Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

300-115 Practice Exam Free

Table of Contents

Toggle
  • 300-115 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full 300-115 Practice Exam Free

300-115 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the 300-115 certification? Take your preparation to the next level with our 300-115 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a 300-115 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic 300-115 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

Which virtual router states are defined in the GLBP protocol? (Choose two.)

A. Backup gateway

B. Primary gateway

C. Active virtual gateway

D. Active secondary gateway

E. Active virtual forwarder

 


Suggested Answer: CE

Active virtual gateway and active virtual forwarder are the two states defined in the Gateway Load Balancing Protocol (GLBP). The active virtual gateway (AVG) is elected by the members of the GLBP group. The AVG creates the virtual MAC addresses that are assigned to each of the routers in the group. Each router is responsible for handling packets sent to its virtual MAC address. A GLBP router that forwards packets sent to its virtual MAC address is known as the active virtual forwarder (AVF). GLBP members communicate through hello messages sent every 3 seconds to the multicast address 224.0.0.102.
The election of the AVG can be influenced by use of the priority command. By default, all routers configured for GLBP have a priority of 100. A higher value indicates a higher priority. The configured priority of a router can be seen in the show run command as shown below:
Reference Image
In the above scenario, all other members of the group were left to the default, which can be determined on those routers by the absence of any priority entry in the show run command. In that case, this router would become the AVG. To remove a priority configuration, execute the nostandby priority command. When this command is executed, the router will revert to the default of 100. When all routers are left to the default, the router with the highest configured IP address will become the active router.
GLBP is a Cisco-designed protocol that provides for the dynamic utilization of redundant routers in a broadcast network. It differs from HSRP and VRRP in that it is not necessary to configure multiple groups to fully use redundant paths or routers. GLBP has a configurable load-balancing mechanism that will distribute the use of redundant gateways servicing a broadcast network, such as an Ethernet LAN. Each host will have its gateway set to the address of the AVG. When a host issues an ARP to resolve its gateway’s MAC Address, the AVG will respond with the virtual MAC address of a selected AVF. The AVG will perform load balancing by varying which virtual MAC it selects to use in the response. The AVF will own that assigned virtual MAC as long as the gateway is active. If an AVF becomes unable to provide service as gateway, another AVF can assume ownership of the virtual MAC.
Consider the partial output of the show run command for two routers participating in the GLBP group shown below:
Reference Image
In the above scenario, both routers have the same priority, so Router B will become AVG. Hosts will use a gateway address of 192.168.5.5 (the GLBP virtual address in line 4 of both outputs). When hosts send an ARP message for the MAC address of the gateway, Router B will reply with the MAC address of the next
AVF.
The AVG can be configured to use one of three load-balancing algorithms:
Round-Robin Load-Balancing: Using round-robin load- balancing the AVG in turn points to each AVF virtual MAC address in its ARP reply (default method).
Weighted Load-Balancing: Using weighted load- balancing, the AVG selects an AVF virtual MAC address to use in the ARP reply proportionally based on the advertised weight value configured in a GLBP gateway.
Host Dependant Load-Balancing: Using host-dependant load- balancing, the AVG selects an AVF virtual MAC address to use in the ARP reply based on which one the host used previously. A host will use the same AVF as long as the GLBP group is unchanged.
GLBP allows better use of network resources by using the standby router through the load-balancing mechanism. The standby router is an available gateway for the network.
GLBP and HSRP are Cisco-developed solutions. VRRP is defined in RFC 2338.
Backup gateway, primary gateway, and active secondary gateway are not terms used when discussing GLBP.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Cisco > Cisco IOS IP Application Services Configuration Guide, Release 12.4 > Part 1: First Hop Redundancy Protocols > Configuring GLBP
Cisco > First Hop Redundancy Protocols Configuration Guide, Cisco IOS Release 12.4 > Configuring GLBP > GLBP Active Virtual Gateway

Question 2

DRAG DROP -
Drag and Drop - LLDP-TLV (Concepts Only)
✑ LLDP-MED Capabilities TLV
✑ Network Policy TLV
Select and Place:
Select and Place:

 


Suggested Answer:

 

Question 3

What protocol allows for centralized management of multiple wireless access points?

