibility with 802.1D switches, rstp selectively sends 802.1d configuration BPDUs and TCN BPDUs on a per-port basis. When a port is initialized, the migrate-delay timer is started (specifies the minimum time during which RSTP BPDUs are sent), and rstp bpdus are sent. While this time is active, the switch processes all BPDUs received on that port and ignores the protocol type. If the switch receives an 802.1d bpdu after the port migration-delay timer has expired, it assumes that it is connected to an 802.1d switch and starts using only 802.1d bpdus. However, if the rstp switch is using 802.1d bpdus on a port and receives an rstp bpdu after the timer has expired, it restarts the timer and starts using rstp bpdus on that port.

52. If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated? A. A MAC address or host moves between different switch ports. B. A new MAC address is added to the content-addressable memory C. A new MAC address is removed from the content-adressable memory D. More than 64 MAC addresses are added to the content-addressable memory.

A. A MAC address or host moves between different switch ports. To enable MAC-move notification use the [mac-address-table notification mac-move] command in global config mode.

85. Which statement about using EtherChannel on Cisco IOS switches is true? A. A switch can support up to eight compatibly configured Ethernet interfaces in an EtherChannel. The EtherChannel provides full-duplex bandwidth up to 800 Mbps only for Fast EtherChannel or 8 Gbps only for Gigabit EtherChannel. B. A switch can support up to 10 compatibly configured Ethernet interfaces in an EtherChannel. The EtherChannel provides full-duplex bandwidth up to 1000 Mbps only for Fast EtherChannel or 8 Gbps only for Gigabit Etherchannel. C. A switch can support up to 8 compatibly configured Ethernet interfaces in an EtherChannel. The EtherChannel provides full-duplex bandwidth up to 800 Mbps only for Fast EtherChannel or 16 Gbps only for Gigabit EtherChannel. D. A switch can support up to 10 compatibly configured Ethernet interfaces in an EtherChannel. The EtherChannel provides full-duplex bandwidth up to 1000 Mbps only for Fast EtherChannel or 10 Gbps only for Gigabit EtherChannel.

A. A switch can support up to eight compatibly configured Ethernet interfaces in an EtherChannel. The EtherChannel provides full-duplex bandwidth up to 800 Mbps only for Fast EtherChannel or 8 Gbps only for Gigabit EtherChannel. An etherchannel consists of individual fast Ethernet or gigabit Ethernet links bundled into a single logical link. The etherchannel provides full-duplex bandwidth up to 800 Mbps (fast etherchannel) or 8 Gbps (gigabit etherchannel)between your switch and another switch or host. Each Etherchannel can consists of up to 8 compatibly configured Ethernet interfaces. All interfaces in each etherchannel must be the same speed, and all must be configured as either layer 2 or 3 interfaces.

62. Which statement about Cisco Discovery Protocol configuration on a Cisco switch is true? A. CDP is enabled by default and can be disabled globally with the command no cdp run. B. CDP is disabled by default and can be enabled globally with the command cdp enable. C. CDP is enabled by default and can be disabled globally with the command no cdp enable. D. CDP is disabled by default and can be enabled globally with the command cdp run.

A. CDP is enabled by default and can be disabled globally with the command no cdp run. CDP is enabled on your router by default, which means the Cisco IOS software will receive CDP information. CDP also is enabled on supported interfaces by default. To disable CDP on an interface, use the "no cdp enable interface" command. To disable it globally, use the "no cdp run" command.

32. While doing network discovery using Cisco Discovery Protocol, it is found that rapid error tracking is not currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms using Cisco Discovery Protocol? A. Cisco Discovery Protocol version 2 B. Cisco IOS Embedded Event Manager C. logging buffered D. Cisco Discovery Protocol source interface E. Cisco Discovery Protocol logging options

A. Cisco Discovery Protocol version 2 CDP version 1 - mainly used for backward compatibility. CDP version 2 - most recent version which has enhanced features such as rapid reporting mechanism, which is used to track down errors and minimize costly downtime. It allows you to track instances even if the native VLAN ID or port duplex states do not match between connecting devices. Default version on all switches

74. Which statement about using native VLANs to carry untagged frames is true? A. Cisco Discovery Protocol version 2 carries native VLAN information, but version 1 does not. B. Cisco Discovery Protocol version 1 carries native VLAN information, but version 2 does not. C. Cisco Discovery Protocol version 1 and version 2 carry native VLAN information. D. Cisco Discovery Protocol version 3 carries native VLAN information, but versions 1 and 2 do not.

A. Cisco Discovery Protocol version 2 carries native VLAN information, but version 1 does not. CDP version 2 passes native VLAN information between Cisco switches. If you have a native VLAN mismatch, you will see CDP error messages on the console output.

30. A network engineer must set the load balance method on an existing port channel. Which action must be done to apply a new load balancing method? A. Configure the new load balancing method using port-channel load-balance B. Adjust the switch SDM back to "default" C. Ensure that IP CEF is enabled globally to support all load balancing methods. D. Upgrade the PFC to support the latest load balancing methods.

A. Configure the new load balancing method using port-channel load-balance Etherchannel balances the traffic load across the links in a channel through the reduction of part of the binary pattern that the addresses in the frame form to a numerical value that selects one of the links in the channel. Etherchannel load balancing can use MAC addresses or IP addresses source or destination addresses, or both source and destination addresses. The mode applies to all etherchannels that are configured on the switch.

34. For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two) A. Configure trunk and access interfaces manually B. Disable DTP on a per interface basis. C. Apply BPDU guard and BPDU filter D. Enable switchport block on access ports

A. Configure trunk and access interfaces manually B. Disable DTP on a per interface basis Dynamic Trunking Protocol is used to negotiate forming trunk between two Cisco devices. DTP causes increased traffic, and is enabled by default, but may be disabled. To disable DTP, configure "switchport nonegotiate". This prevents the interface from generating DTP frames. You can use this command only when the interface switchport ode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link, otherwise the link with be a non-trunking link.

56. Which statement about Cisco devices learning about each other through Cisco Discovery Protocol is true? A. Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC B. Each device broadcasts periodic advertisements to all of its neighbors. C. Each device sends periodic advertisements to a central device that builds the network topology. D. Each device sends periodic advertisements to all IP addresses in its ARP table.

A. Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC Cisco devices send periodic CDP announcements to the multicast destination address 01-00-0c-cc-cc-cc, out each connected network interface. These multicast packets may be received by Cisco switches and other networking devices that support CDP into their connected network interface.

93. A network engineer configured an Ethernet switch using these commands. Switchone(config) # Spanning-tree portfast bpdufilter default Which statement about the spanning-tree portfast feature on the switch is true? A. If an interface is enabled for portfast receives BPDU, the port goes through the spanning-tree listening, learning, and forwarding states. B. If an interface is enabled for portfast receives BDPU, the port does not go through the spanning-tree listening, learning, and forwarding states. C. If an interface is enabled for portfast receives BDPU, the port is shut down immediately. D. If an interface is enabled for portfast receives BDPU, the port goes into the spanning-tree inconsistent state.

A. If an interface is enabled for portfast receives BDPU, the port goes through the spanning-tree listening, learning, and forwarding states. STP portfast causes a layer 2 lan interface configured as an access port to enter the forwarding state immediately, bypassing the listening and learning states. However, the "spanning-tree portfast bpdufilter default" command specifies that if a bpdu is received on that port, then the default action of stp is listening, learning, and forwarding states should be used.

55. Which statement about LLDP-MED is true? A. LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices. B. LLDP-MED is an extensions to LLDP that operates only between network devices. C. LLDP-MED is an extension to LLDP that operates only between endpoint devices. D. LLDP-MED is an extension to LLDP that operates between routers that run BGP.

A. LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices. LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, and Inventory management.

57. Which option lists the information that is contained in a Cisco Discovery Protocol advertisement? A. native VLAN IDs, port-duplex, hardware platform B. native VLAN IDs, port-duplex, memory errors C. native VLAN IDs, memory errors, hardware platform D. port-duplex, hardware platform, memory errors

A. Native VLAN IDs, port-duplex, hardware platform

2. A network engineer wants to add anew switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack? A. No configuration must be added B. stack ID C. IP address D. VLAN information E. VTP information

A. No configuration must be added You can use the offline configuration feature to supply a configuration to a new switch before it joins the switch stack. You can configure in advance the stack member number, the switch type, and ints associated with a switch that is not part of the stack.

84. A network engineer changed the port speed and duplex setting of an existing EtherChannel bundle that uses the PAgP protocol. Which statement describes what happens to all ports in the bundle? A. PAgP changes the port speed and duplex for all ports in the bundle. B. PAgP drops the ports that do not match the configuration. C. PAgP does not change the port speed and duplex for all ports in the bundle until the switch is rebooted. D. PAgP changes the port speed but not the duplex for all ports in the bundle

A. PAgP changes the port speed and duplex for all ports in the bundle. PAgP aids in the automatic creation of etherchannel links. PagP packets are sent between etherchannel-capable ports in order to negotiate the formation of a channel. Some restrictions are deliberately introduced into PAgP. PAgP does not group ports that operate at different speed or port duplex. If speed and duplex change when a bundle exists, PAgP changes the port speed and duplex for all ports in the bundle.

81. Which statement about the use of PagP link aggregation on a Cisco switch that is running Cisco IOS Software is true? A.PagP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on allow the formation of a channel. B. PagP modes are active, desirable, and on. Only the combinations active-desirable, desirable-desirable, and on-on allow the formation of a channel. C. PagP modes are active, desirable, and on. Only the combinations active-active, desirable-desirable, and on-on allow the formation of a channel. D. PagP modes are off, active, desirable, and on. Only the combinations auto-auto, desirable-desirable, and on-on allow the formation of a channel.

A. PagP modes are off, auto, desirable, and on. Only the combinations, auto-desirable, desirable-desirable, and on-on allow the formation of a channel. PagP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on will allow a channel to be formed.

29. A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose 2) A. port-priority B. cost C. forward-timers D. link type E. root guard

A. Port-priority B. Cost Spanning tree forces redundant data paths into a standby state. If a network segment in the spanning tree fails and a redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and activates the standby path. Switches send and receive spanning-tree frames, called bridge protocol data units (BPDUs), at regular intervals

67. Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed? A. PortFast B. port-security C. spanning tree D. storm control

A. PortFast Voice VLAN config guidelines: You should configure voice vlan on switch access ports, the voice vlan should be present and active on the switch for the IP phone to correctly communicate on the voice vlan. Use the show vlan privileged EXEC command to see if the vlan is present, The port fast feature is automatically enabled when voice vlan is configured. When you disable voice vlan, the port fast feature is not automatically disabled.

48. Which statement about the use of SDM templates in a Cisco switch is true? A. SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network. B. SDM templates are used to create Layer 3 interface (switch virtual interfaces) to permit hosts in one VLAN to communicate with hosts in another VLAN C. SDM templates are used to configure ACLs that protect network and specific hosts from unnecessary or unwanted traffic. D. SDM templates are used to configure a set of ACLs that allows the users to manage the flow of traffic handled by the route processor. E. SDM templates are configured by accessing the switch using the web interface

A. SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network. You can use SDM templates to configure system resources int he switch to optimize support for specific features, depending on how the switch is used int he network. You can select a template to provide maximum system usage for some functions; for example, use the default template to balance resources, and use access template to obtain max ACL usage. To allocate hardware resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features.

14. Refer to the exhibit Switch A, B, and C are trunked together and have been properly configured for VTP. Switch C receives VLAN information from the VTP server Switch A, but Switch B does not receive any VLAN information. What is the most probable cause of this behavior? A. Switch B is configured in transparent mode. B. Switch B is configured with an access port to Switch A, while Switch C is configured with a trunk port to Switch B. C. The VTP revision number of the Switch B is higher than that of Switch A. D. The trunk between switch A and switch B is misconfigured.

A. Switch B is configured in transparent mode. VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements, but transparent switches do forward VTP advertisements that they receive out their trunk ports in VTP version 2

39. The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10, 20, 30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem? A. The command effectively removed all other working VLANs and replaced them with the new VLANs B. VTP pruning removed all unused VLANs C. ISL was unable to encapsulate more than the already permitted VLANs across the trunk. D. Allowing additional VLANs across the trunk introduced a loop in the network.

