Home > Share your SWITCH v2.0 Experience

Share your SWITCH v2.0 Experience

February 7th, 2015 Go to comments
Note: The last day to take this SWITCH 300-115 exam is February 23, 2020. After this day you have to take new Enterprise exams to get new CCNP Enterprise certification. If you want to find out more about the new exams please visit here.

Please share with us your materials, the way you learned, your feeling and experience after taking the SWITCH v2.0 exam… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Note: Posting email is not allowed in the comment section.

Your posts are warmly welcome!

Comments
Comment pages
1 21 22 23 24 25 53 742
  1. Famm
    February 3rd, 2020

    @Failed, What do mean by “questions mostly not from part 6 / 7 and 8”, please provide more information on what went wrong.

  2. Anonymous
    February 3rd, 2020

    @Famm, I think the best is to learn all the 300-115 questions good, I only had 1 or 2 questions from the new updated questions (6-8), but some questions I also not see in the 300-115 questions:(

  3. Anonymous
    February 3rd, 2020

    @Famm, I think when I learned a little bit more the 300-115 questions the I passed, I think now what I do, do again the SWITCH exam before 22/2 or do a new exam……..

  4. Gray
    February 3rd, 2020

    Guys is this the valid dump : 300-115_CCNP-SWITCH_DnD_June-2017

  5. Ron
    February 3rd, 2020

    I want to re certified my Cisco certification (R&S and security). So please share CCNP switch material on realist_personality@ hotmail dot com.

  6. Ron
    February 3rd, 2020

    Can any one share 300-115 question file @ realist_personality at hotmail dot com.

  7. Ron
    February 3rd, 2020

    Gray please share 300-115_CCNP-SWITCH_DnD_June-2017

  8. Anonymous
    February 3rd, 2020

    which questions u had today guys ????

  9. Helponeanother
    February 3rd, 2020

    @Failed
    Where these questions on the exam today!

    exam==============

    1)How many Active Virtual Gateways (AVG) that can be used in a group:
    A.1 B.2 C.3 D.4
    ANS:A

    2)Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual
    gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the
    current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the
    priority of the current master router
    Ans:A,E

    3)Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port
    Answer: C

    6) Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.
    Ans: D

    7) Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices
    Ans: A, B

    8) What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200
    Ans:A

    9) Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV
    Ans:B, E

    10) Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.
    Ans: B, D
    11) After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief
    Ans: B

    12) Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem
    Ans: B
    13) Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection
    Ans: A

    14) Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure
    ANS:D

    15) Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated
    Ans: A

    16) Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.
    Ans: B, E

    17) Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode
    Ans: A, B

    18) Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard
    Ans: D

    19)Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15
    Ans: B, C

    20)Refer to the exhibit.(R1+R2—SW===Server)
    A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address
    Ans: B

    21) A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan
    Ans: B

    22) Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id
    Ans:C, D

    23) Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15
    Ans: D

    23) Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs
    Ans : A

    24) Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.
    Ans : D, E

    25) Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state? (Choose 2)
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN

    26) Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.
    Ans: B, F

    27) Which feature must be enabled to eliminate the broadcasting of all unknown traffic to switches that are not participating in the specific VLAN?
    A. VTP pruning
    B. port-security
    C. storm control
    D. bpdguard

    28) In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.
    Ans : A, B

    29) Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.
    Ans: D

    30) Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem
    Ans: B

    ********************MCQS & Rick Ragnar**********************

    THESE QUESTIONS ARE THOSE OF THE EXAM?