A. WPA

B. WEP

C. ad hoc

D. LWAPP D

 


Suggested Answer: Explanation

Lightweight access point protocol (LWAPP) is a protocol used to allow centralized management of access points (APs). The management components are removed from the APs and centralized into a wireless LAN controller. This controller can coordinate WLAN access, managing the load on the APs and user movement between APs. A lightweight AP receives control and configuration from the WLAN controller.
LWAPP defines the following activities:
Packet encapsulation, fragmentation, and formatting
Access point certification and software control
Access point discovery, information exchange, and configuration
The processing of 802.11 data and the handling of management protocols and access point capabilities is distributed between the lightweight access point and the
WLAN controller. For example, the AP handles the transmission of beacon frames and responses to probe request frames and the controller handles authentication. The WLC enhances:
Mobility –
Authentication –
Security management –
When lightweight APs are used, the data path from one wireless station to another includes the AP and its controller.
Wi-Fi protected access (WPA) is an encryption and authentication protocol for wireless access. It supports 802.1x authentication and EAP on a wireless client.
The AP would function as the authenticator.
WEP is a wireless encryption protocol that uses static keys and no authentication.
Ad hoc is a WLAN mode used for peer-to-peer connectivity. Ad hoc allows wireless-enabled computers to communicate with each other without having an AP involved.
Objective:
Layer 2 Technologies –
Sub-Objective:
Configure and verify other LAN switching technologies
References:
Cisco > Support > Product Support > Wireless > Cisco Aironet 1200 Series > Product Literature > Solution Overviews > Cisco Unified Wireless Network Overview

Question 4

Which two restrictions of the port security feature are true? (Choose two.)

A. Static port MAC address assignments are not supported.

B. It is not supported on PVLAN ports.

C. It is not supported on EtherChannel port-channel interfaces.

D. A single device can learn a maximum of three sticky MAC addresses.

E. It is supported on destination SPAN ports.

 


Suggested Answer: AC

 

Question 5

You have been assigned to create a plan to implement HSRP on the router connecting your company's network to the Internet. The router should be the active router in the HSRP group. On the active router, the following conditions should be met:
Enable preemption with no delay -
Set Hello timer to 10 seconds and hold time to 25 seconds
Set the priority to 150 -
Which of the following commands should be included in the plan to meet the given requirements? (Choose all that apply.)

A. standby 1 preempt delay minimum 10

B. standby 1 preempt

C. standby 1 priority 150

D. standby 1 timers 10 25

E. standby 1 timers 25 10

F. standby track interface S0/1

 


Suggested Answer: BCD

The following commands should be included in the implementation plan to meet the given requirements: standby 1 preempt standby 1 priority 150 standby 1 timers 10 25
The standby 1 preempt command configures the preempt settings on the router. This command allows preemption without any delay. The standby 1 priority 150 command sets the priority of the router to 150. The default priority of HSRP routers is 100. This implies that this router becomes the active router if there are no other routers in the group with a higher priority. The standby 1 timers 10 25 command sets the Hello timer and the hold time on the local router. The first value, 10, specifies the Hello timer, and the second value, 25, indicates the hold time.
The most essential steps to configure HSRP on routers are as follows:
Assign IP addresses to the interfaces using the ip address command
Enable HSRP on the interfaces and assign the virtual IP address using the standby ip command
Set the HSRP priority of the interfaces using the standby priority command
Configure HSRP preempt settings on the interfaces using the standby preempt command
Set the Hello timers using the standby timers command
Enable interface tracking for other HSRP-enabled interfaces using the standby track command
The standby 1 preempt delay minimum 10 command should not be included in the implementation plan. This command causes the router to preempt the active router after a minimum of 10 seconds. However, the requirement states that there should be no delay in preemption (a delay of 0 seconds), which is the default behavior.
The standby 1 timers 25 10 command should not be included in the implementation plan. This command sets the Hello timer to 25 seconds and the hold time to
10 seconds. However, the requirement is to set the Hello timer to 10 seconds and the hold time to 25 seconds.
The standby track interface S0/1 command should not be included in the implementation plan. This command enables tracking of the S0/1 interface on the local router. However, there is no requirement in the scenario to track an interface. Tracking can be used to decrement the priority of an HSRP router when the interface goes down. Using the default decrement value, if S0/1 were to go down, the priority of the router would be reduced by 10.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Home > Support > Configuring HSRP > How to Configure HSRP
Internetworking Case Studies > Using HSRP for Fault-Tolerant IP Routing > Configuring HSRP

Question 6

What is the value of the TPID/tag protocol identifier in dot1q?