A. The command effectively removed all other working VLANs and replaced them with the new VLANs. The "switchport trunk allowed vlan" command will only allow the specified VLANs, and overwrite any other that were previously defined. You would also need to explicitly allow the other working VLANs to this configuration command, or use the "issue the switchport trunk allowed vlan add vlan-list" command instead to add these 3 vlans to the other defined allowed vlans.

27. After reviewing UDLD status on switch ports, an engineer notices that the ." Which statement describes what this indicates about the status of the port? A. The port is fully operational and no known issues are detected. B. The bidirectional status of "unknown" indicates that the port will go into the disabled state because it stopped receiving UDLD packets from its neighbor. C. UDLD moved into aggressive mode after inconsistent acknowledgements were detected. D. The UDLD port is placed in the "Unknown" state for 5 seconds until the next UDLD packet is received on the interface.

A. The port is fully operational and no known issues are detected. By default, UDLD is disabled on all interfaces. We can enable UDLD globally on the device or individually on specific interfaces with the command UDLD port. This enabled UDLD in normal mode. It would be prohibitively difficult to coordinate the configuration of UDLD on both end of a link at the same time, so when UDLD is first enabled and does not detect a neighbor the link state is considered unknown, which s not necessarily and error condition. The port will remain operational during this time. When UDLD is finally enabled on the other end, the status will transition to bidirectional

10. A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery Protocol, but it has several routing neighbor relationships. What would cause the output to show only the single neighbor? A. The routers are connected via a Layer 2 switch B. IP routing is disabled on the neighboring devices C. Cisco Express Forwarding is enabled locally. D. Cisco Discovery Protocol advertisements are inconsistent between the local and remote devices

A. The routers are connected via a Layer 2 switch If all the routers are connected to each other using a layer 2 switch, then each router will only have the single switch port that it connects to as its neighbor. Even though multiple routing neighbors can be formed over a layer 2 network, only the physical port that it connects to will be seen as a CDP neighbor. CDP can be used to determine the physical topology, but not necessarily the logical topology.

7. After an EtherChannel is configured between two Cisco switches, interface port channel 1 is in the down/down state. Switch A is configured with channel-group 1 mode active, while switch B is configured with channel-group 1 mode desirable. Why is the EtherChannel bundle not working? A. The switches are using mismatched EtherChannel negotation modes. B. The switch ports are not configured in trunking mode C. LACP priority must be configured on both switches D. The channel group identifier must be different for Switch A and Switch B

A. The switches are using mismatched EtherChannel negotiation modes. Here we have a situation where one switch is using active mode, which is an LACP mode, and the other is using desirable, which is a PAGP mode. You can not mix the LACP and PAGP protocols to form an etherchannel.

59. Which statement about the UDLD protocol is true? A. UDLD is a Cisco-proprietary layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures. B. UDLD is a Cisco-proprietary layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network. C. UDLD is a standardized layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures D. UDLD is a standardized layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.

A. UDLD is a Cisco-proprietary layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures. The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between devices and ports that support UDLD. UDLD detects the existence of unidirectional links. When a unidirectional link is detected, UDLD puts the affected port into the errdisable state and alerts the user.

49. Which SDM template disables routing and supports the maximum number of unicast MAC addresses? A. VLAN B. access C. default D. routing

A. VLAN To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize the system resources to optimize support for certain features. You can select SDM templates to optimize these features. VLANs - The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a layer 2 switch

50. Which SDM template is the most appropriate for a Layer 2 switch that provides connectivity to a large number of clients? A. VLAN B. default C. access D. routing

A. VLAN To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize the system resources to optimize support for certain features. You can select SDM templates to optimize these features. VLANs - The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a layer 2 switch

70. Which feature must be enabled to eliminate the broadcasting of all unknown traffic to switches that are not participating in the specific VLAN? A. VTP pruning B. port-security C. storm control D. bpdguard

A. VTP pruning VTP ensures that all switches int he VTP domain are aware of all vlans. However, there are occasions when vtp can create unnecessary traffic. All unknown unicasts and broadcasts in a vlan are flooded over the entire vlan. All switches in the network receive all broadcasts, even in situations in which few users are connected in that vlan. VTP pruning is a feature that you use in order to eliminate or prune this unnecessary traffic.

60. Which option lists the modes that are available for configuring UDLD on a Cisco switch? A. normal and aggressive B. active and aggressive C. normal and active D. normal and passive E. normal and standby

A. normal and aggressive Cisco-proprietary UDLD protocol monitors the physical configuration of the links between devices and ports that support UDLD. UDLD detects the existence of unidirectional links. When a unidirectional link is detected, UDLD puts the affected port into the errdisabled state and alerts the user. UDLD can operate in either normal or aggressive mode.

45. Which command does a network engineer use to verify the spanning-tree status for VLAN 10? A. switch# show spanning-tree vlan 10 B. switch# show spanning-tree bridge C. switch# show spanning-tree brief D. switch# show spanning-tree summary E. switch# show spanning-tree vlan 10 brief

A. switch# show spanning-tree vlan 10

68. In which portion of the frame is the 802.1q header found? A. within the Ethernet header B. within the Ethernet payload C. within the Ethernet FCS D. within the Ethernet source MAC address

A. within the Ethernet header 802.1q does not encapsulate the original frame. Instead for Ethernet frames, it adds a 32-bit field between the source MAC address and the EtherType/length fields of the original frame.

65. What is the maximum number of VLANs that can be assigned to an access switchport without a voice VLAN? A. 0 B. 1 C. 2 D. 1024

B. 1 A standard (non-voice VLAN port) access switch port can belong to only a single VLAN. If more than one VLAN is needed, the port should be configured as a trunk port.

