Test Questions Flashcards
An EtherChannel bundle has been established between a Cisco switch and a corporate web server. The network administrator noticed that only one of the EtherChannel links is being utilized to reach the web server. What should be done on the Cisco switch to allow for better EtherChannel utilization to the corporate web server?
a. Enable Cisco Express Forwarding to allow for more effective traffic sharing over the EtherChannel bundle.
b. Adjust the EtherChannel load-balancing method based on destination IP addresses.
c. Disable spanning tree on all interfaces that are participating in the EtherChannel bundle.
d. Use link-state tracking to allow for improved load balancing of traffic upon link failure to the server.
e. Adjust the EtherChannel load-balancing method based on source IP addresses.
e. Adjust the EtherChannel load-balancing method based on source IP addresses.
Interface FastEthernet0/1 is configured as a trunk interface that allows all VLANs. This command is configured globally: monitor session 2 filter vlan 1 - 8, 39, 52 What is the result of the implemented command?
a. All VLAN traffic is sent to the SPAN destination interface.
b. Traffic from VLAN 4 is not sent to the SPAN destination interface.
c. Filtering a trunked SPAN port effectively disables SPAN operations for all VLANs.
d. The trunk’s native VLAN must be changed to something other than VLAN 1.
e. Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port.
e. Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port.
A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery Protocol, but it has several routing neighbor relationships. What would cause the output to show only the single neighbor?
a. The routers are connected via a Layer 2 switch.
b. IP routing is disabled on neighboring devices.
c. Cisco Express Forwarding is enabled locally.
d. Cisco Discovery Protocol advertisements are inconsistent between the local and remote devices.
a. The routers are connected via a Layer 2 switch.
After the implementation of several different types of switches from different vendors, a network engineer notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which vendor-neutral protocol could be used to resolve this issue?
a. Local Area Mobility
b. Link Layer Discovery Protocol
c. NetFlow
d. Directed Response Protocol
b. Link Layer Discovery Protocol
Several new switches have been added to the existing network as VTP clients. All of the new switches have been configured with the same VTP domain, password, and version. However, VLANs are not passing from the VTP server (existing network) to the VTP clients. What must be done to fix this?
a. Remove the VTP domain name from all switches with “null” and then replace it with the new domain name.
b. Configure a different native VLAN on all new switches that are configured as VTP clients.
c. Provision one of the new switches to be the VTP server and duplicate information from the existing network.
d. Ensure that all switch interconnects are configured as trunks to allow VTP information to be transferred.
d. Ensure that all switch interconnects are configured as trunks to allow VTP information to be transferred.
After implementing VTP, the extended VLANs are not being propagated to other VTP switches. What should be configured for extended VLANs?
a. VTP does not support extended VLANs and should be manually added to all switches.
b. Enable VTP version 3, which supports extended VLAN propagation.
c. VTP authentication is required when using extended VLANs because of their ability to cause network instability.
d. Ensure that all switches run the same Cisco IOS version. Extended VLANs will not propagate to different IOS versions when extended VLANs are in use.
b. Enable VTP version 3, which supports extended VLAN propagation.
Refer to the exhibit. Switch A, B, and C are trunked together and have been properly configured for VTP. Switch C receives VLAN information from the VTP server Switch A, but Switch B does not receive any VLAN information. What is the most probable cause of this behavior?
a. Switch B is configured in transparent mode.
b. Switch B is configured with an access port to Switch A, while Switch C is configured with a trunk port to Switch B.
c. The VTP revision number of the Switch B is higher than that of Switch A.
d. The trunk between Switch A and Switch B is misconfigured.
a. Switch B is configured in transparent mode.
Refer to the exhibit. Switch A, B, and C are trunked together and have been properly configured for VTP. Switch B has all VLANs, but Switch C is not receiving traffic from certain VLANs. What would cause this issue?
a. A VTP authentication mismatch occurred between Switch A and Switch B.
b. The VTP revision number of Switch B is higher than that of Switch A.
c. VTP pruning is configured globally on all switches and it removed VLANs from the trunk interface that is connected to Switch C.
d. The trunk between Switch A and Switch B is misconfigured.
c. VTP pruning is configured globally on all switches and it removed VLANs from the trunk interface that is connected to Switch C.