A. 0x8100

B. 0x8a88

C. 0x8b45

D. 0x8200

 


Suggested Answer: A

 

Question 7

Which three authentication methods does GLBP use? (Choose three.)

A. Single Sign On authentication

B. MD5 authentication

C. No authentication

D. Plain text authentication

E. DCSP authentication

F. 6-to-4 authentication

 


Suggested Answer: BCD

 

Question 8

Which two of the following procedures can be performed on a VTP server to reset the VTP configuration revision number to 0? (Choose two.)

A. Disable VTP pruning, then enable VTP pruning.

B. Change the VTP mode to client, and then back to server mode.

C. Change the VTP mode to transparent, then back to server mode.

D. Change the VTP domain name to a non-existent domain name, and then back to the correct domain name.

 


Suggested Answer: CD

To reset the configuration revision number to 0, you should change the VLAN Trunking Protocol (VTP) domain to a non-existent domain name, and then back to the correct domain name. To change the domain name, issue the vtp domain command.
Alternatively, you can change the VTP mode to transparent mode, then back to client or server mode. To change the VTP mode, issue the vtp mode command from global configuration mode. To verify that the configuration revision number has been reset to 0, you should issue the show vtp status command.
Before adding a new switch to a VTP domain, you should reset the configuration revision number to 0. If the configuration revision number is higher than that of the other switches in the domain, then the switch can propagate incorrect configuration information to the other switches. This can cause virtual local area networks (VLANs) to be modified or deleted on every switch in the VTP domain.
The VTP configuration revision number will not be reset to 0 if you disable and then re-enable VTP pruning. VTP pruning can eliminate the flooding of broadcast traffic to switches that have no ports assigned to the virtual local area network (VLAN).
The VTP configuration revision number will not be reset to 0 if you change the VTP mode to client and then back to server. Both server-mode and client-mode switches propagate VTP information. Therefore, client-mode switches can cause incorrect information to be propagated if the configuration revision number is higher than other switches in the domain. Transparent-mode switches will not propagate its own VTP configuration, but will forward VTP information received from other switches.
Objective:
Layer 2 Technologies –
Sub-Objective:
Configure and verify trunking –
References:
Cisco > Home > Support > Technology Support > LAN Switching > Virtual LANS/VLAN Trunking Protocol (VLANS/VTP) > Design > Design Technotes >
Understanding VLAN Trunk Protocol (VTP)
Cisco > Cisco IOS LAN Switching Command Reference > udld through vtp v2-mode > vtp
Cisco > Cisco IOS LAN Switching Command Reference > show vlan through ssl-proxy module allowed-vlan > show vtp

Question 9

Refer to the exhibit.
 Image
What is the result of the configuration?

A. The EtherChannels would not form because the load-balancing method must match on the devices.

B. The EtherChannels would form and function properly even though the load-balancing and EtherChannel modes do not match.

C. The EtherChannels would form, but network loops would occur because the load-balancing methods do not match.

D. The EtherChannels would form and both devices would use the dst-ip load-balancing method because Switch1 is configured with EtherChannel mode active.

 


Suggested Answer: B

An etherchannel will form if one end is active and the other is passive. The table below summarizes the results for LACP channel establishment based on the configuration of each side of a link:
LACP Channel Establishment –
Reference Image
Load balancing can only be configured globally. As a result, all channels (manually configured, PagP, or LACP) use the same load-balancing. This is true for the switch globally, although each switch involved in the etherchannel can have non matching parameters for load balancing.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/54sg/configuration/guide/config/channel.html#wp1020804

Question 10

A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server.
Which action resolves this problem?

A. Reload the new switch.

B. Restart the VTP process on the new switch.

C. Reload the VTP server.

D. Verify connected trunk ports.

 


Suggested Answer: D

VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work. The first thing that should be done is to verify that the trunk ports are connected and up.

Question 11

DRAG DROP -
Select and Place:
Drag the choices on the left to the boxes on the right that should be included when creating an implementation plan. Not all choices will be used.
Select and Place:

 


Suggested Answer:
Correct Answer Image

 

Question 12

Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?

