Which two options are two results of using the command …

Which two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration? (Choose
two.)

Which two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration? (Choose
two.)

A.
Spanning tree determines the priority of the current root for VLAN 50 and reduces the priority of the local switch to a lower value.

B.
The priority value for VLAN 50 is set to 4094 on the root while the local switch priority is set to 32768.

C.
The spanning-tree timers are reduced to improve the convergence time for VLAN 50.

D.
All ports that are configured on the current switch with VLAN 50 transition to designated ports.

E.
The switchport that is configured for VLAN 50 is the primary connection to the spanning-tree root switch.



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Kittybd

Kittybd

2017 Aug 14 New 300-115 exam questions updated:

QUESTION 399
Which two commands sequences must you enter on a pair switches so that they negotiate? (Choose 2)

A. channel-protocol lacp
channel-group 1 mode auto
B. channel-protocol lacp
channel-group 1 mode passive
C. channel-protocol pagp
channel-group 1 mode on
D. channel-protocol pagp
channel-group 1 mode auto
E. channel-protocol lacp
channel-group 1 mode active

Answer: BE

QUESTION 400
Which two prerequisites for HSRP to become active on an interface are true? (Choose 2)

A. Cisco Express Forwarding must be disabled globally.
B. The VIP must be in the same subnet as the primary IP address.
C. A Virtual-MAC address must be configured on the interface.
D. An IP address must be configured on the interface.
E. PIM routing must be disabled on the interface.

Answer: BD

QUESTION 401
Which two authentication types does VRRP support? (Choose Two)

A. Plain-text
B. CHAP
C. PAP
D. 802.1X
E. MD5

Answer: AE
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-12-4-book/fhp-vrrp.html#GUID-B1CB24C0-2526-4790-A701-0105FDA69FC8

QUESTION 402
Which two limitations of LOCAL SPAN are true? (Choose Two)

A. The source and destination ports must reside in the same switch or switch stack
B. It can monitor only traffic that ingresses or egresses on the source interface or VLAN.
C. A SPAN session can support multiple destination ports only if they are on the same VLAN.
D. EACH SPAN session supports only one source VLAN or interface.
E. A switch can support only one local SPAN session at a time.

Answer: AE

QUESTION 403
Which Statement about the default SWITCH Database Management Template is true?

A. Template disables routing and supports the maximum number of unicast MAC addresses
B. Template maximizes system resources for access control lists.
C. Template maximizes system resources for unicast routing.
D. Template gives balance to all functions

Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swsdm.pdf
Default – The default template gives balance to all functions.

QUESTION 404
Which results happens when a non-trunking port that is configured with BPDU guard is connected to a device that is transmitting?

A. The port is moved into the spanning-tree blocking state.
B. There port is error-disabled.
C. A routing loop can occur on the network.
D. The port transitions to the connected state.

Answer: B

QUESTION 405
Which two settings are the parts of a Default LLDP configuration? (Choose Two)

A. The LLDP hold time is 60 seconds.
B. The LLDP global state is Disabled.
C. The LLDP reinitialisation delay is 5 seconds.
D. The LLDP interface state is Enabled.
E. The LLDP timer is 60 seconds.

Answer: BD
Explanation:
https://www.cisco.com/c/en/us/td/docs/routers/ncs6000/software/ncs6k_r5-2/interfaces/configuration/guide/b-interfaces-cg-ncs6k-52x/b-interfaces-cg-ncs6k- 52x_chapter_011.html#con_1061862
Table 4 LLDP Default Configuration
LLDP global state = Disabled
LLDP interface state = Enabled for both transmit and receive operations when LLDP is globally enabled.

QUESTION 407
Which two statements about GLBP are true? (Choose Two)

A. The AVF responds to ARP request for the virtual IP address.
B. LAN client traffic is handled by the active AVF only.
C. The AVG assigns virtual MAC addresses to GLBP group members.
D. The AVF assigns virtual MAC addresses to GLBP group members.
E. The AVG responds to ARP requests for the Virtual IP address.

Answer: CE
Explanation:
https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html#wp1039649
The AVG assigns a virtual MAC address to each member of the GLBP group.
The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address.

