What could you do to help a network with many multicasts and broadcasts?

The Company LAN is becoming saturated with broadcasts and multicast traffic. What could
you do to help a network with many multicasts and broadcasts?

The Company LAN is becoming saturated with broadcasts and multicast traffic. What could
you do to help a network with many multicasts and broadcasts?

A.
Creating smaller broadcast domains by implementing VLANs.

B.
Separate nodes into different hubs.

C.
Creating larger broadcast domains by implementing VLANs.

D.
Separate nodes into different switches.

E.
All of the above.

Explanation:
Controlling broadcast propagation throughout the network is important to reduce the amount
of overhead associated with these frames. Routers, which operate at Layer 3 of the OSI
model, provide broadcast domain segmentation for each interface. Switches can also
provide broadcast domain segmentation using virtual LANs (VLANs). A VLAN is a group of
switch ports, within a single or multiple switches, that is defined by the switch hardware
and/or software as a single broadcast domain. A VLANs goal is to group devices connected
to a switch into logical broadcast domains to control the effect that broadcasts have on other
connected devices. A VLAN can be characterized as a logical network.
Building Cisco Multilayer Switched Networks (Cisco Press) page 8



Leave a Reply 4

Your email address will not be published. Required fields are marked *


janam

janam

If StormControl is enabled on a port and the traffic reaches the configured level, which two action can be configured to occur? (Choose two)

A. trap
B. notify admin
C. redirect traffic
D. log
E. shut down

Answer: A E

Question 10

To provide security, a service provider various private VLANs in its backbone network infrastructure to prevent certain VLANs communicating to each other. Which version of VTP supports the use of private VLANs?

A. version 1
B. version 3
C. VTP does not support private VLANs
D. version 2

Answer: B

Question 11

Refer to the exhibit. Which two commands about SW1 are true? (Choose two)

show_interface_trunk.jpg

A. Interface Gi5/1 is using a Cisco proprietary trunking protocol
B. On interface Gi5/1, all untagged traffic is tagged with VLAN 113
C. The device is configured with the default MST region
D. Interface Gi5/1 is using an industry standard trunking protocol
E. Interface Gi6/2 is the root port for VLAN 36
F. On interface Gi6/2, all untagged traffic is tagged with VLAN 600

Answer: C D

Note: Answer F is not correct because VLAN 600 is the native VLAN on Gi6/2 does not mean untagged traffic is tagged with this VLAN. It only means “all untagged traffic belongs to VLAN 600”.

Question 12

Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20? (Choose two)

show_spanning_tree_mst.jpg

A. spanning-tree mstp 1 priority 0
B. spanning-tree mst 1 root primary
C. spanning-tree mst vlan 10,20 priority root
D. spanning-tree mst 1 priority 4096
E. spanning-tree mst 1 priority 1
F. spanning-tree mstp vlan 10,20 root primary

Answer: B D

Explanation

From the second command output (show spanning-tree mst) we learn that MST1 includes VLANs 10 & 20. Therefore if we want DSW1 to become root bridge for these VLANs we need to set the MST 1 region to root -> The command “spanning-tree mst 1 root primary” can do the trick. In fact, this command runs a macro and sets the priority lower than the current root.

Also we can see the current root bridge for these VLANs has the priority of 32769 (default value + sysid) so we can set the priority of DSW1 to a specific lower value. But notice that the priority must be a multiple of 4096. Therefore D is a correct answer.

Two other new questions (reported by our candidates but not completed):

Question 13

In a switch stack where is the the SDM template stored?

A. All switches in stack
B. Master switch
C. Flash memory

Answer: B

Question 14

Refer to exhibit, which two statements correctly indicate when an SNMP trap is set to the switch? (Choose two)

Switch(config)# snamp-server enable traps mac-notifcation
Switch(config)# mac address-table notification threshold
Switch(config)# mac address-table notification threshold limit 60
Switch(config)# mac address-table notification mac-move
A. When a new workstation connects to port F0/1
B. When 61 MAC address are in the switch
C. When 61 percent of the Address table capacity is used
D. When the switch loses power and reboots
E. When the phone previously on Fa0/2 is connected/Moved to Fa0/5

Answer: C E

Question 15

Which statement is true about RSTP topology changes?