A. native VLAN IDs, port-duplex, hardware platform

B. native VLAN IDs, port-duplex, memory errors

C. native VLAN IDs, memory errors, hardware platform

D. port-duplex, hardware platform, memory errors

 


Suggested Answer: A

Type-Length-Value fields (TLVs) are blocks of information embedded in CDP advertisements. Table 21 summarizes the TLV definitions for CDP advertisements.
Reference Image
Reference: http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/fcf015.html

Question 13

Which two settings are the parts of a Default LLDP configuration? (Choose two.)

A. The LLDP hold time is 60 seconds.

B. The LLDP global state is Disabled.

C. The LLDP reinitialisation delay is 5 seconds.

D. The LLDP interface state is Enabled.

E. The LLDP timer is 60 seconds.

 


Suggested Answer: BD

 

Question 14

What command would be used to verify trusted DHCP ports?

A. show mls qos

B. show ip dhcp snooping

C. show ip trust

D. show ip arp trust

 


Suggested Answer: B

The command show ip dhcp snooping is used to verify trusted DHCP ports. This command is used to verify which ports are intended to have DHCP servers connected to them. DHCP snooping creates an IP address to MAC address database that Dynamic ARP Inspection (DAI) uses to validate ARP packets. It compares the MAC address and IP address in ARP packets and only permits the traffic if the addresses match. This eliminates attackers that are spoofing MAC addresses.
DHCP snooping is used to define ports as trusted for DHCP server connections. The purpose of DHCP snooping is to mitigate DHCP spoofing attacks. DHCP snooping can be used to determine what ports are able to send DHCP server packets, such as DHCPOFFER, DHCPACK, and DHCPNAK. DHCP snooping can also cache the MAC address to IP address mapping for clients receiving DHCP addresses from a valid DHCP server.
MLS QOS has no bearing on DHCP services, so show mls qos is not correct.
The other commands are incorrect because of invalid syntax.
Objective:
Infrastructure Security –
Sub-Objective:
Configure and verify switch security features
References:
Cisco > Cisco IOS IP Addressing Services Command Reference > DHCP Commands > show ip dhcp snooping

Question 15

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure.
 Image
What percentage of the outgoing traffic from the 172.16.10.0/24 subnet is being forwarded through R1?

A. R1-0%

B. R1-50 %, R2-50%

C. R2-100%

D. R1-100%

 


Suggested Answer: D

Based on the following output, we see that R1 is the active standby router for the Ethernet 0/0 link, so all outgoing traffic will be forwarded to R1.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27517500001.jpg” alt=”Reference Image” />

Question 16

Which two statements about SPAN source and destination ports during an active session are true? (Choose two.)

A. The source port can be only an Ethernet physical port.

B. The source port can be monitored in multiple SPAN sessions.

C. The destination port can be destination in multiple SPAN sessions.

D. The destination port does not participate in STP.

E. You can mix individual source ports and source VLANs within a single session.

 


Suggested Answer: BD

 

Question 17

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure.
 Image
 Image
 Image
What is the virtual mac-address of HSRP group 1?

A. 0000.0c07.ac02

B. 4000.0000.0010

C. 0000.0c07.ac01

D. 4000.0000.ac01

E. 4000.0000.ac02

F. 0000.0c07.0010

 


Suggested Answer: Explanation

Issuing the “show standby” command on either router shows us that the virtual MAC used by HSRP group 1 is 4000.0000.0010.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n18880200001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n18880200002.jpg” alt=”Reference Image” />

Question 18

Drag and Drop Question -
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 19

How many Active Virtual Gateways (AVG) can be used in a GLBP protocol?

A. Only one AVG can be elected on a switch

B. Two AVG could be elected on a switch

C. Two AVG just could be elected in GLBP v2

D. GLBP supports 8 AVGs per group

 


Suggested Answer: A

 

Question 20

In the following partial output of the show run command, which MAC address or addresses will be removed from the list of secure addresses after 240 seconds?
 Image

A. 0000.0000.aaaa

B. 0000.0000.bbbb

C. 0000.0000.aaaa and 0000.0000.bbbbb

D. none of the MAC addresses will be removed after 240 seconds A

 