After the recent upgrade of the switching infrastructure, the network engineer notices that the port roles that were once “blocking” are now defined as “alternate” and “backup.” What is the reason for this change?
a. The new switches are using RSTP instead of legacy IEEE 802.1D STP.
b. IEEE 802.1D STP and PortFast have been configured by default on all newly implemented Cisco Catalyst switches.
c. The administrator has defined the switch as the root in the STP domain.
d. The port roles have been adjusted based on the interface bandwidth and timers of the new Cisco Catalyst switches.
a. The new switches are using RSTP instead of legacy IEEE 802.1D STP.
An administrator recently configured all ports for rapid transition using PortFast. After testing, it has been determined that several ports are not transitioning as they should. What is the reason for this?
a. RSTP has been enabled per interface and not globally.
b. The STP root bridge selection is forcing key ports to remain in non-rapid transitioning mode.
c. STP is unable to achieve rapid transition for trunk links.
d. The switch does not have the processing power to ensure rapid transition for all ports.
c. STP is unable to achieve rapid transition for trunk links.
Which technique automatically limits VLAN traffic to only the switches that require it?
a. access lists
b. DTP in nonegotiate
c. VTP pruning
d. PBR
c. VTP pruning
What effect does the mac address-table aging-time 180 command have on the MAC address-table?
a. This is how long a dynamic MAC address will remain in the CAM table.
b. The MAC address-table will be flushed every 3 minutes.
c. The default timeout period will be 360 seconds.
d. ARP requests will be processed less frequently by the switch.
e. The MAC address-table will hold addresses 180 seconds longer than the default of 10 minutes.
a. This is how long a dynamic MAC address will remain in the CAM table.
While working in the core network building, a technician accidently bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did not recover. What solution allows the network switch to automatically recover from such an issue?
a. macros
b. errdisable autorecovery
c. IP Event Dampening
d. command aliases
e. Bidirectional Forwarding Detection
b. errdisable autorecovery
A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU of the switch to spike during peak working hours. What is the root cause of this issue?
a. The VLAN receives additional frames from neighboring switches.
b. The SDM VLAN template causes the MAC address-table to overflow.
c. The VLAN template disables routing in hardware.
d. The switch needs to be rebooted before the SDM template takes effect.
c. The VLAN template disables routing in hardware.
An access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network administrator notices that not all traffic is being replicated to the management server. What is a cause for this issue?
a. VLAN filters are required to ensure traffic mirrors effectively.
b. SPAN encapsulation replication must be enabled to capture EtherChannel destination traffic.
c. The port channel can be used as a SPAN source, but not a destination.
d. RSPAN must be used to capture EtherChannel bidirectional traffic.
c. The port channel can be used as a SPAN source, but not a destination.
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server. Which option is the cause of this issue?
a. The DHCP server does not support information option 82.
b. The DHCP client interfaces have storm control configured.
c. Static DHCP bindings are not configured on the switch.
d. DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address allocation.
a. The DHCP server does not support information option 82.
A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?
a. The local DHCP server is disabled prior to enabling IP Source Guard.
b. The interfaces are configured as Layer 3 using the no switchport command.
c. No VLANs exist on the switch and/or the switch is configured in VTP transparent mode.
d. The switch is configured for sdm prefer routing as the switched database management template.
e. The configured SVIs on the switch have been removed for the associated interfaces.
b. The interfaces are configured as Layer 3 using the no switchport command.
- QUESTION 18 - The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this command impact the traffic? (Choose three.)
a. SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level threshold.
b. The switchport is disabled when unicast traffic reaches 75% of the total interface bandwidth.
c. The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
d. Only broadcast traffic is limited by this particular storm control configuration.
e. Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total interface bandwidth.
f. The switch drops broadcasts when they reach 75% of bandwidth.
c. The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
d. Only broadcast traffic is limited by this particular storm control configuration.
f. The switch drops broadcasts when they reach 75% of bandwidth.
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state?
a. Normal UDLD operations that prevent traffic loops.
b. UDLD port is configured in aggressive mode.
c. C. UDLD is enabled globally.
d. UDLD timers are inconsistent.
b. UDLD port is configured in aggressive mode.
After reviewing UDLD status on switch ports, an engineer notices that the current bidirectional state for an access port is “Unknown.” Which statement describes what this indicates about the status of the port?
a. The port is fully operational and no known issues are detected.
b. The bidirectional status of “unknown” indicates that the port will go into the disabled state because it stopped receiving UDLD packets from its neighbor.
c. UDLD moved into aggressive mode after inconsistent acknowledgements were detected.
d. The UDLD port is placed in the “unknown” state for 5 seconds until the next UDLD packet is received on the interface.
a. The port is fully operational and no known issues are detected.