A. Only nonedge ports moving to the blocking state generate a TC BPDU.
B. Any loss of connectivity generates a TC BPDU.
C. Any change in the state of the port generates a TC BPDU.
D. Only nonedge ports moving to the forwarding state generate a TC BPDU.
E. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.

Answer: D

Explanation

When a Switch (Bridge) discovers topology change, it generates a TCN (Topology Change Notification) BPDU (Bridge Protocol Data Unit) and sends the TCN BPDU on its root port. The upstream Switch (Bridge) responds back the sender with TCA (Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit) and TCA (Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit)
The upstream Switch (Bridge) (bridge which received the TCN BPDU) generates another TCN BPDU and sends out via its Root Port. The process continues until the Root Switch (Bridge) receives the TCN BPDU.
When the Root Switch (Bridge) is aware that there is a topology change in the network, it starts to send out its Configuration BPDUs with the topology change (TC) bit set. Configuration BPDUs are received by every Switch (Bridge) in the network and all bridges become aware of the network topology change.

The switch never generates a TCN when a port configured for PortFast goes up or down -> it means no TC will be created for PortFast (or Edge Port) -> D is correct.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094797.shtml)

Question 16

Refer to the exhibit. Based on the debug output shown in the exhibit, which three statements about HSRP are true? (Choose three.)

*Mar 1 00 16:43.095: %LINK-3-UPDOWN: Interface Vlan11, changed state to up
*Mar 1 00 16:43.099: SB: Vl11 Interface up
*Mar 1 00 16:43.099: SB11: Vl11 Init: a/HSRP enabled
*Mar 1 00 16:43.099: SB11: Vl11 Init -> Listen
*Mar 1 00 16:43.295: SB11: Vl11 Hello in 172.16.11.112 Active pri 50 ip 172.16.11.115
*Mar 1 00 16:43.295: SB11: Vl11 Active router is 172.16.11.112
*Mar 1 00 16:43.295: SB11: Vl11 Listen: h/Hello rcvd from lower pri Active router (50/172.16.11.112)
*Mar 1 o o 16:43.295: SB11: Vl11 Active router is local, was 172.16.11.112
*Mar 1 00 16:43.299: %STANDBY-6-STATECHANGE: Vlan11 Group 11 state Listen -> Active
*Mar 1 00 16:43.299: SB11: Vl11 Hello out 172.16.11.111 Active pri 100 ip 172.16.11.115
*Mar 1 00 16:43.303: SB11: Vl11 Hello in 172.16.11.112 Speak pri 50 ip 172.16.11.115
*Mar 1 00 16:46.207: SB11: Vl11 Hello out 172.16.11.111 Active pri 100 ip 172.16.11.115
*Mar 1 00 16:49.095: SB11: Vl11 Hello in 172.16.11.112 Speak pri 50 ip 172.16.11.115
A. The router with IP address 172.16.11.111 has preempt configured.
B. The final active router is the router with IP address 172.16.11.111.
C. The router with IP address 172.16.11.112 has nonpreempt configured.
D. The priority of the router with IP address 172.16.11.112 is preferred over the router with IP address 172.16.11.111.
E. The router with IP address 172.16.11.112 is using default HSRP priority.
F. The IP address 172.16.11.115 is the virtual HSRP IP address.

Answer: A B F

Question 17

What action should a network administrator take to enable VTP pruning on an entire management domain?

A. Enable VTP pruning on any switch in the management domain.
B. Enable VTP pruning on any client switch in the management domain.
C. Enable VTP pruning on a VTP server in the management domain.
D. Enable VTP pruning on every switch in the management domain.
E. Disable VTP pruning on a VTP server in the management domain.

Answer: C

Explanation

VTP pruning should only be enabled on VTP servers, all the clients in the VTP domain will automatically enable VTP pruning -> C is correct.

Question 18

Which two statements are true about best practices in VLAN design? (Choose two.)