Suggested Answer: Explanation

The only address that will be removed or aged out of the secure MAC address list will be 0000.0000.aaaa. When port security is used on an interface, not only can you set a maximum number of MAC addresses that can use the interface, but you can also set the amount of time that an address can reside in the secure list.
When the switchport port-security command is used, you can specify whether the command applies to statically assigned MAC addresses or dynamically learned
MAC addresses, called sticky addresses. In this scenario, line 6 of the output specifies that the command applies to static addresses. Since 0000.0000.aaaa is the only statically assigned MAC address (assigned in line 8 of the output), it is the only address that will age out. The amount of time is configured in terms of minutes and is done on line 5 with the switchport port-security aging time 4 command.
The MAC address 0000.0000.bbbb will not age out because it is a sticky secure address. The aging command only applies to static MAC addresses.
Objective:
Infrastructure Security –
Sub-Objective:
Configure and verify switch security features
References:
Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EWA > Configuring Port Security
Cisco > Cisco IOS Interface and Hardware Component Command Reference > switchport port-security

Question 21

Which option is a benefit of configuring UDLD on a link between two switches?

A. UDLD determines the best switching path

B. UDLD helps prevent switching loops

C. UDLD provides a backup mechanism for fiber

D. UDLD removes switching loops

 


Suggested Answer: B

 

Question 22

What is the default HSRP priority?

A. 50

B. 100

C. 120

D. 1024

 


Suggested Answer: B

 

Question 23

Which two control protocols use the native VLAN 1 by default? (Choose two.)

A. STP

B. CDP

C. LACP

D. NTP

E. VTP

 


Suggested Answer: BE

 

Question 24

Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)

A. PPP

B. DTP

C. ISL

D. HDLC

E. DLCI

F. DOT1Q

 


Suggested Answer: CF

Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.
Reference: https://learningnetwork.cisco.com/servlet/JiveServlet/previewBody/14792-102-1-57313/Dynamic%20Trunking%20Protocol.PDF

Question 25

In a Virtual Switching System, DSW1 and DSW2 need to communicate with each other to determine the role. Which technology is it using?

A. STP

B. NA

C. VSL Protocol (Virtual Switch Link)

D. LACP

 


Suggested Answer: C

 

Question 26

Where does the VLAN information get saved to?

A. The information is saved to the vlan.dat file.

B. The information is saved to the running configuration file.

C. The information is saved to the vlan.txt file.

D. The information is saved to the vlan.conf file.

 


Suggested Answer: A

 

Question 27

Which two command sequences must you enter on a pair of switches so that they negotiate an EtherChannel using the Cisco proprietary port-aggregation protocol? (Choose two.)
A.
 Image
B.
 Image
C.
 Image
D.
 Image
E.
 Image

 


Suggested Answer: BD

 

Question 28

What is the maximum number of virtual MAC addresses that GLBP allows per group?

A. 2

B. 4

C. 6

D. 8

 


Suggested Answer: B

GLBP Virtual MAC Address Assignment
A GLBP group allows up to four virtual MAC addresses per group. The AVG is responsible for assigning the virtual MAC addresses to each member of the group.
Other group members request a virtual MAC address after they discover the AVG through hello messages. Gateways are assigned the next MAC address in sequence. A virtual forwarder that is assigned a virtual MAC address by the AVG is known as a primary virtual forwarder. Other members of the GLBP group learn the virtual MAC addresses from hello messages. A virtual forwarder that has learned the virtual MAC address is referred to as a secondary virtual forwarder.
Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html#wp1039651

Question 29

After reviewing UDLD status on switch ports, an engineer notices that the current bidirectional state for an access port is "Unknown". Which statement describes what this indicates about the status of the port?

A. UDLD moved into aggressive mode after inconsistent acknowledgements were detected.

B. The UDLD port is placed in the “unknown” state for 5 seconds until the next UDLD packet is received on the interface.

C. The port is fully operational and no known issues are detected.

D. The bidirectional status of “unknown” indicates that the port will go into the disabled state because it stopped receiving UDLD packets from its neighbor.

 


Suggested Answer: C

 

Question 30

What are possible Etherchannel load balancing mechanism based on layer 3? (Choose 2)

A. Mac source

B. Mac source-destination

C. IP Source

D. IP Source-destination

E. Mac destination

 


Suggested Answer: CD

 

Question 31

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch
15?
 Image

A. All ports will be in forwarding mode.

B. All ports in VLAN 10 will be in forwarding mode.

C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.

D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.

 


Suggested Answer: B

 

Question 32

DRAG DROP -
Select and Place:
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 33

Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?