- QUESTION 21 - Pilot testing of the new switching infrastructure finds that when the root port is lost, STP immediately replaces the root port with an alternative root port. Which spanning-tree technology is used to accomplish backup root port selection?
a. PVST+
b. PortFast
c. BackboneFast
d. UplinkFast
e. Loop Guard
f. UDLD
d. UplinkFast
- QUESTION 22 - A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose two.)
a. port-priority
b. cost
c. forward-timers
d. link type
e. root guard
a. port-priority
b. cost
- QUESTION 23 - A network engineer must set the load balance method on an existing port channel. Which action must be done to apply a new load balancing method?
a. Configure the new load balancing method using port-channel load-balance.
b. Adjust the switch SDM back to “default”.
c. Ensure that IP CEF is enabled globally to support all load balancing methods.
d. Upgrade the PFC to support the latest load balancing methods.
a. Configure the new load balancing method using port-channel load-balance.
- QUESTION 24 - Refer to the exhibit. A network engineer investigates a recent network failure and notices that one of the interfaces on the switch is still down. What is causing the line protocol on this interface to be shown as down?
a. There is a layer 1 physical issue.
b. There is a speed mismatch on the interface.
c. The interface is configured as the target of the SPAN session.
d. The interface is configured as the source of the SPAN session.
e. There is a duplex mismatch on the interface.
c. The interface is configured as the target of the SPAN session.
While doing network discovery using Cisco Discovery Protocol, it is found that rapid error tracking is not currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms using Cisco Discovery Protocol?
a. Cisco Discovery Protocol version 2
b. Cisco IOS Embedded Event Manager
c. logging buffered
d. Cisco Discovery Protocol source interface
e. Cisco Discovery Protocol logging options
a. Cisco Discovery Protocol version 2
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
a. switch(config)# errdisable recovery interval 180
b. switch(config)# errdisable recovery cause psecure-violation
c. switch(config)# switchport port-security protect
d. switch(config)# switchport port-security aging type inactivity
e. switch(config)# errdisable recovery cause security-violation
b. switch(config)# errdisable recovery cause psecure-violation
The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.)
a. switch# show mac address-table
b. switch# show port-security
c. switch# show ip verify source
d. switch# show ip arp inspection
e. switch# show mac address-table address
a. switch# show mac address-table
e. switch# show mac address-table address
A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported, so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?
a. IRDP
b. LLDP
c. NDP
d. LLTD
b. LLDP
A manager tells the network engineer to permit only certain VLANs across a specific trunk interface. Which option can be configured to accomplish this?
a. allowed VLAN list
b. VTP pruning
c. VACL
d. L2P tunneling
a. allowed VLAN list
- QUESTION 30 - For client server failover purposes, the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning-tree feature satisfies this requirement?
a. Rapid Spanning-Tree
b. Spanning-Tree Timers
c. Spanning-Tree FastPort
d. Spanning-Tree PortFast
e. Spanning-Tree Fast Forward
d. Spanning-Tree PortFast
Which command does a network engineer use to verify the spanning-tree status for VLAN 10?
a. switch# show spanning-tree vlan 10
b. switch# show spanning-tree bridge
c. switch# show spanning-tree brief
d. switch# show spanning-tree summary
e. switch# show spanning-tree vlan 10 brief
a. switch# show spanning-tree vlan 10
A new network that consists of several switches has been connected together via trunking interfaces. If all switches currently have the default VTP domain name “null”, which statement describes what happens when a domain name is configured on one of the switches?
a. The switch with the non-default domain name restores back to “null” upon reboot.
b. Switches with higher revision numbers does not accept the new domain name.
c. VTP summary advertisements are sent out of all ports with the new domain name.
d. All other switches with the default domain name become VTP clients.
c. VTP summary advertisements are sent out of all ports with the new domain name.
While troubleshooting a network outage, a network engineer discovered an unusually high level of broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of bandwidth used by broadcast traffic?
a. storm control
b. SDM routing
c. Cisco IOS parser
d. integrated routing and bridging
e. Dynamic ARP Inspection
a. storm control
A network engineer is setting up a new switched network. The network is expected to grow and add many new VLANs in the future. Which Spanning Tree Protocol should be used to reduce switch resources and managerial burdens that are associated with multiple spanning-tree instances?
a. RSTP
b. PVST
c. MST
d. PVST+
e. RPVST+
c. MST
Which statement about the use of SDM templates in a Cisco switch is true?
a. SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network.
b. SDM templates are used to create Layer 3 interfaces (switch virtual interfaces) to permit hosts in one VLAN to communicate with hosts in another VLAN.
c. SDM templates are used to configure ACLs that protect networks and specific hosts from unnecessary or unwanted traffic.
d. SDM templates are used to configure a set of ACLs that allows the users to manage the flow of traffic handled by the route processor.
e. SDM templates are configured by accessing the switch using the web interface.
a. SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network.
