Pages from Cisco
Pages from Cisco
You can pass any IT certification exam at your first attempt with just 10‐12
hours study of our guides.
Our study guides contain latest actual exam questions, accurate answers with detailed
explanation verified by experts and all graphics and drag‐n‐drop exhibits shown just as on
the real test.
To test the quality of our guides, you can download the one‐fourth portion of any guide
from http://www.certificationking.com absolutely free. You can also download the guides
for retired exams that you might have taken in the past.
For other payment options and any further query, feel free to mail us at
[email protected]
Product Questions: 550
Version: 33.0
Question: 1
Which two VLAN ranges can you add. modify or delete on a switch'? (Choose two)
A. 1 through 1001
B. 1006 through 4094
C. 1005 through 4094
D. 2 through 1001
E. 2 through 4094
Answer: BD
Question: 2
Which Cisco technology provides network redundancy by combining two physically separate
switches to a single logical switch'?
A. VSS
B. IPPS
C. PAGP
D. LACP
Answer: A
Question: 3
Which two commands configure RSPAN to capture incoming and outgoing traffic on a single
interface'? (Choose two)
Answer: BE
Question: 4
Page | 2
D. HSRP preemption
Answer: A
Question: 5
Answer: A
Question: 6
Answer: B
Question: 7
Answer: C
Question: 8
Answer: B
Question: 9
Which two tasks must you perform to configure DHCP snooping on a device? (choose two)
Page | 3
A. Enable DHCP snooping on the VLAN
B. Enable VRF support for the DHCP relay agent
C. Enable DHCP snooping globally
D. Enable DHCP packet validation on the device.
E. Enable DHCP option 82.
Answer: AC
Question: 10
When the switches in a Cisco Stack Wise stack elect a new master switch, which value is used as the
primary selector'?
A. lowest uptime
B. highest MAC address
C. lowest MAC address
D. highhest administrator assigned priority
Answer: D
Question: 11
Which two commands display trunking information on one or more Ethernet interfaces? (Choose
two)
Answer: BD
Question: 12
Answer: C
Question: 13
Page | 4
C. It is an industry standard protocol for mirroring traffic
D. SPAN destinations participate in spanning tree instances
E. It mirrors traffic from a source port to a destination port on the same switch only
Answer: D
Question: 14
Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two)
Answer: AB
Question: 15
Which command configures ail access ports on a switch to immediately enter the forwarding state
when the switch is reset?
A. spanning-tree portfast
B. spanning-tree portfast bpduguard default
C. spanning-tree portfast default
D. spanning-tree portfast bpdufilter default
Answer: A
Question: 16
Answer: B
Question: 17
Which two commands must you use to configure an interface to send traffic from a non-default
native VLAN across a link that supports all VLANs? (Choose two)
Page | 5
E. switchport access vlan 90
Answer: BD
Question: 18
A. uRPF
B. port security
C. IP source guard
D. DHCP snooping
Answer: D
Question: 19
Answer: B
Question: 20
Which command enables you to determine whether any interface on a device was shut down as a
result of a port security violation?
Answer: D
Question: 21
A. authorization
B. privilege
C. system
D. connection
E. authentication
Answer: AE
Question: 22
Page | 6
Which feature can prevent ARP POISINING ATTACKS ON A DEVICE?
Answer: D
Question: 23
Which two statements about configuring VLANs on switches in VTP server mode are true'? (Choose
two)
Answer: CD
Question: 24
Which two statements about the network environment of the interface that generated this output
are true? (Choose two)
Answer: AB
Question: 25
Page | 7
If all switches in a network have the same spanning-tree priority, which switch is elected as the root
bridge?
Answer: A
Question: 26
Which command enables you Id detect whether both sides of an aggregate link are configured
properly?
Answer: A
Question: 27
Which command identifies the learned addresses in the MAC address table for a device?
Answer: D
Question: 28
Which VTP mode you configure on a VTP domain so that the switch with the highest VTP
configuration revision number in the domain propagates VLAN information to the other switches?
A. client mode
B. server mode
C. off mode
D. transparent mode
Answer: B
Question: 29
Which two tasks must you perform to correctly configure IP Source Guard on a switch? (Choose two)
Page | 8
C. Configure the DHCP snooping relay
D. Enable DHCP snooping on the switch
E. Configure the Ip verify source vlan dhcp-snooping command
Answer: DE
Question: 30
Which two commands display the VLANs that are present in the VLAN database? (Choose two)
Answer: AC
Question: 31
Which two differences between RADIUS and TACACS+ are true? (Choose two)
Answer: AB
Question: 32
Answer: B
Question: 33
How many active virtual gateways can each GLBP group support?