A. portfast

B. port-security

C. spanning tree

D. storm control

 


Suggested Answer: A

Voice VLAN Configuration Guidelines
✑ You should configure voice VLAN on switch access ports. The voice VLAN should be present and active on the switch for the IP phone to correctly communicate on the voice VLAN. Use the show vlan privileged EXEC command to see if the VLAN is present (listed in the display).
✑ The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled.
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea11x/co
nfiguration/guide/swvoip.html

Question 34

A network engineer configured an Ethernet switch using these commands.
Switchone(config) # Spanning-tree portfast bpdufilter default
Which statement about the spanning-tree portfast feature on the switch is true?

A. If an interface is enabled for portfast receives BDPU, the port goes through the spanning-tree listening, learning, and forwarding states.

B. If an interface is enabled for portfast receives BDPU, the port does not go through the spanning-tree listening, learning, and forwarding states.

C. If an interface is enabled for portfast receives BDPU, the port is shut down immediately.

D. If an interface is enabled for portfast receives BDPU, the port goes into the spanning-tree inconsistent state.

 


Suggested Answer: A

STP PortFast causes a Layer 2 LAN interface configured as an access port to enter the forwarding state immediately, bypassing the listening and learning states.
However, the “Spanning-tree portfast bpdufilter default” command specifies that if a BPDU is received on that port, then the default action of STP of listening, learning, and forwarding states should be used.

Question 35

Which two statements about dynamic MAC address learning are true? (Choose two.)

A. Dynamically-learned MAC addresses can be cleared on a per-interface basis only.

B. It must be enabled on ports with port security enabled.

C. It can be disabled on a per-VLAN basis only.

D. Switch interfaces learn MAC addresses dynamically by default.

E. Dynamically-learned MAC addresses supersede static MAC addresses

 


Suggested Answer: CD

 

Question 36

Which of the following is required to allow load balancing between three HSRP routers connected to the same LAN?

A. A single HSRP group with all three routers as active routers for the group

B. A single HSRP group with one active router for the group

C. Two HSRP groups, each with an active router

D. Two HSRP groups with one active router for both the groups

E. Three HSRP groups, each with an active router

F. Three HSRP groups with one active router for all groups

 


Suggested Answer: E

You should configure three HSRP groups on all three routers and select an active router for each of the groups. You can create up to 256 (0 to 255) groups. Each router should be the active router for one of the three groups and the standby router for the remaining two groups.
If you want to use HSRP on a Layer 3 switch, the switch ports must be one of the following:
EtherChannel port Refers to a Layer 3 switch port used for EtherChannel
Routed port Refers to a Layer 3 port on a switch used for routing and for inter-VLAN routing
Switch virtual interface (SVI) Refers to a Layer 2 switch port used for inter-VLAN routing
Routed ports are the physical Layer 3 interfaces that allow you to configure a switch as a router. The no switchport command allows the port to be used purely as a Layer 3 port. SVIs are Layer 3 logical interfaces of a switch that allow you to enable inter-VLAN routing on Layer 3 switches. An SVI is configured as a VLAN interface and has at least one physical interface assigned to the VLANs.
Creating a single HSRP group with all three routers as active routers for the group is incorrect. An HSRP group cannot have multiple active routers; it can have only one active router at a time.
Creating a single HSRP group with one active router for the group is incorrect because it does not allow load balancing between the three routers. All traffic will be passed through the active router.
Creating two HSRP groups with an active router each is incorrect because it only allows load balancing between two of the routers and not three of them.
Creating two HSRP groups with one active router for both groups, or three HSRP groups with one active router for all groups, is incorrect. Doing so does not enable load balancing on all three routers. Only the active router will be used for traffic forwarding.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Internetworking Case Studies > Using HSRP for Fault-Tolerant IP Routing > Configuring Multiple Hot Standby Groups > Load Sharing
Catalyst 3750 Switch Software Configuration Guide, 12.2(40)SE > Configuring HSRP > Configuring HSRP > HSRP Configuration Guidelines
Catalyst 3750 Switch Software Configuration Guide, 12.2(40)SE > Configuring HSRP > Configuring HSRP > Multiple HSRP

Question 37

Which three VLANs are part of the extended range of available VLANs? (Choose three.)

A. 1006

B. 4095

C. 4195

D. 3000

E. 4094

F. 1001

 


Suggested Answer: ADE

 

Question 38

A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU of the switch to spike during peak working hours. What is the root cause of this issue?