61. What is the default interval at which Cisco devices send Cisco Discovery Protocol advertisements? A. 30 seconds B. 60 seconds C. 120 seconds D. 300 seconds

B. 60 seconds Cisco Discovery Protocol is a layer 2, media-independent, and network-independent protocol that networking applications use to learn about nearby, directly connected devices. CDP is enabled by default. Each device configured for CDP advertises at least one address at which the device can receive messages and sends periodic advertisements to the well-known multicast address 01:00:0C:CC:CC:CC. Devices discover each other by listening at that address. They also listen to messages to learn when interfaces on other devices are up or go down. Advertisements contain time-to-live information, which indicates the length of time a receiving device should hold CDP information before discarding it. Advertisements supported and configured in cisco software are sent, by default, every 60 seconds.

6. Refer to the exhibit A network engineer wants to analyze all incoming and outgoing packets for an interface that is connected to an access switch. Which three items must be configured to mirror traffic to a packet sniffer that is connected to the distribution switch? (Choose 3) A. A monitor session on the distribution switch with a physical interface as the source and the remote SPAN VLAN as the destination B. A remote SPAN VLAN on the distribution and access layer switch C. A monitor session on the access switch with a physical interface source and the remote SPAN VLAN as the destination. D. A monitor session on the distribution switch with a remote SPAN VLAN as the source and physical interface as the destination E. A monitor session on the access switch with a remote SPAN VLAN source and the physical interface as the destination F. A monitor session on the distribution switch with a physical interface as the source and a physical interface as the destination

B. A remote SPAN VLAN on the distribution and access layer switch C. A monitor session on the access switch with a physical interface source and the remote SPAN VLAN as the destination D. A monitor session on the distribution switch with a remote SPAN VLAN as the source and physical interface as the destination You can analyze network traffic passing through ports or vlans by using SPAN or RSPAN to send a copy of the traffic to another port on the switch or on another switch that has been connected to a network analyzer or other monitoring or secruity device. SPAN copies straffic received or sent on source ports or source VLANS to a destination port for analysis.

98. Which statement describes what happens when a switch enters dual active recovery mode? A. The switch shuts down and waits for the VSL link to be restored before sending traffic. B. All interfaces are shut down in the formerly active virtual switch member, but the new active virtual switch forwards traffic on all links. C. The switch continues to forward traffic out all links and enables spanning tree on VSL link and all other links to prevent loops. D. The VSS detects which system was last in active state and shuts down the other switch.

B. All interfaces are shut down in the formerly active virtual switch member, but the new active virtual switch forwards traffic on all links. In the dual active recovery mode, all interfaces except the VSL interfaces are in an operationally shut down state in the formerly active virtual switch member. The new active virtual switch continues to forward traffic on all links.

80. A network engineer configured a fault-tolerance link on Gi links G0/1, G0/2, G0/3, and G0/4 between two switches using Ethernet port-channel. Which action allows interface G0/1 to always actively forward traffic in the port-channel? A. Configure G0/1 as half duplex and G0/2 as full duplex. B. Configure LACP port-priority on G0/1 to 1. C. Configure LACP port-priority on G0/1 to 65535. D. LACP traffic goes through G0/4 because it its the highest interface ID.

B. Configure LACP port-priority on G0/1 to 1 A LACP port priority is configured on each port using LACP. The port priority can be configured automatically or through the CLI. LACP uses the port priority with the port number to form the port identifier. The port priority determines which ports should be put in standby mode when there is a hardware limitation that prevents all compatible ports from aggregating. The higher the number, the lower the priority. The valid range is from 1 to 65535. The default is 32768.

13. After implementing VTP, the extended VLANs are not being propagated to other VTP switches. What should be configured for extended VLANs? A. VTP does not support extended VLANs and should be manually added to all switches. B. Enable VTP version 3, which supports extended VLAN propagation. C. VTP authentication is required when using extended VLANs because of their ability to cause network instability. D. Ensure that all switches run the same Cisco IOS version. Extended VLANs will not propagate to different IOS versions when extended VLANs are in use.

B. Enable VTP version 3, which supports extended VLAN propagation. VTP version 1 and 2 do not propagate configuration information for extended-range VLANs (1006 - 4094). You must configure extended-range VLANs manually on each network device. VTP version 3 supports extended-range VLANs. If you convert from VTP version 3 to VTP version 2, the VLANs in the range 1006 - 4094 are removed from VTP control

42. A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this? A. IRDP B. LLDP C. NDP D. LLTD

B. LLDP Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the internet protocol suite used by network devices for advertising their identity, capabilities, and neighbors on and IEEE802 local area network. Principally wired Ethernet. LLDP performs functions similar to several proprietary protocols, such as the CDP

11. After the implementation of several different types of switches from different vendors, a network engineer notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which vendor-neutral protocol could be used to resolve this issue? A. Local Area Mobility B. Link Layer Discovery Protocol C. NetFlow D. Directed Response Protocol

B. Link Layer Discovery Protocol The LLDP is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network, principally wired ethernet. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol.

82. Refer to the exhibit. Which EtherChannel negotiation protocol is configured on the interface f0/13-f0/15? A. Link Combination Control Protocol B. Port Aggregation Protocol C. Port Combination Protocol D. Link Aggregation Control Protocol

B. Port Aggregation Protocol The link aggregate control protocol (LACP) trunking supports four modes of operation: in this example, we see that fa0/13, fa0/14, and fa0/15 are all in port channel 12, which is operating in desirable mode, which is only a PAgP mode.

78. What is required for a LAN switch to support 802.1q Q-in-Q encapsulation? A. Support less than 1500 MTU B. Support 1504 MTU or higher C. Support 1522 layer 3 IP and IPX packet D. Support 1547 MTU only

B. Support 1504 MTU or higher The default system MTU for traffic on Catalyst switches in 1500 bytes. Because the 802.1q tunneling (Q-in-Q) feature increases the frame size by 4 bytes when the extra tag is added, you must configure all switches in the service-provider network to be able to process maximum frames by increasing the switch system MTU size to at least 1504 bytes.

37. After configuring new data VLANs 1020 - 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem? A. The VTP server must be reloaded. B. The VTP version number must be set to version 3 C. After each update to the VTP server, it takes up to 4 hours to propagate. D. VTP must be stopped and restarted on the server. E. Another switch in the domain has a higher revision number than the server.