A. 1
B. 2
C. 4
D. 16
Page | 9
Answer: C
Question: 34
Which option is the value of the Tag Protocol Identifier for an 802 1Q tagged frame?
A. 0x0806
B. 0x888E
C. 0x0800
D. 0x8100
Answer: D
Question: 35
Which two statements about IP Source Guard are true? (Choose two)
Answer: DF
Question: 36
Answer: A
Question: 37
Answer: AC
Question: 38
Page | 10
Which two tasks must you perform to enable AAA operations with a remote security database?
(Choose two)
Answer: BE
Question: 39
Which two requirements for dot1 q trunking in IOS are true? (Choose two)
Answer: CE
Question: 40
In which UDLD mode does a link remain up, even when a unidirectional link failure is detected?
A. aggressive
B. enable
C. reset
D. normal
Answer: A
Question: 41
Answer: AD
Question: 42
Which command configures an interface to accept LLDP packets without enabling the interface to
send the packets?
Page | 11
A. IIdp run
B. IIdp transmit
C. IIdp tiv-select
D. IIdp receive
Answer: D
Question: 43
Which device type can act as a client in a system that uses TACACS+?
A. router
B. ADserver
C. end user wireless device
D. end user workstation
Answer: B
Question: 44
Which two statements about source port monitoring in SPAN are true? (Choose two)
A. Traffic through a destination port can be copied and included in the SPAN session.
B. It can monitor individual interfaces within a port channel
C. The entire EtherChannel must be monitored.
D. It can monitor only FaStEthernet and GigabitEthernet port types.
E. It can monitor ingress and egress traffic
Answer: AE
Question: 45
A. LDAP
B. TACACS+
C. RADIUS
D. Kerberos
Answer: C
Question: 46
Which type of load balancing is most appropriate for an Etherchannel that passes traffic from
multiple sources to a single end device?
Page | 12
Answer: C
Question: 47
Which statement is true when UDLD is configured on a link and the link is determined to be
unidirectional?
A. The port remain up for a configured time interval and then error disables if the link remains
unidirectional.
B. LLDP is enabled on the port.
C. The port sends a log message to the console.
D. The port is disabled immediately
Answer: C
Question: 48
Which three features of AAA with TACACS+ are true? (Choose three.)
Answer: A, D, E
Question: 49
A. A switch running in transparent mode saves learned VLANs to its local database.
B. t supports clear-text passwords only.
C. In VTPv2, a new switch can learn the VTP domain name from its peer over a trunk port.
D. Switches running in transparent mode pass VTP messages.
E. It supports only server switch within a network.
Answer: A, D
Question: 50
You have applied this configuration to Switches A, B, C, and D, and the switches are connected to one
another on access ports. Which two additional actions must you take to enable the hosts on VLAN 3
to communicate with one another considering future growth with hosts on additional VLANs?
(Choose two.)
Page | 13
A. Assign VLAN 3 to the ports connecting to the hosts.
B. Configure VLAN 3 as an SVI with a working IP address.
C. Configure VLAN 3 in VLAN database mode.
D. Configure VTP transparent mode to allow hosts with additional VLANs.
E. Reconfigure the access ports connecting the switches as trunk ports.
Answer: A, E
Question: 51
Answer: C
Question: 52
Under which two conditin does Cisco StackWise Virtual transmit data over a virtual link? (Choose
two.)
Answer: B, C
Question: 53
SIMULATION
LAB
Page | 14
Answer: The
information of the
question
VTP Domain name : cisco
VLAN Ids 20 31
IP Addresses 172.16.71.1/24 172.16.132.1/24
These are your specific tasks:
1. Configure the VTP information with the distribution layer switch as the VTP server
2. Configure the VTP information with the access layer switch as a VTP client
3. Configure VLANs on the distribution layer switch
4. Configure inter-VLAN routing on the distribution layer switch
5. Specific VLAN port assignments will be made as users are added to the access layer switches in the
future.
6. All VLANs and VTP configurations are to completed in the global configuration To configure the
switch click on the host icon that is connected to the switch be way of a serial console cable.
Answer: Please refer to Explanation below:
Explanation:
The information of the question
These are your specific tasks:
1. Configure the VTP information with the distribution layer switch TestKing1 as the VTP server
Page | 15
2. Configure the VTP information with the access layer switch TestKing2 as a VTP client
3. Configure VLANs on the distribution layer switch TestKing1
4. Configure inter-VLAN routing on the distribution layer switch TestKing1
5. Specific VLAN port assignments will be made as users are added to the access layer switches in the
future.