A. The VLAN receives additional frames from neighboring switches.

B. The SDM VLAN template causes the MAC address-table to overflow.

C. The VLAN template disables routing in hardware.

D. The switch needs to be rebooted before the SDM template takes effect.

 


Suggested Answer: C

SDM Template Notes:
✑ All templates are predefined. There is no way to edit template category individual values.
✑ The switch reload is required to use a new SDM template.
✑ The ACL merge algorithm, as opposed to the original access control entries (ACEs) configured by the user, generate the number of TCAM entries listed for security and QoS ACEs.
✑ The first eight lines (up to Security ACEs) represent approximate hardware boundaries set when a template is used. If the boundary is exceeded, all processing overflow is sent to the CPU which can have a major impact on the performance of the switch.
Choosing the VLAN template will actually disable routing (number of entry for unicast or multicast route is zero) in hardware.
Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/44921-swdatabase-3750ss-44921.html

Question 39

Which two pieces of information are carried in a Cisco Discovery Protocol advertisement? (Choose two.)

A. Processor Type

B. VTP domain name

C. Routing protocol

D. Memory usage

E. Spanning-Tree mode

F. Native VLAN-ID

 


Suggested Answer: BF

 

Question 40

Which parameters are found in VTP advertisements? (Choose three.)

A. Password

B. VTP mode

C. IP address

D. Switch name

E. Revision number

F. Management domain name

 


Suggested Answer: AEF

The management domain name, password, and revision number are all checked before the VTP frame is processed. To propagate VTP information between switches, both switches must have a trunk port configured and must have a matching native VLAN, which is VLAN 1 by default.
VTP advertisements are flooded throughout the management domain every five minutes or whenever there is a change. These advertisements are originated from a switch that is in server mode and are propagated by switches that are in either client or transparent mode. Before a client or another server accepts or incorporates the information sent in the advertisement, it checks the management domain name and password (if defined) against its own configuration. The revision number is checked. If the revision number is higher than the last value store in the receiving switch, the receiving switch will overwrite its VLAN database with the information in the advertisement.
A VTP switch in transparent mode will receive and forward VTP advertisements. It will not use the contents of the advertisement to synchronize with its own VLAN database.
The VTP mode, IP address, and switch name are not found in VTP advertisements.
Objective:
Layer 2 Technologies –
Sub-Objective:
Configure and verify trunking –
References:
Cisco > Home > Support > Technology Support > LAN Switching > Virtual LANS/VLAN Trunking Protocol (VLANS/VTP) > Design > Design Technotes >
Understanding VLAN Trunk Protocol (VTP)

Question 41

Refer to the exhibit.
 Image
Which EtherChannel negotiation protocol is configured on the interface f0/13  f0/15?

A. Link Combination Control Protocol

B. Port Aggregation Protocol

C. Port Combination Protocol

D. Link Aggregation Control Protocol

 


Suggested Answer: B

PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on will allow a channel to be formed. .
1. on: PAgP will not run. The channel is forced to come up.
2. off: PAgP will not run. The channel is forced to remain down.
3. auto: PAgP is running passively. The formation of a channel is desired; however, it is not initiated.
4. desirable: PAgP is running actively. The formation of a channel is desired and initiated.
The Link Aggregate Control Protocol (LACP) trunking supports four modes of operation:
✑ On: The link aggregation is forced to be formed without any LACP negotiation .In other words, the switch neither sends the LACP packet nor processes any inbound LACP packet. This is similar to the on state for PAgP.
✑ Off: The link aggregation is not formed. We do not send or understand the LACP packet. This is similar to the off state for PAgP.
✑ Passive: The switch does not initiate the channel but does understand inbound LACP packets. The peer (in active state) initiates negotiation (when it sends out an LACP packet) which we receive and answer, eventually to form the aggregation channel with the peer. This is similar to the auto mode in PAgP.
✑ Active: We can form an aggregate link and initiate the negotiation. The link aggregate is formed if the other end runs in LACP active or passive mode. This is similar to the desirable mode of PAgP.
In this example, we see that fa 0/13, fa0/14, and fa0/15 are all in Port Channel 12, which is operating in desirable mode, which is only a PAgP mode.

Question 42

Which command enables GLBP on an interface?