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs
    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port
    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.
    4. A switch has been configured with the vlan dot1q tag native command. Which statement describes what the switch does with untagged frames that it receive?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunked port is put in err-disable state
    D. Untagged frames are forwarded via the native VLAN
    5. Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state?
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN
    6. Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15
    7. Which two statements are true about port security? (Choose two)
    A. It is used on EtherChannel bundle.
    B. It must be used on the switch interface.
    C. It can be configured for SPAN.
    D. It is configured on an access port.
    E. ?
    8. Which two statements about static MAC addresses are true? (Choose two)
    A. They are configured without an aging time.
    B. They have a default aging time of 300 seconds.
    C. They supersede dynamically learned MAC address.
    D. They can be configured on multiple interfaces in the same VLAN.
    E. They have a default aging time of 60 seconds.
    9. Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
    A. BPDU guard
    B. port security
    C. DAI
    D. IP source Guard
    10. In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.
    11. Which three features can be optimized by using SDM templates? (Choose three)
    A. port security
    B. Trunk
    C. VLAN
    D. access
    E. DHCP snooping
    F. routing
    12. What types of SDM templates you can use in switch? (Choose three)
    A. Access B. Default C. Routing D. VLANs E. ? F. ?
    13. Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the priority of the current master router
    14. How many AVGs can be elected by GLBP member?
    A. 1
    B. 2
    C. 4
    D. 6
    15. Which option is the minimum number of bindings that the DHCP snooping database can store?
    A. 1000 bindings
    B. 2000 bindings
    C. 5000 bindings
    D. 8000 bindings
    16. A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan
    17. Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id
    18. Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 20
    B. switchport access vlan 20
    C. vlan 20
    D. switchport trunk allowed vlan 20
    E. encapsulation dot1q 20
    19. Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15
    20. Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address
    21. Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard
    22. Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode
    23. Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.
    24. Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure
    25. Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated
    26. Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.
    27. What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200
    28. Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV
    29. Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.
    30. After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief
    31. Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem
    32. Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection
    33. Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices
    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.
    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.
    Drag and Drop – PVST+ / Rapid PVST+ / MSTP
    PVST + 802.1d standard + default STP
    RapidPVST + 802.1w standard + has Discarding port state
    MST + 802.1s standard + group vlan int instance
    Drag and Drop – SPAN Source and Destination Ports
    Source port:
    1. It can be trunk or an access port
    2. It can be monitored as a bundled logical port or as individual physical ports
    3. Multiple VLANs can be included in a single session
    Destination switch:
    1. It acts as the monitoring port
    2. It is not supported as part of a VLAN
    3. Its original configuration is overwritten by the SPAN configuration

    dirtflake

    January 22nd, 2020

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs
    Ans : A
    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port
    Ans : C
    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.
    Ans : D, E
    4. A switch has been configured with the vlan dot1q tag native command. Which statement describes what the switch does with untagged frames that it receive?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunked port is put in err-disable state
    D. Untagged frames are forwarded via the native VLAN
    Ans : B
    5. Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state? (Choose 2)
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN
    Ans: C, E
    6. Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15
    Ans: A
    7. Which two statements are true about port security? (Choose two)
    A. It is used on EtherChannel bundle.
    B. It must be used on the switch interface.
    C. It can be configured for SPAN.
    D. It is configured on an access port.
    E. ?

    Ans :

    8. Which two statements about static MAC addresses are true? (Choose two)
    A. They are configured without an aging time.
    B. They have a default aging time of 300 seconds.
    C. They supersede dynamically learned MAC address.
    D. They can be configured on multiple interfaces in the same VLAN.
    E. They have a default aging time of 60 seconds.
    Ans: A, D

    9. Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
    A. BPDU guard
    B. port security
    C. DAI
    D. IP source Guard
    Ans: C

    10. In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.
    Ans : A, B
    11. Which three features can be optimized by using SDM templates? (Choose three)
    A. port security
    B. Trunk
    C. VLAN
    D. access
    E. DHCP snooping
    F. routing
    Ans: C,D, F

    12. What types of SDM templates you can use in switch? (Choose three)
    A. Access B. Default C. Routing D. VLANs E. ? F. ?
    Ans: A, B, C, D
    13. Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the priority of the current master router
    Ans: A, E
    14. How many AVGs can be elected by GLBP member?
    A. 1
    B. 2
    C. 4
    D. 6
    Ans: 4 or 1
    15. Which option is the minimum number of bindings that the DHCP snooping database can store?
    A. 1000 bindings
    B. 2000 bindings
    C. 5000 bindings
    D. 8000 bindings
    Ans: D
    16. A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan
    Ans: B

    17. Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id
    Ans: B, D

    18. Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 20
    B. switchport access vlan 20
    C. vlan 20
    D. switchport trunk allowed vlan 20
    E. encapsulation dot1q 20
    Ans: B, C
    19. Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15
    Ans: B, C
    20. Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address
    Ans: B

    21. Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard
    Ans: A
    22. Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode
    Ans: A, B
    23. Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.
    Ans: B, F
    24. Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure
    25. Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated
    Ans: A

    26. Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.
    Ans: B, E

    27. What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200
    Ans: B

    28. Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV
    Ans:B, E

    29. Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.
    Ans: B, D
    30. After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief
    Ans: B

    31. Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem
    Ans: B
    32. Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection
    Ans: A
    33. Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices
    Ans: A, B
    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.
    Ans: D, E
    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.
    Ans: D

    Can someone please tell me if these questions came in your exam?

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs

    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port

    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.

  10. Helponeanother
    February 3rd, 2020

    Or these:

    Can someone please tell me if these questions came in your exam?

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs

    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port

    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.

    4. A switch has been configured with the vlan dot1q tag native command. Which statement describes what the switch does with untagged frames that it receive?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunked port is put in err-disable state
    D. Untagged frames are forwarded via the native VLAN

    5. Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state?
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN

    6. Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15

    7. Which two statements are true about port security? (Choose two)
    A. It is used on EtherChannel bundle.
    B. It must be used on the switch interface.
    C. It can be configured for SPAN.
    D. It is configured on an access port.
    E. ?