6. All VLANs and VTP configurations are to completed in the global configuration To configure the
switch click on the host icon that is connected to the switch be way of a serial console cable.
vtp server configuration:
switch#conf t
switch(config)#vtp mode server
switch(config)#vtp domain CISCO
switch(config)#vlan 20
switch(config)#vlan 31
switch(config)#int vlan 20
switch(if-config)#ip add 172.64.20.1 255.255.255.0
switch(if-config)#no shut
switch(if-config)#int vlan 31
switch(if-config)#ip add 192.162.31.1 255.255.255.0
switch(if-config)#no shut
switch(if-config)#exit
switch#ip routing
switch#copy run start
vtp client configuration:
switch#conf t
switch(config)#vtp mode client
switch(config)#vtp domain CISCO
switch#copy run start
Question: 54
SIMULATION
LAB
Page | 16
VTP Domain name : cisco
VLAN Ids 20 31
IP Addresses 172.16.71.1/24 172.16.132.1/24
These are your specific tasks:
1. Configure the VTP information with the distribution layer switch as the VTP server
2. Configure the VTP information with the access layer switch as a VTP client
3. Configure VLANs on the distribution layer switch
4. Configure inter-VLAN routing on the distribution layer switch
5. Specific VLAN port assignments will be made as users are added to the access layer switches in the
future.
6. All VLANs and VTP configurations are to completed in the global configuration To configure the
switch click on the host icon that is connected to the switch be way of a serial console cable.
Answer: Please refer
to explanation below:
Explanation:
vtp server configuration:
switch#conf t
switch(config)#vtp mode server
switch(config)#vtp domain CISCO
switch(config)#vlan 20
Page | 17
switch(config)#vlan 31
switch(config)#int vlan 20
switch(if-config)#ip add 172.64.20.1 255.255.255.0
switch(if-config)#no shut
switch(if-config)#int vlan 31
switch(if-config)#ip add 192.162.31.1 255.255.255.0
switch(if-config)#no shut
switch(if-config)#exit
switch#ip routing
switch#copy run start
vtp client configuration:
switch#conf t
switch(config)#vtp mode client
switch(config)#vtp domain CISCO
switch#copy run start
Alternative #1
VTP Domain Distribution
VLAN Ids 20 31
IP Addresses 172.16.16.1/24 172.16.193.1/24
Alternative #12
VTP Domain Distribution
VLAN Ids 30 21
IP Addresses 172.16.203.1/24 172.16.93.1/24
Question: 55
DRAG DROP
Drag and drop the characteristic from the left to the matching STP feature on the right.
Answer:
Page | 18
Question: 56
DRAG DROP
Drag the description from the left to add on appropriate section of Port Cost / Switch Port Priority /
Port Priority
Page | 19
Answer:
Question: 57
DRAG DROP
Page | 20
Drag the description from the left to add on appropriate section on right
Answer:
Question: 58
DRAG DROP
Drop the STP components from the left onto the correct descriptions on the right.
Page | 21
Answer:
Question: 59
DRAG DROP
Drag and drop the LLDP-MED TLVs from the left onto the correct statements on the right.
Page | 22
Answer:
Question: 60
DRAG DROP
Drag the appropriate from left to right on description.
Page | 23
Answer:
Question: 61
DRAG DROP
Drag the appropriate from left to right on description.
Page | 24
Answer:
Question: 62
DRAG DROP
Drag the appropriate from left to right on description.
Page | 25
Answer:
Question: 63
DRAG DROP
Drag and drop the statements about SPAN source and destination ports from the left onto the correct
port types on the right
Page | 26
Answer:
Question: 64
Refer to the exhibit.
Page | 27
Which two statements about the network environment are true? (Choose two)
A. The two aaaa.aaaa.aaaa MAC address entries must be from the same VLAN
B. Interfaces Fa0/a and Fa0/3 cannot communicate via Layer 2 switching
C. Interfaces Fa0/1 and Fa0/2 cannot communicate via Layer 2 switching
D. The two aaaa.aaaa.aaaa MAC address entries must be from different VLANs
E. Interfaces Fa0/2 and Fa0/3 can communicate via Layer 2 switching.
Answer: CD
Question: 65
Answer: D
Question: 66
Which two DTP negotiated interface mode combinations negotiate to form an access port? (Choose
two )
Answer: AD
Question: 67
Page | 28
Currently, R1 is the VRRP master virtual router. Which statement about the VRRP configuration on R1
and R2 is true?