B. The VTP version number must be set to version 3. VTP version 3 supports these features that are not supported in 1 or 2: enhanced authentication, Support for extended range VLAN (1006 - 4094)

23. Refer to the exhibit. What is the result of the configuration? A. The etherchannels would not form because the load-balancing method must match on the devices. B. The etherchannels would form and function properly even though the load balancing and etherchannel modes do not match C. The etherchannels would form, but network loops would occur because the load-balancing methods do not match. D. The etherchannels would form and both devices would use the dst-ip load balancing methods because Switch1 is configured with etherchannel mode active

B. The etherchannels would form and function properly even though the load-balancing and etherchannel modes do not match An etherchannel will form if one end is active and the other is passive. The table below summarizes the results for LACP channel establishment based on the configuration of each side of a link.

26. After UDLD is implemented, a network admin noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state? A. Normal UDLD operations that prevent traffic loops. B. UDLD port is configured in aggressive mode. C. UDLD is enabled globally D. UDLD timers are inconsistent

B. UDLD port is configured in aggressive mode. With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After 8 failed retries, the port is disabled.

54. What is the default value for the errdisable recovery interval in a Cisco switch? A. 30 seconds B. 100 seconds C. 1 second D. 600 seconds

C. 1 second After you fix the root problem, the ports are still disabled if you have not configured errdisable recovery on the switch. In this case, you must reenable the ports manually. Issue the shutdown command then no shut interface mode command on the associated interface in order to manually reenable the ports

3. What percentage of bandwidth is reduced when a stack cable is broken? A. 0 B. 25 C. 50 D. 75 E. 100

C. 50 Switches are physically connected sequentially. A break will result in the stack bandwidth being reduced to half its capacity.

96. What is the maximum number of 10 Gigabit Ethernet connections that can be utilized in an EtherChannel for the virtual switch link? A. 4 B. 6 C. 8 D. 12

C. 8 The VSS is made up of the following: Virtual switch link: 10 gigabit ethernet connections (up to 8 using etherchannel) between the virtual switch members.

75. Refer to the exhibit. A multilayer switch has been configured to send and receive encapsulated and tagged frames. VLAN 2013 on the multilayer switch is configured as the native VLAN. Which option is the cause of the spanning-tree error? A. VLAN spanning-tree in SW-2 is configured. B. spanning-tree bpdu-filter is enabled. C. 802.1q trunks are on both sides, both with native VLAN mismatch. D. VLAN ID 1 should not be used for management traffic because its unsafe.

C. 802.1q trunks are on both sides, both with native VLAN mismatch. Here we see that the native VLAN has been configured as 2013 on one switch, but 1 (the default VLAN) on the other switch. If you use 802.1q trunks, you must ensure that you choose a common native VLAN for each port in the trunk. Failure to do this causes Cisco switches to partially shut down the trunk port because having mismatched native vlans can result in spanning-tree loops. Native vlan mismatches are detected via spanning tree and Cisco Discovery Protocol, not via dtp messages. If spanning tree detects a native vlan mismatch, spanning tree blocks local native vlan traffic and the remote switch native vlan traffic on the trunk; however, the trunk still remains up for other vlans.

5. Refer to exhibit How can the traffic that is mirrored out the Gi0/48 port be limited to only traffic that is received or transmitted in VLAN 10 on the Gi0/1 port? A. Change the configuration for Gi0/48 so that it is a member of VLAN 10 B. Add an access list to Gi0/48 to filter out traffic that is not in VLAN 10 C. Apply the monitor session filter globally to allow only traffic from VLAN 10 D. Change the monitor session source to VLAN 10 instead of the physical interface.

C. Apply the monitor session filter globally to allow only traffic from VLAN 10. To start a new flow-based SPAN session or flow-based RSPAN source or destination session, or to limit SPAN source traffic to specific VLANs, use the monitor session filter global configuration command.

71. Refer to the exhibit. The users in an engineering department that connect to the same access switch cannot access the network. The network engineer found that the engineering VLAN is missing from the database. Which action resolves this problem? A. Disable VTP pruning and disable 802.1q. B. Update the VTP revision number. C. Change VTP mode to server and enable 802.1q. D. Enable VTP pruning and disable 802.1q.

C. Change VTP mode to server and enable 802.1q. Only VTP servers can add new VLANs to the switched network, so to enable vlan 10 on this switch you will first need to change the vtp mode from client to server. Then you will need to enable 802.1q trunking to pass this new vlan along to the other switches.

92. A network engineer is trying to deploy a PC on a network. The engineer observes that when the PC is connected to the network, it takes 30 to 60 seconds for the PC to see any activity on the network interface card. Which Layer 2 enhancement can be used to eliminate this delay? A. Configure port duplex and speed to auto negotiation. B. Configure port to duplex full and speed 1000. C. Configure spanning-tree portfast. D. Configure no switchport.

C. Configure spanning-tree portfast. When first powered on, each port goes through 4 states to ensure that there are no physical loops in the layer 2 broadcast domain. 1. Blocking 2. Listening 3. Learning 4. Forwarding See study guide for steps

95. Which statement about restrictions for multichassis LACP is true? A. It is available only on Cisco Catalyst 6500 Series chassis. B. It does not support 1Gb links. C. Converting a port channel to mLACP can cause a service disruption. D. It is not available in VSS.

C. Converting a port channel to mLACP can cause a service disruption. When configuring mLACP for server access, follow these guidelines and restrictions: Converting a port channel to mLACP can cause a service disruption.

35. Which two protocols can be automatically negotiated between switches for trunking? (Choose two) A. PPP B. DTP C. ISL D. HDLC E. DLCI F. Dot1q

C. ISL F. Dot1q Switch that are capable of either 802.1q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.

72. Refer to the exhibit. The network switches for two companies have been connected and manually configured for the required VLANs, but users in company A are not able to access network resources in company B when DTP is enabled. Which action resolves this problem? A. Delete vlan.dat and ensure that the switch with lowest MAC address is the VTP server. B. Disable DTP and document the VTP domain mismatch. C. Manually force trunking with switchport mode trunk on both switches. D. Enable the company B switch with the VTP mode server command.

C. Manually force trunking with switchport mode trunk on both switches. Since the number of existing vlans differ on the switches we know that there is a problem with VTP or the trunking interfaces. The VTP domain names do match and they are both VTP servers so there are no issues there. The only viable solution is that there is a dtp issue and so you must instead manually configure the trunk ports between these two switches so that the VLAN information can be sent to each switch.