QUESTION 408
Which option is a CISCO recommended RSPAN configuration practice?

A. Define RSPAN VLAN before configuring an RSPAN source and destination session.
B. Assign access ports to an RSPAN VLAN like any other campus VLAN.
C. Use a different RSPAN VLAN for each session if configuring RSPAN on multiple switches.
D. Use only one destination port for EACH RSPAN Session.

Answer: A
Explanation:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/prod_white_paper0900aecd805457cc.html

QUESTION 409
A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN.
Which configuration must be configured before the VLAN is configured?

A. Ensure all switches are configured as VTP server mode.
B. Configure VTP Transparent mode.
C. Enable VTP version 3.
D. Disable VTP and manually assign VLANS.

Answer: B

Ronlad McCray

Ronlad McCray

Wrote 300-115 exam yesterday and finally passed with a satisfying score(this is the second time). Thanks God! Some questions here are similar to the real test but still have 12 new questions. Got 9 new questions one day before from: http://cert-collection.com/2017-aug-updated300-115-exam-vce-and-pdf-dumps-free-download-in-braindump2go399-409.html ,this is a good blog i found, maybe you also try your luck here. some questions i got in my test:

QUESTION
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping.
Which solution ensures that the server maintains network reachability in the future?
A. Disable DHCP snooping information option.
B. Configure a static DHCP snooping binding entry on the switch.
C. Trust the interface that is connected to the server with the ip dhcp snooping trust command.
D. Verify the source MAC address of all untrusted interfaces with ip dhcp snooping verify mac-address command.
Answer: B

QUESTION
DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?
A. Packets from the workstation will be rate limited according to the default values set on the switch.
B. The interface that is connected to the workstation in question will be put into the errdisabled state.
C. Traffic will pass accordingly after the new IP address is populated into the binding database.
D. The packets originating from the workstation are assumed to be spoofed and will be discarded.
Answer: D

QUESTION
Which technique allows specific VLANs to be strictly permitted by the administrator?
A. VTP pruning
B. transparent bridging
C. trunk-allowed VLANs
D. VLAN access-list
E. L2P tunneling
Answer: C

QUESTION
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
A. Configure trunk and access interfaces manually.
B. Disable DTP on a per interface basis.
C. Apply BPDU guard and BPDU filter.
D. Enable switchport block on access ports.
Answer: AB

QUESTION
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)
A. PPP
B. DTP
C. ISL
D. HDLC
E. DLCI
F. DOT1Q
Answer: CF

QUESTION
A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server. Which action resolves this problem?
A. Reload the new switch.
B. Restart the VTP process on the new switch.
C. Reload the VTP server.
D. Verify connected trunk ports.
Answer: D

QUESTION
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem?
A. The VTP server must be reloaded.
B. The VTP version number must be set to version 3.
C. After each update to the VTP server, it takes up to 4 hours propagate.
D. VTP must be stopped and restarted on the server.
E. Another switch in the domain has a higher revision number than the server.
Answer: B

QUESTION
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
A. Modify the spanning-tree priorities to dictate the traffic flow.
B. Create a Layer 3 transit VLAN to segment the traffic between the sites.
C. Use VTP pruning on the trunk interfaces.
D. Configure manual trunk pruning between the two locations.
Answer: C

QUESTION
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
A. The command effectively removed all other working VLANs and replaced them with the new VLANs.
B. VTP pruning removed all unused VLANs.
C. ISL was unable to encapsulate more than the already permitted VLANs across the trunk.
D. Allowing additional VLANs across the trunk introduced a loop in the network.
Answer: A

QUESTION
When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?
A. 1000
B. 1001
C. 1024
D. 2048
E. 4095
F. 4096
Answer: B

QUESTION
What does the command vlan dot1q tag native accomplish when configured under global configuration?
A. All frames within the native VLAN are tagged, except when the native VLAN is set to 1.
B. It allows control traffic to pass using the non-default VLAN.
C. It removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s).
D. Control traffic is tagged.
Answer: D

QUESTION
Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces, including the community and isolated host ports?
A. promiscuous port
B. isolated port
C. community port
D. trunk port
Answer: A

God Luck!