Answer: B
Question: 68
Answer: BE
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-series-
switches/prod_white_paper09186a00801b096a.html
Question: 69
Page | 29
A physical switch port is part of an EtherChannel group. What happens while the same port is
configured as a SPAN destination?
Answer: A
Question: 70
Which two conditions must be met to establish a Layer 2 EtherChannel? (Choose two.)
Answer: AC
Question: 71
A. Plain-text
B. CHAP
C. PAP
D. 802.1x
E. MD5
Answer: AE
Question: 72
Answer: AE
Explanation/Reference:
http://brbccie.blogspot.com/2014/07/vtp-v3.html
Supports extended VLANs (1006 - 4094)
VTP can now be turned off completely, as opposed to just transparent mode
Fixes the bane of VTP v1/2, the accidental-high-configuration-revision-wipes-out-your-network issue,
Page | 30
by design it does this no configuration is necessary.
Question: 73
Which feature actively validates DHCP messages and drops invalid messages?
A. IGMP snooping
B. DHCP host tracking
C. CGMP binding
D. DHCP snooping
E. DHCP inspection
F. Dynamic ARP inspection
Answer: D
Question: 74
A. The source and destination ports must reside in the same switch or switch stack.
B. It can monitor only traffic that ingresses or egresses on the source interface or VLAN.
C. A SPAN session can support multiple destination ports only if they are on the same VLAN.
D. Each SPAN session supports only one source VLAN or interface.
E. A switch can support only one local SPAN session at a time.
Answer: AB
Question: 75
DRAG DROP
Drag and drop the characteristic from the left to the matching STP category on the right
Page | 31
Answer:
Question: 76
Refer to the exhibit.
You have configured routers R1 and R2 with VRRP for load sharing as shown. Which two effects of
this configuration are true? (Choose two.)
A. Router R2 is the primary gateway for 10.1.0.1 and Router R1 is the primary gateway for 10.1.0.10.
B. PC2 and PC4 use router R1 as the primary gateway.
Page | 32
C. The four PCs send all request to router R1, which forward traffic to router R2 as necessary.
D. Router R1 is the primary gateway for 10.1.0.1 and router R2 is the primary gateway for 10.1.0.10.
E. PC1 and PC3 use router R1 as the primary gateway.
F. The four PCs send packets round-robin between routers R1 and R2.
Answer: DE
Question: 77
Which two prerequisites for HSRP to become active on an interface are true? (Choose two.)
Answer: BD
Question: 78
Which two statements about the network environment of the device that generated this output are
true? (Choose two.)
Answer: AE
Question: 79
Which two statements about Cisco Discovery Protocol are true? (Choose two)
Page | 33
A. It is not supported with SNMP
B. It runs on OSI Layer 2
C. It is supported on Frame Relay subinterfaces
D. It uses a TLV to advertise the native VLAN
E. It runs on OSI Layer 1
Answer: BD
Question: 80
Answer: CE
Question: 81
Which command is required for root guard for Cisco device to place ID:2071948x?
(Where x is the last digit ID)
Answer: A
Question: 82
Which component does the GLBP client cache stores for each host of a particular GLBP group?
A. IP address
B. MAC address
C. VLAN
D. Token ring
E. DCSP
Answer: B
Question: 83
Which three design types of capable Ethernet LANs does HSRP support? (Choose three.)
A. Multicaccess
B. Multicast
Page | 34
C. Broadcast
D. Unicast
E. Token Ring
F. FDDI
Answer: ABC
Question: 84
Which statement is true when one of its virtual gateway redundancy with an AVF has failed?
A. If an AVF has failed, one of the primary virtual forwarders in the listen state assumes responsibility
for the virtual MAC address.
B. If an AVF has failed, one of the secondary virtual forwarders in the listen state assumes
responsibility for the virtual MAC address.
C. If an AVF has failed, one of the secondary virtual forwarders in the listen state will also fail.
D. If an AVF has failed, one of the primary virtual forwarders in the listen state will also fail.
Answer: B
Question: 85
A. learn
B. listen
C. init
D. reply
Answer: B
Question: 86
Answer: C
Question: 87
A. DHCP Snooping
B. DHCP Acknowledge
C. DHCP Request
D. DHCP Spoofing
Page | 35
Answer: A
Question: 88
Answer: A
Question: 89
Which two statements correctly describe the benefits of GLBP? (Choose two.)
Answer: AE
Question: 90
Which two statements about manually-configured LACP EtherChannels are true? (Choose two)
Answer: AC
Question: 91
Which two statements about extended-range VLANs are true? (Choose two.)