77. Which action allows a network engineer to limit a default VLAN from being propagated across all trunks? A. Upgrade to VTP version 3 for advanced feature set support. B. Enable VTP pruning on the VTP server. C. Manually prune default VLAN with switchport trunk allowed vlans remove. D. Use trunk pruning vlan 1.

C. Manually prune default VLAN with switchport trunk allowed vlans remove. Manually pruning the default VLAN (1) can only be done with the "switchport trunk allowed vlans remove" command. VLAN 1 is not VTP pruning eligible so it cannot be done via VTP pruning. The "trunk pruning vlan 1" option is not a valid command.

89. Refer to the exhibit. f1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport f1/1 as a primary port? A. Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16. B. Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0. C. Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16. D. Modify the spanning-tree port-priority on SW 2 f1/1 to 16 and f1/0 to 0.

C. Modify the spanning-tree port-priority on Sw2 f1/1 to 0 and f1/0 to 16. If a loop occurs, STP considers port priority when selecting a LAN port to put into the forwarding state. You can assign high priority values to LAN ports that you want STP to select first and lower priority values to LAN ports that you want STP to select last. If all lan ports have the same priority value, STP puts the lan port with the lowest lan port number int he forwarding state and blocks other lan ports. The possible priority range is 0 through 240 (default 128), configurable in increments of 16. A lower path cost represents higher-speed transmission and is preferred.

17. An admin recently configured all ports for rapid transition using PortFast. After testing, it has been determined that several ports are not transitioning as they should. What is the reason for this? A. RSTP has been enabled per interface and not globally B. The STP root bridge selection is forcing key ports to remain in non-rapid transitioning mode. C. STP is unable to achieve rapid transition for trunk links D. The switch does not have the processing power to ensure rapid transition for all ports.

C. STP is unable to achieve rapid transition for trunk links. RSTP can only achieve rapid transition to the forwarding state on edge ports and on point-to-point links, not on trunk links. The link type is automatically derived from the duplex mode of a port. A port that operates in full-duplex is assumed to be a point-to-point, while a half-duplex is considered as a shared port by default. This auto link type setting can be overriden by explicit config. In switched networks today, most links operate in full-duplex mode and are treated as point-to-point links by RSTP. Candidates for rapid transition to the forwarding state.

21. A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU of the switch to spike during peak working hours. What is the root cause of this issue? A. The VLAN receives additional frames from neighboring switches. B. The SDM VLAN template causes the MAC address-table to overflow C. The VLAN template disables routing in hardware D. The switch needs to be rebooted before the SDM template takes effect.

C. The VLAN template disables routing in hardware. SDM Template Notes: Choosing the VLAN template will actually disable routing (number of entry for unicast or multicast route is zero) in hardware.

31. Refer to the exhibit. A network engineer investigates a recent network failure and notices that one of the interfaces on the switch is still down. What is causing the line protocol on this interface to be shown as down? A. There is a layer 1 physical issue B. There is a speed mismatch on the interface. C. The interface is configured as the target of the SPAN session. D. The interface is configured as the source of the SPAN session E. There is a duplex mismatch on the interface

C. The interface is configured as the target of the SPAN session With the SPAN destination port, the state of the destination port is up/down by design. The interface shows the port in this state in order to make it evident that the port is currently not usable as a production port. This is the normal operational state for SPAN destinations.

22. An access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network admin notices that not all traffic is being replicated to the management server. What is a cause for this issue? A. VLAN filters are required to ensure traffic mirrors effectively. B. SPAN encapsulation replication must be enable to capture EtherChannel destination traffic. B. SPAN encapsulation replication must be enabled to capture EtherChannel destination traffic C. The port channel can be used as a SPAN source, but not a destination. D. RSPAN must be used to capture EtherChannel bidirectional traffic.

C. The port channel can be used as a SPAN source, but not a destination A source port or EtherChannel is a port or EtherChannel monitored for traffic analysis. You can configure both Layer 2 and 3 ports and the etherchannels as SPAN sources. SPAN can monitor one or more source ports or etherchannels in a single SPAN session. You can configure ports or etherchannels in any VLAN as SPAN sources. Trunk ports or Etherchannels can be configured as sources and mixed with nontrunk sources. A port-channel interface (an etherchannel) can be a SPAN source. but not a destination.

38. A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment? A. Modify the spanning-tree priorities to dictate the traffic flow. B. Create a layer 3 transit VLAN to segment the traffic between the sites C. Use VTP pruning on the trunk interfaces D. Configure manual trunk pruning between the two locations.

C. Use VTP pruning on the trunk interface. Pruning unnecessary VLANs from the trunk can be performed with one of two methods: Manual pruning of the unnecessary VLAN on the trunk- best method, avoids the use of the spanning tree. Instead the method runs the pruned VLAN on trunks. VTP Pruning - avoid this method if the goal is to reduce the number of STP instances. VTP-pruned VLANs on a trunk are still part of the Spanning tree. Therefore, VTP-pruned VLANs do not reduce the number of spanning tree port instances. Since the question asked for the choice that is an enhancement to the STP design, VTP pruning is the best choice.

69. Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a switch? A. VLANs 1 - 1001 B. VLANs 1 - 4094 C. VLANs 2 - 1001 D. VLANs 2 - 4094

C. VLANs 2 - 1001 VTP pruning should only be enabled on VTP servers, all the clients in the VTP domain will automatically enable VTP pruning. By default, VLANs 2 - 1001 are pruning eligible, but VLAN 1 can't be pruned because it's an administrative VLAN. Both VTP version 1 and 2 supports pruning.

18. Which technique automatically limits VLAN traffic to only the switches that require it? A. access lists B. DTP in nonegotiate C. VTP pruning D. PBR

C. VTP pruning VTP pruning enhances network bandwidth use by reducing unnecessary flooded traffic, such as broadcast, multicast, unknown, and flooded unicast packets to only the switches that require it. VTP pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices.