Levo

Levo

2018/Jan/3 New 300-115 Questions:

QUESTION
Which technique allows specific VLANs to be strictly permitted by the administrator?

A. VTP pruning
B. transparent bridging
C. trunk-allowed VLANs
D. VLAN access-list
E. L2P tunneling

Answer: C
Explanation:
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the “switchport trunk allowed vlan remove vlan-list” interface configuration command to remove specific VLANs from the allowed list.

QUESTION
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)

A. Configure trunk and access interfaces manually.
B. Disable DTP on a per interface basis.
C. Apply BPDU guard and BPDU filter.
D. Enable switchport block on access ports.

Answer: AB
Explanation:
The Dynamic Trunking Protocol (DTP) is used to negotiate forming a trunk between two Cisco devices.
DTP causes increased traffic, and is enabled by default, but may be disabled. To disable DTP, configure “switchport nonegotiate.” This prevents the interface from generating DTP frames.
You can use this command only when the interface switchport mode is access or trunk.
You must manually configure the neighboring interface as a trunk interface to establish a trunk link, otherwise the link will be a non-trunking link.

QUESTION
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)

A. PPP
B. DTP
C. ISL
D. HDLC
E. DLCI
F. DOT1Q

Answer: CF
Explanation:
Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.

QUESTION
A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server. Which action resolves this problem?

A. Reload the new switch.
B. Restart the VTP process on the new switch.
C. Reload the VTP server.
D. Verify connected trunk ports.

Answer: D
Explanation:
VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work.
The first thing that should be done is to verify that the trunk ports are connected and up.

QUESTION
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem?

A. The VTP server must be reloaded.
B. The VTP version number must be set to version 3.
C. After each update to the VTP server, it takes up to 4 hours propagate.
D. VTP must be stopped and restarted on the server.
E. Another switch in the domain has a higher revision number than the server.

Answer: B
Explanation:
VTP version 3 supports these features that are not supported in version 1 or version 2:
Enhanced authentication–You can configure the authentication as hidden or secret.
When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration.
You must reenter the password if you enter a takeover command in the domain.
When you enter the secret keyword, you can directly configure the password secret key.
Support for extended range VLAN (VLANs 1006 to 4094) database propagation.
VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.

QUESTION
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?

A. Modify the spanning-tree priorities to dictate the traffic flow.
B. Create a Layer 3 transit VLAN to segment the traffic between the sites.
C. Use VTP pruning on the trunk interfaces.
D. Configure manual trunk pruning between the two locations.

Answer: C
Explanation:

QUESTION
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?

A. The command effectively removed all other working VLANs and replaced them with the new VLANs.
B. VTP pruning removed all unused VLANs.
C. ISL was unable to encapsulate more than the already permitted VLANs across the trunk.
D. Allowing additional VLANs across the trunk introduced a loop in the network.

Answer: A
Explanation:
The “switchport trunk allowed vlan” command will only allow the specified VLANs, and overwrite any others that were previously defined. You would also need to explicitly allow the other working VLANs to this configuration command, or use the “issue the switchport trunk allowed vlan add vlan-list” command instead to add these 3 VLANS to the other defined allowed VLANs.

QUESTION
When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?

A. 1000
B. 1001
C. 1024
D. 2048
E. 4095
F. 4096

Answer: B
Explanation:
VTP versions 1 and 2 Supports normal VLAN numbers (1-1001).
Only VTP version 3 supports extended VLANs (1-4095).

QUESTION
What does the command vlan dot1q tag native accomplish when configured under global configuration?

A. All frames within the native VLAN are tagged, except when the native VLAN is set to 1.
B. It allows control traffic to pass using the non-default VLAN.
C. It removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s).
D. Control traffic is tagged.

Answer: D
Explanation:
The “vlan dot1q tag native” will tag all untagged frames, including control traffic, with the defined native VLAN.

QUESTION
Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces, including the community and isolated host ports?

A. promiscuous port
B. isolated port
C. community port
D. trunk port

Answer: A

QUESTION
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports and the gateway?

A. isolated VLAN
B. primary VLAN
C. community VLAN
D. promiscuous VLAN

Answer: A