Page | 36
Answer: BE
Question: 92
When Ether Channel guard is enabled and a misconfiguration is detected on a port, how does the
port respond"?
Answer: B
Question: 93
Which three pieces of information about the remote device are reported by Cisco Discovery
Protocol? (Choose
three.)
Answer: CDF
Question: 94
When port security is configured on a switch, which violation mode is the default?
A. shutdown
B. logging
C. no change
D. error disable
Answer: A
Question: 95
For which reason does an administrator disable MAC address learning within a VLAN?
Answer: C
Page | 37
Question: 96
Which command can be used to block a frame with an unknown destination MAC address from being
forwarded out of an interface?
A. Switchport protected
B. It is not forwarded it the destination MAC address is unknown
C. switchport port-fast
D. switchport block unicast
Answer: A
Question: 97
Which two statement can be derived from the output of the show standby command? (Choose two.)
Answer: DE
Question: 98
Which two statements about HSRP, GLBP, and VRRP are true? (Choose two.)
Answer: C, D
Page | 38
Question: 99
When a Layer 2 EtherChannel is configured, which statement about interaction with the Spanning
Tree Protocol is true?
Answer: B
Question: 100
Which statement about the default behavior of a Cisco switch MAC address table is true?
Answer: D
Question: 101
DRAG DROP
Drag and drop the correct statements about HSRP from the left into the True column on the right
Not all options arc used.
Answer:
Page | 39
Question: 102
Which two statements about the monitored traffic in a SPAN session are true? (Choose two )
A. You cannot configure two separate SPAN or RSPAN source sessions with separate or overlapping
sets of SPAN source ports and VLANs.
B. By default, all monitored packets are captured without the IEEE 802.1Q tag
C. Egress SPAN monitors packets sent by the source interface before any QoS modifications
D. Sources can be ports or VLANs or any combination in the same session
E. By default, all monitored packets include the IEEE 802.1Q tag that they had on the source port
F. Ingress SPAN monitors packets received by the source interface before any QoS modifications
Answer: CF
Question: 103
Which configuration do you apply to a device to place interface GigabrtEthernet0/0 info VRRP group
10?
A. interface GigabitEthernet0/0
ip address 172.16.13.2 265 255.255.0
standby 10 ip 172.16.13.254 255.255.255.0
standby 10 priority 120
standby 10 preempt
B. interface GigabitEthernet0/0
description to Executive Offices A 08-38338
ip address 172.16.13.2 265.255.255.0
vrrp 10 ip 172.16.13.254 255.255.255.0
vrrp 10 active
C. interface GigabitEthernet0/0
description to Executive Offices A 08-38338
ip address 172.16.13.2 255.255.250.0
vrrp group 10 ip 172.16.13.254 255.256.255.0
vrrp group 10 priority 120
D. interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0
vrrp 10 ip 172.16.13.254
vrrp 10 priority 120
vrrp 10 preempt
E. interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0
Page | 40
vrrp 10 ip 172.16.13.254 256.255.255.0
vrrp 10 priority 120
vrrp 10 preempt
F. interface GigabitEthernet0/0
ip address 172.16.13.2 255.255.255.0
standby 10 ip 172.16.13.254
Answer: D
Question: 104
Which virtual MAC address does HSRP group 37 use with default configuration?
A. C0.00:00:25:00:00
B. 00:00:0c:07:ac:25
C. C0:00:00:37:00:00
D. 00:00:00c:07:ac:37
Answer: B
Question: 105
Which statement about the configuration of a trunk port as the source of a SPAN session is true?
A. Only VLANs that are configured individually as SPAN sources are monitored.
B. All VLANs on the trunk are monitored.
C. The trunk is errdisabled automatically.
D. All VLANs on the trunk are monitored, provided the SPAN destination port is a trunk.
Answer: B
Question: 106
On which PVLAN type can host ports communicate with promiscuous ports?
A. primary
B. community
C. promiscuous
D. isolated
Answer: C
Question: 107
Which feature places a port in an err-disabled state when it receives an unanticipated BPDU?
A. loop guard
B. root guard
C. BPOU guard
D. BPDU filtering
Page | 41
Answer: C
Question: 108
Answer: BC
Question: 109
Which feature do you implement so that a physical port enters the loop inconsistent state if it fails to
receive BPDUs?
A. loop guard
B. loop disable
C. root guard
D. flex links
E. BPDU ignore
F. loop block
Answer: A
Question: 110
Which two restrictions of the port security feature are true? (Choose two.)