A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B. Routing may be performed at all layers but is most commonly done at the core and distribution layers.
C. Routing should not be performed between VLANs located on separate switches.
D. VLANs should be local to a switch.
E. VLANs should be localized to a single switch unless voice VLANs are being utilized.

Answer: B D

Explanation

First let’s review main characteristics of three layers in a campus network:

* Access layer:

+ Low cost per switch port
+ High port density
+ Scalable uplinks to higher layers
+ User access functions such as VLAN membership, traffic and protocol filtering, and quality of service (QoS)
+ Resiliency through multiple uplinks

* Distribution Layer:

+ Aggregation of multiple access-layer devices
+ High Layer 3 throughput for packet handling
+ Security and policy-based connectivity functions through access lists or packet filters
+ QoS features
+ Scalable and resilient high-speed links to the core and access layers

* Core layer:

+ Very high throughput at Layer 3
+ No costly or unnecessary packet manipulations (access lists, packet filtering)
+ Redundancy and resilience for high availability
+ Advanced QoS functions

We can see at Distribution and Core layers, Layer 3 throughput (routing) is very high -> B is correct.

Nowadays, end-to-end VLANs are not recommended in an enterprise network, unless there is a good reason. In an end-to-end VLAN, broadcast traffic is carried over from one end of the network to the other, creating the possibility for a broadcast storm or Layer 2 bridging
loop to spread across the whole extent of a VLAN. This can exhaust the bandwidth of distribution and core-layer links, as well as switch CPU resources. Now the storm or loop has disrupted users on the end-to-end VLAN, in addition to users on other VLANs that might
be crossing the core.

When such a problem occurs, troubleshooting becomes more difficult. In other words, the risks of end-to-end VLANs outweigh the convenience and benefits.

From that we can infer VLAN traffic should be local to the switch -> D is correct.

(Reference: CCNP SWITCH 642-813 Official Certification Guide)

Question 19

What is the effect of configuring the following command on a switch?

Switch(config)# spanning-tree portfast bpdufilter default
A. If BPDUs are received by a port configured for PortFast, then PortFast is disabled and the BPDUs are processed normally.
B. If BPDUs are received by a port configured for PortFast, they are ignored and none are sent.
C. If BPDUs are received by a port configured for PortFast, the port will transition to forwarding state.
D. The command will enable BPDU filtering on all ports regardless of whether they are configured for BPDU filtering at the interface level.

Answer: A

Explanation

The concept of edge port basically corresponds to the PortFast feature. An edge port directly transitions to the forwarding state, and skips the listening and learning stages. An edge port that receives a BPDU immediately loses edge port status and becomes a normal spanning tree port.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml#edge)

Question 20

An engineer is configuring an Etherchannel between two switches, he notices the error message on Switch 2 (error message channel misconfiguring error), based on the output what is the problem?

(Exhibit missing)

A. the etherchannel on the switch 1 using incorrect member port
B. the etherchannel interface of switch 1 is not configured
C. the etherchannel protocol on switch 1 is not correct
D. the etherchannel interface of switch 2 is not configured

Answer: C

Explanation

For this question please remember this:

The table below lists if an EtherChannel will be formed or not for LACP:

LACP Active Passive
Active Yes Yes
Passive Yes No
The table below lists if an EtherChannel will be formed or not for PAgP:

PAgP Desirable Auto
Desirable Yes Yes
Auto Yes No
To form an Etherchannel both sides must use the same Etherchannel protocol (LACP or PAgP). According the two tables above we can see only “desirable” and “auto” (of PAgP) can form an Etherchannel bundle.

Note: If we want to use “on” mode, both ends must be configured in this “on” mode to create an Etherchannel bundle.

Question 21

What condition must match during Etherchannel configuration?

A. Spanning tree port priority
B. Spanning tree cost
C. Interface Description
D. Trunk mode
E. Trunk allow vlan

Answer: D E

===============12 New Additional Questions (from Question 22 to 33)===============

Question 22

Drag the items on the left to the proper locations on the right.

