An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the
physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port.
Which action accomplishes this task?
A.
Change the link-type to point-to-point.
B.
Enable Rapid Spanning Tree to converge using the secondary link.
C.
Adjust the secondary link to have a lower priority than the primary link.
D.
Apply a BPDU filter on the primary interface of the remote switches.
2017 Aug. New Updated 300-115 exam questions:
QUESTION 390
Which feature do you implement so that an interface enters the root inconsistent state if it receives a superior BPDU?
A. DPDU filter
B. root guard
C. BPDU guard
D. loop guard
Answer: B
QUESTION 391
In which two ways can a port respond to a port-security violation? (Choose two.)
A. The port enters the en-disabled state
B. The Security Violation counter is incremented and the port sends an SNMP trap
C. The Security Violation counter is incremented and the port sends a critical syslog message to the console
D. The port triggers an EEM script to notify support staff and continues to forward traffic normally
E. The port immediately begins to drop all traffic.
F. The port enters the shutdown state.
Answer: AF
QUESTION 392
Which three functions does Dynamic ARP Inspection perform with invalid IP-to MAC address bindings? (Choose there.)
A. accepts
B. deletes
C. discards
D. bypasses
E. intercepts
F. logs
Answer: CEF
QUESTION 393
Which two statements about 802. lq are true? (Choose two)
A. It encapsulates the original Ethernet frame and adds a VLAN identifier.
B. It increases the maximum size an Ethernet frame to 1094 bytes.
C. It is a Cisco proprietary protocol.
D. When It is enabled, it forces a recalculation of the frame check sequence field.
E. It supports 8-byte VLAN identifiers.
F. It adds a 32-bit field to the Ethernet frame between the source MAC address and length fields.
Answer: BE
QUESTION 394
A physical switch port is part of an EtherChannel group. What happenes while the same port configured as a SPAN destination?
A. The port forwards traffic in the EtherChannel group and acts as a SPAN source simultaneously.
B. The port is removed from the EtherChannel group.
C. The port is put in the errdisabled state and can only be reenabled manually.
D. The operation is not allowed as an EtherChannel member cannot be a SPAN source port.
Answer: D
QUESTION 395
Which two statements about CDP are true? (Choose two.)
A. CDP uses a TLV to advertise the native VLAN
B. CDP is not supported with SNMP
C. CDP is supported on Frame Relay sub interfaces.
D. CDP runs on OSI layer 2
E. CDP runs on OSI layer 1
Answer: AC
QUESTION 396
Which two combinations of Ether Channel modes support the formation of an EtherChannel? (Choose two.)
A. desirable, passive
B. desirable, desirable
C. active, passive
D. passive, passive
E. active, desirable
Answer: BC
2017 New Version 300-115 PDF and 300-115 VCE Dumps 401Q&As:https://www.braindump2go.com/300-115.html
2018 Jan New Updated 300-115 Exam Questions:
QUESTION 151
Which technique allows specific VLANs to be strictly permitted by the administrator?
A. VTP pruning
B. transparent bridging
C. trunk-allowed VLANs
D. VLAN access-list
E. L2P tunneling
Answer: C
Explanation:
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the “switchport trunk allowed vlan remove vlan-list” interface configuration command to remove specific VLANs from the allowed list.
QUESTION 152
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
A. Configure trunk and access interfaces manually.
B. Disable DTP on a per interface basis.
C. Apply BPDU guard and BPDU filter.
D. Enable switchport block on access ports.
Answer: AB
Explanation:
The Dynamic Trunking Protocol (DTP) is used to negotiate forming a trunk between two Cisco devices.
DTP causes increased traffic, and is enabled by default, but may be disabled. To disable DTP, configure “switchport nonegotiate.” This prevents the interface from generating DTP frames.
You can use this command only when the interface switchport mode is access or trunk.
You must manually configure the neighboring interface as a trunk interface to establish a trunk link, otherwise the link will be a non-trunking link.
QUESTION 153
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)
A. PPP
B. DTP
C. ISL
D. HDLC
E. DLCI
F. DOT1Q
Answer: CF
Explanation:
Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.
QUESTION 154
A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server. Which action resolves this problem?
A. Reload the new switch.
B. Restart the VTP process on the new switch.
C. Reload the VTP server.
D. Verify connected trunk ports.
Answer: D
Explanation:
VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work.
The first thing that should be done is to verify that the trunk ports are connected and up.
QUESTION 155
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem?
A. The VTP server must be reloaded.
B. The VTP version number must be set to version 3.
C. After each update to the VTP server, it takes up to 4 hours propagate.
D. VTP must be stopped and restarted on the server.
E. Another switch in the domain has a higher revision number than the server.
Answer: B
Explanation:
VTP version 3 supports these features that are not supported in version 1 or version 2:
Enhanced authentication–You can configure the authentication as hidden or secret.
When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration.
You must reenter the password if you enter a takeover command in the domain.
When you enter the secret keyword, you can directly configure the password secret key.
Support for extended range VLAN (VLANs 1006 to 4094) database propagation.
VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.
QUESTION 156
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
A. Modify the spanning-tree priorities to dictate the traffic flow.
B. Create a Layer 3 transit VLAN to segment the traffic between the sites.
C. Use VTP pruning on the trunk interfaces.
D. Configure manual trunk pruning between the two locations.
Answer: C
Explanation:
QUESTION 157
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
A. The command effectively removed all other working VLANs and replaced them with the new VLANs.
B. VTP pruning removed all unused VLANs.
C. ISL was unable to encapsulate more than the already permitted VLANs across the trunk.
D. Allowing additional VLANs across the trunk introduced a loop in the network.
Answer: A
Explanation:
The “switchport trunk allowed vlan” command will only allow the specified VLANs, and overwrite any others that were previously defined. You would also need to explicitly allow the other working VLANs to this configuration command, or use the “issue the switchport trunk allowed vlan add vlan-list” command instead to add these 3 VLANS to the other defined allowed VLANs.
QUESTION 158
When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?
A. 1000
B. 1001
C. 1024
D. 2048
E. 4095
F. 4096
Answer: B
Explanation:
VTP versions 1 and 2 Supports normal VLAN numbers (1-1001).
Only VTP version 3 supports extended VLANs (1-4095).
QUESTION 159
What does the command vlan dot1q tag native accomplish when configured under global configuration?
A. All frames within the native VLAN are tagged, except when the native VLAN is set to 1.
B. It allows control traffic to pass using the non-default VLAN.
C. It removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s).
D. Control traffic is tagged.
Answer: D
Explanation:
The “vlan dot1q tag native” will tag all untagged frames, including control traffic, with the defined native VLAN.
QUESTION 160
Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces, including the community and isolated host ports?
A. promiscuous port
B. isolated port
C. community port
D. trunk port
Answer: A
QUESTION 161
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports and the gateway?
A. isolated VLAN
B. primary VLAN
C. community VLAN
D. promiscuous VLAN
Answer: A
More Free Updated 2018 New 300-115 Exam Dumps PDF can be viewed here: https://drive.google.com/drive/folders/0B75b5xYLjSSNYjV4eHQ4dTJoQXc?usp=sharing