Answer: BC
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SY/configuration/guide/sy_swcg/port_security.html#84716
Question: 111
Page | 42
When troubleshooting a network problem, a network analyzer is connected to Port f0/1 of a LAN
switch. Which command can prevent BPDU transmission on this port?
Answer: C
Question: 112
Which two StackWise configuration setting types are applied at the system level? (Choose two)
A. port-security settings
B. VLAN settings
C. speed/duplex settings
D. SNMH settings
E. 802.1k settings
Answer: BD
Question: 113
A. BPDU guard
B. PortFast
C. root guard
D. BPDU filtering
Answer: D
Question: 114
Which type of MAC address can be dropped by a switch that is configured for MAC address filtering?
A. unicast
B. router
C. multicast
D. CPU-destined
Answer: A
Question: 115
Page | 43
A network engineer is installing a switch for temporary workers to connect to. The engineer does not
want this switch participating in Spanning Tree with the rest of the network; however, end user
connectivity is still required. Which spanning-tree feature accomplishes this?
A. BPDUblock
B. BPDUfilter
C. BPDUignore
D. BPDUguard
E. BPDUdisable
Answer: B
Question: 116
Which two statements about the network environment of the device that generated this output are
true? (Choose two.)
A. The local device has a higher priority setting than the active router.
B. The virtual IP address of the HSRP group is 10.1.1.1
C. If a router with a higher IP address and same HSRP priority as the active router becomes available,
that router becomes the new active router 5 seconds later.
D. if the local device fails to receive a hello from the active router for more than 5 seconds, it can
become the active router.
E. The hello and hold timers are set to custom values.
Answer: BC
Question: 117
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database.
What is the solution to avoid the snooping database from being rebuilt after every device reboot?
Page | 44
E. Apply ip dhcp snooping trust on all interfaces with dynamic addresses.
Answer: A
Question: 118
Which two statements about the spanning-tree operation of this switch are true? (Choose two )
Answer: AD
Question: 119
A switch has been configured with the Vlan dot1q tag native command. Which statement describes
what the switch does with untagged frames that it receives on a trunked interface?
Answer: B
Question: 120
Which four LACP components are used to determine which hot-standby links become active after an
Page | 45
interface failure within an EtherChannel bundle? (Choose four.)
Answer: A, B, D, E
Question: 121
Answer: BD
Question: 122
Answer: CD
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/asr903/fhp-xe-
3s-asr903-book/fhp-vrrp.pdf
Question: 123
Which security violation mode drops packets with unknown source addresses and increments the
violation counter ?
A. Shutdown
B. Restrict
C. Protect
D. Drop
E. Inhibit
Answer: B
Page | 46
Question: 124
Answer: CD
Question: 125
Answer: BE
Question: 126
Page | 47
You change a switch SDM template to maximize the number of supported MAC addresses You notice
that the switch routing performance has been significantly degraded. Which action do you take to
correct the problem?
Answer: C
Question: 127
Which two ways can you use to disable Cisco Discovery Protocol? (Choose two.)
Answer: BE
Question: 128
A. VTP pruning
B. transparent bridging
C. trunk allowed VLANs
D. VLAN access-list
E. L2P tunneling
Answer: C
Question: 129
Page | 48
A. It automatically enables uplinkfast and backbonefast.
B. It elects one root switch per vlan instance
C. It support two stp instances per vlan
D. It is incompatible with spanning tree portfast
E. Backwards compatibility with 802.1d is not supported
F. It requires approximately 50 seconds to complete reconvergence
Answer: AB
Question: 130
Which two statements about HSRP timers are true? (Choose two.)
Answer: BD
Question: 131
A. When MST is enabled. RSTP is automatically enabled and MST will use BPDU version 4, maximum
of 16 instances of MST can exist
B. When MST is enabled. RSTP is automatically disabled and MST will use BPDU version 2. maximum
of 16 instances of MST can exist.
C. When MST is enabled. RSTP is automatically enabled and MST will use BPDU version 2, maximum
of 16 instances of MST can exist.
D. When MST is enabled, RSTP is automatically disabled and MST will use BPDU version 4, maximum
of 16 instances of MST can exist.
Answer: C
Question: 132
Which two configuration requirements for port security are true? (Choose two.)
Answer: AB
Question: 133
Page | 49
Which file lists all of the configured VLANs on a switch?
A. flash:vlan.dat
B. nvram:vlans.xml
C. flash:vlans.txt
D. nvram:vlan.txt
E. flash.config.txt
F. flash:vlan.xml
Answer: A
Question: 134
Which statement about Layer 2 protocol participation of ports involved m a SPAN session is true?