Which SDM template disables routing and supports the maximum number of unicast MAC addresses?
a. VLAN
b. access
c. default
d. routing
a. VLAN
Which SDM template is the most appropriate for a Layer 2 switch that provides connectivity to a large number of clients?
a. VLAN
b. default
c. access
d. routing
a. VLAN
In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded?
a. 100 seconds
b. 180 seconds
c. 300 seconds
d. 600 seconds
c. 300 seconds
If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated??
a. A MAC address or host moves between different switch ports.
b. A new MAC address is added to the content-addressable memory.
c. A new MAC address is removed from the content-addressable memory.
d. More than 64 MAC addresses are added to the content-addressable memory.
a. A. A MAC address or host moves between different switch ports.
Which option is a possible cause for an errdisabled interface?
a. routing loop
b. cable unplugged
c. STP loop guard
d. security violation
d. security violation
What is the default value for the errdisable recovery interval in a Cisco switch?
a. 30 seconds
b. 100 seconds
c. 300 seconds
d. 600 seconds
c. 300 seconds
Which statement about LLDP-MED is true?
a. LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices.
b. LLDP-MED is an extension to LLDP that operates only between network devices.
c. LLDP-MED is an extension to LLDP that operates only between endpoint devices.
d. LLDP-MED is an extension to LLDP that operates between routers that run BGP.
a. LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices.
Which statement about Cisco devices learning about each other through Cisco Discovery Protocol is true?
a. Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC.
b. Each device broadcasts periodic advertisements to all of its neighbors.
c. Each device sends periodic advertisements to a central device that builds the network topology.
d. Each device sends periodic advertisements to all IP addresses in its ARP table.
a. Each device sends periodic advertisements to multicast address 01:00:0C:CC:CC:CC.
Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?
a. native VLAN IDs, port-duplex, hardware platform
b. native VLAN IDs, port-duplex, memory errors
c. native VLAN IDs, memory errors, hardware platform
d. port-duplex, hardware platform, memory errors
a. native VLAN IDs, port-duplex, hardware platform
Which option describes a limitation of LLDP?
a. LLDP cannot provide information about VTP.
b. LLDP does not support TLVs.
c. LLDP can discover only Windows servers.
d. LLDP can discover up to two devices per port.
a. A. LLDP cannot provide information about VTP.
- QUESTION 46 - Which statement about the UDLD protocol is true?
a. UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
b. UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.
c. UDLD is a standardized Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
d. UDLD is a standardized Layer 2 protocol that enables devices to advertise their identity, capabilities, and neighbors on a local area network.
a. UDLD is a Cisco-proprietary Layer 2 protocol that enables devices to monitor the physical status of links and detect unidirectional failures.
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
a. normal and aggressive
b. active and aggressive
c. normal and active
d. normal and passive
e. normal and standby
a. normal and aggressive
- QUESTION 48 - What is the default interval at which Cisco devices send Cisco Discovery Protocol advertisements?
a. 30 seconds
b. 60 seconds
c. 120 seconds
d. 300 seconds
b. 60 seconds
Which statement about Cisco Discovery Protocol configuration on a Cisco switch is true?
a. CDP is enabled by default and can be disabled globally with the command no cdp run.
b. CDP is disabled by default and can be enabled globally with the command cdp enable.
c. CDP is enabled by default and can be disabled globally with the command no cdp enable.
d. CDP is disabled by default and can be enabled globally with the command cdp run.
a. CDP is enabled by default and can be disabled globally with the command no cdp run.
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?
a. transparent
b. client
c. server
d. Extended VLANs are only supported in version 3 and not in versions 1 or 2.
a. transparent
What is the size of the VLAN field inside an 802.1q frame?
a. 8-bit
b. 12-bit
c. 16-bit
d. 32-bit
b. 12-bit
What is the maximum number of VLANs that can be assigned to an access switchport without a voice VLAN?
a. 0
b. 1
c. 2
d. 1024
b. 1
- QUESTION 53 - Refer to the exhibit. Which option shows the expected result if a show vlan command is issued?
a. ??????
a