PortFast_BPDU_Guard_BPDU_Filter.jpg

Answer:

PortFast
+ configured for access users
+ makes immediately transition to forwarding from blocking state

BPDU Guard
+ change the interface to error-disable
+ prevent from receiving BPDU

BPDU Filter
+ prevent from sending and receiving BPDU
+ stop spanning tree in the interface

Question 23

Drag the items on the left to the proper locations on the right.

PVST_RPVST_MST.jpg

Answer:

PVST
+ 802.1d standard
+ default STP

RapidPVST
+ 802.1w standard
+ has Discarding port state

MST
+ 802.1s standard
+ group vlan int instance

Question 24

What is the default port security violation?

A. log
B. shutdown
C. no change
D. error-disable

Answer: B

Explanation

There are three port security violation modes:
+ protect – Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value.
+ restrict – Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment.
+ shutdown – Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.

The default behavior for a security violation is to shut down that port permanently.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)

Question 25

What is the command for configuring root guard?

A. (config)#spanning-tree guard root
B. (config-if)#spanning-tree guard root
C. (config-if)#spanning-tree root guard
D. (config-if)spanning tree guard root
E. (config)#spanning-tree root guard

Answer: B

Question 26

A network engineer wants to use UDLD, what he needs to consider?

A. UDLD is a non-propriety
B. UDLD is working with non cisco devices
C. UDLD is layer 1
D. UDLD can aggressively disabled the port after eight failed retries

Answer: D

Explanation

The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between devices and ports that support UDLD. UDLD detects the existence of unidirectional links. When a unidirectional link is detected, UDLD puts the affected port into the errdisabled state and alerts the user. UDLD can operate in either normal or aggressive mode.

UDLD is a Layer 2 protocol that works with the Layer 1 protocols to determine the physical status of a link. At Layer 1, autonegotiation takes care of physical signaling and fault detection. UDLD performs tasks that autonegotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected LAN ports. When you enable both autonegotiation and UDLD, Layer 1 and Layer 2 detections work together to prevent physical and logical unidirectional connections and the malfunctioning of other protocols.

UDLD aggressive mode is disabled by default. Configure UDLD aggressive mode only on point-to-point links between network devices that support UDLD aggressive mode. With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After eight failed retries, the port is disabled -> D is correct.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/udld.html

Question 27

What happens if an interface within channel group is configured as SPAN destination?

A. portchannel will forward traffic to source span
B. will not be operational
C. the link will be in error-disable
D. The interface will be removed from the channel group

Answer: D

Explanation

A physical port that belongs to an EtherChannel group can be configured as a SPAN source port and still be a part of the EtherChannel. In this case, data from the physical port is monitored as it participates in the EtherChannel. However, if a physical port that belongs to an EtherChannel group is configured as a SPAN destination, it is removed from the group.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swspan.html

Question 28

What is Cisco recommendation for RSPAN best practice?

A. For RSPAN Configuartion you can distribute the source port and the destination ports across multiple switches in your network
B. Access ports on the RSPAN vlan are put in the inactive state
C. Configure RSPAN VLAN before you configure an RSPAN source or a destination session
D. First create a new VLAN to be the RSPAN VLAN for the RSPAN Session

Answer: D

Explanation

Remote SPAN (RSPAN) is used when source ports are not located on the same switch as the Destination port. RSPAN is an advanced feature that requires a special VLAN to carry the monitored traffic and is not supported by all switches.

The best practice for RSPAN is to configure a dedicated VLAN for RSPAN first.

Question 29

What is needed for Virtual Switching System “VSS”?

A. portchannel
B. trunk
C. Virtual Switching Link “or VSL”
D. Virtual trunk

Answer: C

Explanation

mLACP_VSS.jpg

Notice that the two chassis of this VSS is connected via a Virtual Switch Link (VSL). VSL is a special link that carries control and data traffic between the two chassis of a VSS. In this case the VSL is implemented as an EtherChannel with two links.

Question 30

Which will identify the master switch in stack wise?

A. lower priority
B. higher priority
C. lower ID
D. higher ID

Answer: B

Explanation

A higher priority value for a stack member increases its likelihood to be elected stack master and to retain its stack member number. The priority value can be 1 to 15. The default priority value is 1.

Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/71925-cat3750-create-switch-stks.html

Question 31

An engineer is configuring an EtherChannel between two switches using PAgP. If the EtherChannel mode on switch 1 is configured to auto, which modes on switch 2 establish an operational EtherChannel?

A. active
B. auto
C. desirable
D. on
E. passive

Answer: C

Explanation

The table below lists if an EtherChannel will be formed or not for PAgP:

PAgP Desirable Auto
Desirable Yes Yes
Auto Yes No
Therefore we can see if one end is in “auto”, the other end must be in “desirable” mode to form an Etherchannel.

Question 32

Refer to the output.

R1# show standby
FastEthernet0/0 – Group 1
state is active
2 state changes,last state change 00:20:53
virtual IP address is 192.168.1.1
active virtual MAC address is 0000.0c07.ac01
local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time is 3 sec,hold time is 10 sec
active router is local
standby router is 192.168.1.3,priority 80(expires in 9.280
Track interface Fa0/0 state up decrement 10
R1#
A. The link will take over when …..
B. 192.168.1.3 is active because it has higher IP address
C. When Fa0/0 is down priority will be 80
D. It is using default hello and hold values

Answer: C D

Question 33

question about trunk configuration
int faX/X
switchport trunk allowed vlan x,x,x,x
switchport mode trunk
exit
show vlan
VLAN Name Status Ports
—- ——————————– ——— ——————————-
1 default active Fa0/1, Fa0/3, Fa0/3, FaX/X
show interface trunk
(no output)

A. link is shutdown
B. interface needs no shutdown
C. other side is configured as access port
D. missing switchport command

Kirk Mercer

Kirk Mercer

(4/July/2017 Updated) New 300-115 Exam Questions:

NEW QUESTION 390
Which feature do you implement so that an interface enters the root inconsistent state if it receives a superior BPDU?

A. DPDU filter
B. root guard
C. BPDU guard
D. loop guard

Answer: B

NEW QUESTION 391
In which two ways can a port respond to a port-security violation? (Choose two.)

A. The port enters the en-disabled state.
B. The Security Violation counter is incremented and the port sends an SNMP trap.
C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
E. The port immediately begins to drop all traffic.
F. The port enters the shutdown state.

Answer: AF

NEW QUESTION 392
Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose three.)

A. accepts
B. deletes
C. discards
D. bypasses
E. intercepts
F. logs

Answer: CEF

NEW QUESTION 393
Which two statements about 802.1Q are true? (Choose two.)

A. It encapsulates the original Ethernet frame and adds a VLAN identifier.
B. It increases the maximum size an Ethernet frame to 1094 bytes.
C. It is a Cisco proprietary protocol.
D. When It is enabled, it forces a recalculation of the frame check sequence field.
E. It supports 8-byte VLAN identifiers.
F. It adds a 32-bit field to the Ethernet frame between the source MAC address and length fields.

Answer: DF

NEW QUESTION 394
A physical switch port is part of an EtherChannel group. What happenes while the same port configured as a SPAN destination?

A. The port forwards traffic in the EtherChannel group and acts as a SPAN source simultaneously.
B. The port is removed from the EtherChannel group.
C. The port is put in the errdisabled state and can only be reenabled manually.
D. The operation is not allowed as an EtherChannel member cannot be a SPAN source port.

Answer: D

NEW QUESTION 395
Which two statements about CDP are true? (Choose two.)

A. CDP uses a TLV to advertise the native VLAN
B. CDP is not supported with SNMP
C. CDP is supported on Frame Relay sub interfaces.
D. CDP runs on OSI layer 2
E. CDP runs on OSI layer 1

Answer: AC

NEW QUESTION 396
Which two combinations of Ether Channel modes support the formation of an EtherChannel? (Choose two.)

A. desirable, passive
B. desirable, desirable
C. active, passive
D. passive, passive
E. active, desirable

Answer: BC

NEW QUESTION 397
……

P.S. You Can Get The Newest 300-115 Dumps In PDF And VCE From — http://www.passleader.com/300-115.html (401q VCE and PDF)

Good Luck!