    8. Which two statements about static MAC addresses are true? (Choose two)
    A. They are configured without an aging time.
    B. They have a default aging time of 300 seconds.
    C. They supersede dynamically learned MAC address.
    D. They can be configured on multiple interfaces in the same VLAN.
    E. They have a default aging time of 60 seconds.

    9. Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
    A. BPDU guard
    B. port security
    C. DAI
    D. IP source Guard

    10. In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.

    11. Which three features can be optimized by using SDM templates? (Choose three)
    A. port security
    B. Trunk
    C. VLAN
    D. access
    E. DHCP snooping
    F. routing

    12. What types of SDM templates you can use in switch? (Choose three)
    A. Access B. Default C. Routing D. VLANs E. ? F. ?

    13. Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the priority of the current master router

    14. How many AVGs can be elected by GLBP member?
    A. 1
    B. 2
    C. 4
    D. 6

    15. Which option is the minimum number of bindings that the DHCP snooping database can store?
    A. 1000 bindings
    B. 2000 bindings
    C. 5000 bindings
    D. 8000 bindings

    16. A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan

    17. Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id

    18. Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 20
    B. switchport access vlan 20
    C. vlan 20
    D. switchport trunk allowed vlan 20
    E. encapsulation dot1q 20

    19. Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15

    20. Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address

    21. Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard

    22. Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode

    23. Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.

    24. Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure

    25. Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated

    26. Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.

    27. What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200

    28. Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV

    29. Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.

    30. After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief

    31. Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem

    32. Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection

    33. Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices

    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.

    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.

    Drag and Drop – PVST+ / Rapid PVST+ / MSTP
    PVST + 802.1d standard + default STP
    RapidPVST + 802.1w standard + has Discarding port state
    MST + 802.1s standard + group vlan int instance

    Drag and Drop – SPAN Source and Destination Ports
    Source port:
    1. It can be trunk or an access port
    2. It can be monitored as a bundled logical port or as individual physical ports
    3. Multiple VLANs can be included in a single session
    Destination switch:
    1. It acts as the monitoring port
    2. It is not supported as part of a VLAN
    3. Its original configuration is overwritten by the SPAN configuration

    , ‐—-‘zzxxxxzz

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs

    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port

    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.

    4. A switch has been configured with the vlan dot1q tag native command. Which statement describes what the switch does with untagged frames that it receive?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunked port is put in err-disable state
    D. Untagged frames are forwarded via the native VLAN

    5. Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state?
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN

    6. Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15

    7. Which two statements are true about port security? (Choose two)
    A. It is used on EtherChannel bundle.
    B. It must be used on the switch interface.
    C. It can be configured for SPAN.
    D. It is configured on an access port.
    E. ?

    8. Which two statements about static MAC addresses are true? (Choose two)
    A. They are configured without an aging time.
    B. They have a default aging time of 300 seconds.
    C. They supersede dynamically learned MAC address.
    D. They can be configured on multiple interfaces in the same VLAN.
    E. They have a default aging time of 60 seconds.

    9. Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
    A. BPDU guard
    B. port security
    C. DAI
    D. IP source Guard

    10. In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.

    11. Which three features can be optimized by using SDM templates? (Choose three)
    A. port security
    B. Trunk
    C. VLAN
    D. access
    E. DHCP snooping
    F. routing

    12. What types of SDM templates you can use in switch? (Choose three)
    A. Access B. Default C. Routing D. VLANs E. ? F. ?

    13. Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the priority of the current master router

    14. How many AVGs can be elected by GLBP member?
    A. 1
    B. 2
    C. 4
    D. 6

    15. Which option is the minimum number of bindings that the DHCP snooping database can store?
    A. 1000 bindings
    B. 2000 bindings
    C. 5000 bindings
    D. 8000 bindings

    16. A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan

    17. Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id

    18. Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 20
    B. switchport access vlan 20
    C. vlan 20
    D. switchport trunk allowed vlan 20
    E. encapsulation dot1q 20
    19. Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15
    20. Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address
    21. Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard
    22. Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode
    23. Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.
    24. Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure
    25. Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated

    26. Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.
    27. What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200
    28. Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV
    29. Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.
    30. After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief
    31. Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem
    32. Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection
    33. Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices
    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.
    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.