15. Refer to the exhibit. Switch A, B, and C are trunked together and have been properly configured for VTP. Switch B has all VLANs, but Switch C is not receiving traffic from certain VLANs. What would cause this issue? A. A VTP authentication mismatch occurred between Switch A and Switch B. B. The VTP revision number of Switch B is higher than that of Switch A. C. VTP pruning is configured globally on all switches and it removed VLANs from the trunk interface that is connected to switch C. D. The trunk between Switch A and Switch B is misconfigured

C. VTP pruning is configured globally on all switches and it removed VLANs from the trunk interface that is connected to switch C. VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices. Without VTP pruning, a switch floods broadcast, multicast, and unknown unicast traffic across all trunk links within a VTP domain even though receiving switches might discard them. VTP pruning is disabled by default. VTP pruning blocks unneeded flooded traffic to VLANs on trunk ports that are included in the pruning-eligible list. The best explanation for why Switch C is not seeing traffic from only some of the VLANs, is that VTP pruning has been configured.

46. A new network that consists of several switches has been connected together via trunking interfaces. If all switches currently have the default VTP domain name "null", which statement describes what happens when a domain name is configured on one of those switches. A. The switch with the non-default domain name restored back to "null" upon reboot. B. Switches with higher revision numbers does not accept the new domain name. C. VTP summary advertisements are sent out of all ports with the new domain name. D. All other switches with the default domain name become VTP clients.

C. VTP summary advertisements are sent out of all ports with the new domain name. By default, a switch will have a domain name of NULL and no password. If the switch hears a VTP advertisement it will automatically learn the VTP domain name, VLANs, and the configuration revision number. Summary advertisements - sent out every 300 seconds and every time a change occurs on the vlan database. Domain name is contained in summary advertisements

73. A network engineer must implement Ethernet links that are capable of transporting frames and IP traffic for different broadcast domains that are mutually isolated. Consider that this is a multivendor environment. Which Cisco IOS switching feature can be used to achieve the task? A. PPP encapsulation with a virtual template B. Link Aggregation Protocol at the access layer C. dot1q VLAN trunking D. Inter-Switch Link

C. dot1q VLAN trunking Here the question asks for transporting "frames and IP traffic for different broadcast domains that are mutually isolated" which is basically a long way of saying VLANs so trunking is needed to carry VLAN information. There are 2 different methods for trunking, 802.1q and ISL. Of these, only 802.1q is supported by multiple vendors since ISL is a Cisco proprietary protocol.

33. Which technique allows specific VLANs to be strictly permitted by the administrator? A. VTP pruning B. transparent bridging C. trunk allowed VLANs D. VLAN access-list E. L2P tunneling

C. trunk allowed VLANs By default, a trunk port sends traffic to and receives traffic from all VLANs from the allowed list preventing traffic from those VLANs from passing over the trunk.

1. What is the maximum number of switches that can be stacked using Cisco StackWise? A. 4 B. 5 C. 8 D. 9 E. 10 F. 13

D. 9 Up to 9 Cisco Catalyst switches can be stacked together to build single logical StackWise switch since Cisco IOS XE Release 3.3.0SE.

41. What does the command vlan dot1q tag native accomplish when configured under global configuration? A. All frames within the native VLAN are tagged, except when the native VLAN is set to 1. B. It allows control traffic to pass using the non-default VLAN. C. It removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s). D. Control traffic is tagged

D. Control traffic is tagged. The "vlan dot1q tag native" will tag all untagged frames, including control traffic, with the defined native VLAN.

12. Several new switches have been added to the existing network as VTP clients. All of the new switches have been configured with the same VTP domain, password, and version. However, VLANs are not passing from the VTP server (existing network) to the VTP clients. What must be done to fix this? A. Remove the VTP domain name from all switches with "null" and then replace it with the new domain name B. Configure a different native VLAN on all new switches that are configured as VTP clients. C. Provision one of the new switches to be the VTP server and duplicate information from the existing network D. Ensure that all switch interconnects are configured as trunks to allow VTP information to be transferred.

D. Ensure that all switch interconnects are configured as trunks to allow VTP information to be transferred. VTP allows switches to advertise VLAN info between other members of the same VTP domain. VTP allows a consistent view of the switched network across all switches. There are several reasons why the VLAN information can fail to be exchanged.

44. For client server failover purposes, the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning-tree feature satisfied this requirement? A. Rapid Spanning-tree B. Spanning-Tree Timers C.Spanning-Tree FastPort D. Spanning-Tree PortFast E. Spanning-Tree Fast Forward

D. Spanning-tree PortFast In order to allow immediate transition of the port into forwarding state, enable the STP portfast feature. PortFast immediately transitions the port into STP forwarding mode upon linkup. The port still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mode.

97. Which statement describes what happens if all VSL connections between the virtual switch members are lost? A. Both virtual switch member cease to forward traffic. B. The VSS transitions to the dual active recovery mode, and both virtual switch members continue to forward traffic independently. C. The virtual switch members reload. D. The VSS transitions to the dual active recovery mode, and only the new active virtual switch continues to forward traffic.

D. The VSS transitions to the dual active recovery mode, and only the new active virtual switch continues to forward traffic. What happens if all VSL connections between the virtual switch members are lost? VSLs can be configured with up to 8 links between the 2 switches across any combination of line cards or supervisor ports to provide a high level of redundancy. If for some rare reason all VSL connections are lost between the virtual switch members leaving both the virtual switch members up, the VSS will transition to the dual active recovery mode.

94. Which statement describes what happens when a port configured with root guard receives a superior BPDU? A. The port goes into errdisable state and stops forwarding traffic. B. The port goes into BPDU-inconsistent state and stops forwarding traffic. C. The port goes into loop-inconsistent state and stops forwarding traffic. D. The port goes into root-inconsistent state and stops forwarding traffic.

D. The port goes into root-inconsistent state and stops forwarding traffic. The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are connected together. If the bridge receives superior STP bridge protocol data units on a root guard-enabled port, root guard moves this port to a root-inconsistent stp state. This root-inconsistent state is effectively equal to a listening state. No traffic is forlarded across this port. In this way, the root guard enforces the position of the root bridge

24. A network engineer tries to configure storm control on an etherchannel bundle. What is the result of the configuration? A. The storm control settings will appear on the etherchannel, but not on the associated physical ports. B. The configuration will be rejected because storm control is not supported for etherchannel C. The storm control configuration will be accepted, but will only be present on the physical interfaces. D. The settings will be applied to the Etherchannel bundle and all associated physical interfaces.