A. Neither a SPAN source nor SPAN destination participates m any Layer 2 protocols.
B. A SPAN source does not participate n any Layer 2 protocols
C. A SPAN destination does not participate n any Layer 2 protocols
D. Both SPAN source and SPAN destination participate in any Layer 2 protocols
Answer: C
Question: 135
Answer: CD
Question: 136
Under which two circumstances does a stack master lose its role?
Answer: BE
Question: 137
RSPAN has been configured on a Cisco Catalyst switch; however, traffic is not being replicated to the
remote switch. Which type of misconfiguration is a cause?
Page | 50
A. The RSPAN designated VLAN is missing the remote span command.
B. The local and remote RSPAN switches are configured using different session IDs.
C. The local RSPAN switch is replicating only Rx traffic to the remote switch.
D. The local switch is overloaded with the amount of sourced traffic that must be replicated to the
remote switch.
Answer: A
Question: 138
Answer: BD
Question: 139
Which two commands ensure that dsw1 becomes root bridge for vlan 10 ?
Page | 51
D. DSW2(Config)#spanning-tree vlan 10 priority root
E. DSW2(Config)#spanning-tree vlan 10 port-priority 0
Answer: BD
Question: 140
Answer: AE
Question: 141
Which two command sequences must you enter on a pair of switches so that they negotiate an
EtherChannel using the Cisco proprietary port-aggregation protocol? (Choose two.)
A. channel-protocol lacp
channel-group 1 mode on
B. channel-protocol pagp
channel-group 1 mode auto
C. channel-protocol lacp
channel-group 1 mode active
D. channel-protocol pagp
channel-group 1 mode desirable
E. channel-protocol pagp
channel-group 1 mode on
Answer: BD
Question: 142
Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
Page | 52
A. SW1(config-vlan)#ip arp inspection vlan 15
B. SW1(config-v1an)#ip arp inspection trust
C. SW1(config)#ip arp inspection vlan 15
D. SW1(config-if)#ip arp-inspection trust
Answer: C
Question: 143
A. The port moves immediately to the forwarding state when a device is connected
B. it allows the port to skip the learning state only.
C. It forces the port to skip all spanning-tree states
D. It is most appropriate for ports that provide connectivity to individual workstations or servers
E. The port is error-disabled if it attempts to move into the listening or /earning states.
Answer: AD
Question: 144
A. If not carefully planned, SPAN can lead to loops between source and destination ports.
B. SPAN doubles traffic internally
C. SPAN blocks for normal use one additional port for each configured source port
D. SPAN halves the capacity of the source port.
Answer: C
Question: 145
Which two statements about VRRP advertisements are true? (Choose two)
Answer: DE
VRRP Advertisements
The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the virtual router master. The VRRP
advertisements are encapsulated in IP packets and sent to the IP Version 4 multicast address
assigned to the VRRP group. The advertisements are sent every second by default; the interval is
configurable.
Although the VRRP protocol as per RFC 3768 does not support millisecond timers, Cisco routers allow
you to configure millisecond timers. You need to manually configure the millisecond timer values on
both the primary and the backup routers. The master advertisement value displayed in
the show vrrp command output on the backup routers is always 1 second because the packets on the
Page | 53
backup routers do not accept millisecond values.
You must use millisecond timers where absolutely necessary and with careful consideration and
testing. Millisecond values work only under favorable circumstances, and you must be aware that the
use of the millisecond timer values restricts VRRP operation to Cisco devices only.
Question: 146
Which statement about the default Switch Database Management template is true?
A. The default template disables routing and supports the maximum number of unicast MAC
addresses
B. The default template gives balance to all functions.
C. The default template maximizes system resources for unicast routing
D. The default template maximizes system resources for access control lists
Answer: B
Question: 147
Which two statements about the VLAN database are true? (Choose two )
Answer: BC
Question: 148
Which two statements about error-disabled ports are true? (Choose two.)
Answer: BD
When a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on
that port. The port LED is set to the orange color and, when you issue the show interfaces command,
the port status shows as Errdisabled.
Question: 149
Which keyword can be applied to the spanning-tree priority command that allows the IT department
to adjust the timers based on the number of switches between any two end stations?
A. hello-time
Page | 54
B. cost
C. diameter
D. priority
E. root primary
Answer: C
Use the diameter keyword to specify the Layer 2 network diameter (that is, the maximum number of
switch hops between any two end stations in the Layer 2 network). When you specify the network
diameter, the switch automatically sets an optimal hello time, forward-delay time, and maximum-
age time for a network of that diameter, which can significantly reduce the convergence time. You
can use the hello keyword to override the automatically calculated hello time.