    Drag and Drop – PVST+ / Rapid PVST+ / MSTP
    PVST + 802.1d standard + default STP
    RapidPVST + 802.1w standard + has Discarding port state
    MST + 802.1s standard + group vlan int instance

    Drag and Drop – SPAN Source and Destination Ports
    Source port: 1. It can be trunk or an access port
    2. It can be monitored as a bundled logical port or as individual physical ports
    3. Multiple VLANs can be included in a single session
    Destination switch:
    1. It acts as the monitoring port
    2. It is not supported as part of a VLAN
    3. Its original configuration is overwritten by the SPAN configuration

    Drag and Drop – AVG/AVF/ARP/Gateway Priority
    AVG – Assign MAC for client in subnet
    AVF – forward traffic sent to MAC
    ARP – this protocol to learn MAC when know IP
    Gateway priority – use to elect active virtual gateway
    Drag and Drop – RADIUS / TACACS+
    Sim LACP, VTP3 & HSRP

  11. @Helponeanother
    February 3rd, 2020

    Thank you for posting all these questions.
    Did you use premium certprepare?
    I am seeing some of these questions in the “new updated questions” parts 6 – 8.

  12. Mitzov
    February 3rd, 2020

    I have scheduled my test for feb 5th. I will let you know as much as i can what questions i got on the test.

  13. mrthirsty
    February 3rd, 2020

    All, what is the consensus on this question? certprepare has conflicting answers in the material …

    * RSTP is running on a switch and a switch running PVST+ is added to the network. What happens?

    A. STP will stop operating
    B. Both will run PVST+
    C. Old switch will run RSTP and new will run PVST+
    D. Both will run RSTP

    in the material, one question has a pic and says C … another has question as above and says B ???

  14. anon
    February 3rd, 2020

    Passed with a score of 800+ today

    Lots and lots of new questions never seen before, only about 10 of them or so where on certprepare.
    But again, if you know your stuff without just memorizing the questions and answers, all should go relatively well.

    Had VTP V3, LACP with STP and HSRP sim.
    2 D&D

    Good luck to the people that still need to pass in the next coming weeks.

  15. Bez
    February 3rd, 2020

    @anon

    Congrats on passing. Do you recall which were the D&D?

  16. Anonymous
    February 3rd, 2020

    ty @Mitzov we wait… which drag and drops bro ?

  17. Pep
    February 3rd, 2020

    Did somebody know if the dumps are still valid?

  18. FB
    February 3rd, 2020

    @mrthirsty

    RSTP is backward compatible with PVST so when two interfaces on two Switches are connected, the port that is running RSTP will revert back to PVST (or PVST+) with standard 802.1d timers

  19. uBit
    February 4th, 2020

    Might be mistakes in RSPAN questions

    This is not a valid command
    monitor session 1 destination interface remote vlan

    Vaild command is
    Switch(config)# monitor session session_number destination remote vlan vlan-ID (from Cisco)
    monitor session 1 destination remote vlan 901

    Can anyone confim or comment?

  20. Anonymous
    February 4th, 2020

    passed today
    912

    VTP V3, LACP with STP and HSRP sim
    DnD SPAN source/destination port, PVST+ RPVST+ MSTP, TACACS+ RADIUS, GLBP Components

  21. landry
    February 4th, 2020

    @anon please can you share with us the new question that you have in your exam? thank you in advance

  22. put
    February 4th, 2020

    @Anonymous
    Did you answer VTP V3, LACP with STP the same as Certprepare? Any new questions?

  23. Dan21
    February 4th, 2020

    @Anonymous
    29. B and D…. I’m also thinking E is correct?
    30. B

    Can anyone confirm?

  24. JPCG
    February 4th, 2020

    @Dan21
    E isn’t correct, sticky MACs are only preserved when you put “copy run start” command before the reload process.

  25. Dan21
    February 4th, 2020

    Thanks buddy. Makes sense

  26. Proton
    February 4th, 2020

    Hi Guys,

    For HSRP / VRRP DND. Can you please let me know which of the two answers are correct?

    I am using a VCE files but notice that there are two sets of DND for HSRP / VRRP.

    HSRP
    USE VIP
    Multicast
    MAC Address

    VRRP
    IP Prot
    Physical IP
    Track IP Address

    ======================================

    HSRP
    MAC Address
    Multicast
    VIP

    VRRP
    IP Protocol
    Track Interface
    Use Physical Interface

    Thank you in advance

  27. mimi
    February 4th, 2020

    I have switch premium access,anyone who has tshoot premium access we can trade,reach me hergeekness1@gmail

  28. Dan21
    February 4th, 2020

    Has anyone figured out the correct answers in the VTPv3 sim? the last 2 questions are so messed up…

  29. switch 300-115
    February 4th, 2020

    Anyone appear for exam switch 300-115 latest
    Can anyone update any new question Feb 2020?
    what are labs in the exam ?

    I got an exam soon
    if possible please share the latest dump with less number questions k h a d e _ r @ Y a h o o . c o m
    or email me switch 300-115 members, i have 2 days for exam

  30. Anonymous
    February 4th, 2020

    For those who recently too the exam, does any of Questions 6, 7, 8 show up on the Switch exam?


  31. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 21 22 23 24 25 53 742
  1. No trackbacks yet.