D. The settings will be applied to the etherchannel bundle and all associated physical interfaces After you configure an etherchannel, any config that you apply to the port channel int. affects the etherchannel; any config that you apply to the physical int. affects only the int. where you apply the config. Storm control is an exception to this rule. You cannot config storm control on some of the members of an etherchannel; storm control must be configured on all or none of the ports. If you configure storm control on only some of the ports, those ports will be dropped from the etherchannel interface (put in suspended state). Therefore, you should configure storm control at the etherchannel interface level and not the physical int. level

90. Refer to the exhibit. Why would the switch be considered as a root bridge? A. The bridge priority is 1 and all ports are forwarding. B. The switch priority for VLAN 1 and the macro specifies "This Bridge is the root". C. The bridge priority is 128.19 and all ports are forwarding. D. The switch priority value is zero, it has the lowest priority value for VLAN 1.

D. The switch priority value is zero, it has the lowest priority value for VLAN 1. For priority, the range is 0 - 61440 in increments of 4096; the default is 32768. The lower the number, the more likely the switch will be chosen as the root switch.

28. Pilot testing of the new switching infrastructure finds that when the root port is lost, STP immediately replaces the root port with an alternative root port. Which spanning-tree technology is used to accomplish backup root port selection? A. PVST+ B. PortFast C. BackboneFast D. UplinkFast E. Loop Guard F. UDLD

D. UDLD If a switch loses connectivity, it begins using the alternate paths as soon as the spanning tree selects a new root port. By enabling UplinkFast with the spanning-tree uplinkfast global config command, you can accelerate the choice of a new root port when a link or switch fails or whent he spanning tree configures itself. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would with the normal spanning-tree procedures. Uplink fast provides fast convergence after a direct link failure and achieves load balancing between redundant layer 2 links using uplink groups. an uplink group is a set of layer 2 ints., only one of which is forwarding at any given time. An uplink gorup consists of the root port (forwarding) and a set of blocked ports, except for self-looping ports. The upling group provides an alternate path in case the currently forwarding link fails.

36. A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server. Which action resolves this problem? A. Reload the new switch. B. Restart the VTP process on the new switch C. Reload the VTP server D. Verify connected trunk ports

D. Verify connected trunk ports VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work. The first thing that should be done is to verify that the trunk ports are connected and up.

91. Refer to the exhibit. All ports are members of VLAN 10. Considering the default cost of upstream bridges to the root bridge is equal, which option will be the new root port for VLAN 10? A. interface f0/13 B. interface f0/14 C. interface f0/15 D. interface 0/21

D. interface f0/21 Each (non-root) bridge has exactly one root port, which represents the best path to the Root bridge. In this case, fa0/21 has the lowest cost, so it will be the root port.

53. Which option is a possible cause for an errdisabled interface? A. routing loop B. cable unplugged C. STP loop guard D. security violation

D. security violation There are various reasons for the interface to go into errdisable.

4. Which set of configurations will result in all ports on both switches successfully bundling into an EtherChannel? A. switch1 channel-group 1 mode active switch2 channel-group 1 mode auto B. switch1 channel-group 1 mode desirable switch2 channel-group 1 mode passive C. switch1 channel-group 1 mode on switch2 channel-group 1 mode auto D. switch 1 channel-group 1 mode desirable switch2 channel-group 1 mode auto

D. switch1 channel-group 1 mode desirable switch2 channel-group 1 mode auto Active - Passive On - On Desirable - desirable/auto

8. An EtherChannel bundle has been established between a Cisco switch and a corporate web server. The network admin noticed that only one of the EtherChannel links is being utilized to reach the web server. What should be done on the Cisco switch to allow for better EtherChannel utilization to the corporate web server? A. Enable Cisco Express Forwarding to allow for more effective traffic sharing over the EtherChannel bundle B. Adjust the EtherChannel load-balancing method based on destination IP addresses. C. Disable spanning tree on all interfaces that are participating in the EtherChannel bundle. D. Use link-state tracking to allow for improved load balancing of traffic upon link failure to the server. E. Adjust the EtherChannel load-balancing method based on source IP address.

E. Adjust the EtherChannel load-balancing method based on source IP address. EtherChannel load balancing can use MAC addresses, IP addresses, or Layer 4 port numbers, and either source mode, destination mode, or both. The mode you select applies to all EtherChannels that you configure on the switch. Use the option that provides the greatest variety in your configuration. FE, if the traffic on a channel only goes to a single MAC address, use of the dest MAC results in the choice of the same link in the channel each time. Use of the source address or IP address can result in a better load balance.

9. Interface Fa0/1 is configured as a trunk interface that allows all VLANs. This command is configured globally: monitor session 2 filter vlan 1 - 8, 39, 52 What is the result of the implemented command? A. All VLAN traffic is sent to the SPAN destination interface. B. Traffic from VLAN 4 is not sent to the SPAN destination interface. C. Filtering a trunked SPAN port effectively disables SPAN operations for all VLANS. D. The trunk's native VLAN must be changed to something other than VLAN 1 E. Traffic from VLANS 1 to 8, 39, and 52 is replicated to the span destination port

E. Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port. The "monitor session filter" command is used to specify which VLANs are to be port mirrored using SPAN. This example shows how to monitor VLANs 1 through 5 and VLAN 9 when the SPAN source is a trunk interface. monitor session 2 filter vlan 1-5, 9

100. LAB

LAB

99. LAB

LAB

66. Look at study guide

Look at study guide


Ensembles d'études connexes

Geometry: Unit 8 - practice questions

View Set

Modern India: Political Challenges

View Set

Study Guide / Text Questions (Chapter 3, 4,

View Set

ENVIRONMENTAL SCIENCE EXAM 4 CHAPTER 17

View Set

SOC-1113-22269 Exam 1 study guide

View Set

Unit 12 body system 4:The Male Reproductive System

View Set

Chapter 9 Class Test - Legal Descriptions

View Set