Question: 150
Which two statements about LLDP frames are true? (Choose two)
Answer: AF
Question: 151
Which two tasks must you perform to enable DHCP option 82 on an untrusted port? (Choose two)
A. Enter the ip dhcp snooping information option replace command to enable DHCP option 82.
B. Enter the ip dhcp snooping trust command to enable DHCP option 82.
C. Enter the ip dhcp snooping information option allow-untrusted command to enable the untrusted
port.
D. Enter the ip dhcp snooping information option command to enable option 82.
E. Enter the ip dhcp snooping trust command to enable data insertion DHCP option 82.
Answer: CD
Question: 152
Refer to Exhibit.
Page | 55
You have applied these configurations to switches A, B, C and D respectively and the switches are
connected to one another on a trunk port that is passing all VLAN traffic. Which statements about
traffic on the network is true?
A. Unless a Layer 3 device is installed, hots on any of the switches will be able to communicate only
with other hosts on the same switch.
B. Hosts on all four switches can communicate normally with one another on VLAN 10 only.
C. Unless a Layer 3 device in installed, hosts on the FastEthernet 0/1 interface of switch D will be
unable to communicate with hosts on the other switches.
D. Hosts on all four switches can communicate normally with one another over the trunk port.
Answer: C
Question: 153
Answer: BE
Page | 56
Question: 154
Which two Criteria must be met to support SSO redundancy in a Cisco StackWise environment?
(Choose two)
Answer: AE
Question: 155
Answer: D
Question: 156
For which reason would you configure RSPAN instead of SPAN on your network?
A. Only RSPAN can log traffic on a VLAN that spans multiple switches
B. RSPAN provides more complete monitoring of the traffic on a single switch.
C. Only RSPAN supports STP on multiple switches across a campus
D. Only RSPAN devices can monitor traffic on other devices
Answer: D
Question: 157
Page | 57
E. It is vendor neutral
Answer: CE
Question: 158
Which configuration do you apply to an interface so that a host can be placed into VLAN 593?
A. interface GigabitEthernetO/0
switchport mode access
switchport access vlan 593
switchport host
B. interface GigabitEthernetO/0
switchport trunk encapsulation dotlq
switchport trunk native vlan 593
switchport access vlan 593
C. interface GigabitEthernetO/0
switchport mode trunk
switchport trunk allowed vlan 593
D. interface GigabttEthtrnetO/0.593
encapsulation dotlq 593
switchport access vlan 593
Answer: A
Question: 159
Which two commands remove VLAN 100 from the VLANs allowed on the trunk port? (Choose two )
Answer: AC
Question: 160
If a switch that is configured globally with DHCP snooping receives a packet that has DHCP Option-82
set to 192 168.1.254, how does the switch handle the packet?
A. It replaces the source MAC address of the packet with its own MAC address and forwards the
packet
B. It forwards the packet normally
Page | 58
C. It sends a proxy ARP request for the MAC address of 192 168.1 254
D. It drops the packet
E. It removes the Option-82 information from the packet and forwards the packet
F. It replaces the source IP address of the packet with its own management IP address and forwards
the packet
Answer: B
Question: 161
Answer: A
Question: 162
A pair of fiber that is connected to Gi0/1 has been damaged. What is likely to happen?
Answer: A
Question: 163
After reviewing UDLD status on switch ports an engineer notices that the current bidirectional state
for an access port is "Unknown" Which statement describes what this indicates about the status of
the port?
A. The UDLD port is placed in the "unknown" state for 5 seconds until the next UDLD packet is
received on the interface.
B. The bidirectional status of "unknown" indicates that the port will go into the disabled state
because it stopped receiving UDLD packets from its neighbor
C. The port is fully operational and no known issues are detected
D. UDLD moved into aggressive mode after inconsistent acknowledgements were detected
Answer: C
Page | 59
Question: 164
Which two statements about native VLANs are true? (Choose two)
Answer: BE
Question: 165
Which two statements about an access port with voice VLAN are true? (Choose two. )
A. Frames on the Voice VLAN are tagged with a Layer 2 CoS value.
B. They can be configured on trunk ports and access ports.
C. They can be configured on VLANs 1 through 1001 only.
D. They support a single VLAN for data traffic.
E. They require VTP
Answer: A, D
Question: 166
Answer: D, E
Question: 167
Which of two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose
two.)
Answer: D, E
Question: 168
Page | 60