A. glbp

B. glbp 10 ip 192.168.1.1

C. standby mode glbp

D. switchport mode glbp

 


Suggested Answer: B

The glbp ip interface configuration command enables Group Load Balancing Protocol (GLBP). The syntax for this command is as follows: switch(config-if)# glbp group-number ip ip-address
The following example activates GLBP for group 5 on Fast Ethernet interface 1/0. The virtual IP address to be used by the GLBP group is set to 10.5.5.5. The default gateway of each host should be set to the virtual IP address. switch(config)# interface FastEthernet 1/0 switch(config-if)# ip address 10.5.5.1 255.255.255.0 switch(config-if)# glbp 5 ip 10.5.5.5
GLBP is a Cisco-designed protocol that provides for the dynamic use of redundant routers in a broadcast network. It differs from HSRP and VRRP in that it is not necessary to configure multiple groups to fully use redundant paths or routers. GLBP has a configurable load-balancing mechanism that will distribute the use of redundant gateways servicing a broadcast network such as an Ethernet LAN. When a host issues an ARP to resolve its gateway’s MAC address, the active virtual gateway (AVG) will respond with the virtual MAC address of a selected active virtual forwarder (AVF). The AVG will perform load balancing by varying which virtual MAC it selects to use in the response. The AVF will own that assigned virtual MAC as long as the gateway is active. If an AVF becomes unable to provide service as gateway, then another AVF can assume ownership of the virtual MAC.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Cisco > Cisco IOS IP Application Services Configuration Guide, Release 12.4 > Part 1: First Hop Redundancy Protocols > Configuring GLBP

Question 43

Which two commands prune VLAN 10 from a switch interface? (Choose two.)

A. switchport trunk native vlan 10

B. switchport trunk allowed remove vlan 10

C. switchport trunk allowed vlan add 10

D. no vlan 10

E. switchport trunk allowed except vlan 10

 


Suggested Answer: BE

Reference:
https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/nxos/commands/l2/switchport-trunk-allowed-vlan.html

Question 44

Which two new features are included in VTPv3? (Choose two.)

A. VTP now supports MD5 passwords

B. VLANs in the extended range are now eligible to participate in VTP

C. VTPs can now be configured in off mode

D. It can be configured to prevent the override of the VLAN database

E. VLANs configured for token ring are now eligible to participate in VTP

 


Suggested Answer: BC

 

Question 45

Which command correctly configures standby tracking for group 1 using the default decrement priority value?

A. standby 1 track 100

B. standby 1 track 100 decrement 1

C. standby 1 track 100 decrement 5

D. standby 1 track 100 decrement 20

 


Suggested Answer: A

The default decrement value for HSRP standby tracking is 10. There is no need to explicitly state the value if the desired value is the default value.

Question 46

What is the link called between a VSS?

A. VSL (Virtual Switch Link)

B. SVI

C. DCSP

D. VLAN

 


Suggested Answer: A

 

Question 47

Which feature describes MAC addresses that are dynamically learned or manually configured, stored in the address table, and added to the running configuration?

A. sticky

B. dynamic

C. static

D. secure

 


Suggested Answer: A

With port security, you can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.pdf

Question 48

Which statement is true when UDLD is configured on a link and the link is determined to be unidirectional?

A. The port remains up for a configured time interval and then error disables if the link remains unidirectional.

B. LLDP is enabled on the port.

C. The port sends a log message to the console.

D. The port is disabled immediately.

 


Suggested Answer: D

Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10591-77.html

Question 49

What is the multicast address for HSRPv2?

A. 224.0.0.102

B. 127.0.0.1

C. 224.1.1.2

D. 224.1.1.102

 


Suggested Answer: A

 

Question 50

An administrator recently configured all ports for rapid transition using PortFast. After testing, it has been determined that several ports are not transitioning as they should. What is the reason for this?

A. RSTP has been enabled per interface and not globally.

B. The STP root bridge selection is forcing key ports to remain in non-rapid transitioning mode.

C. STP is unable to achieve rapid transition for trunk links.

D. The switch does not have the processing power to ensure rapid transition for all ports.

 


Suggested Answer: C

RSTP can only achieve rapid transition to the forwarding state on edge ports and on point-to-point links, not on trunk links. The link type is automatically derived from the duplex mode of a port. A port that operates in full-duplex is assumed to be point-to-point, while a half-duplex port is considered as a shared port by default. This automatic link type setting can be overridden by explicit configuration. In switched networks today, most links operate in full-duplex mode and are treated as point-to-point links by RSTP. This makes them candidates for rapid transition to the forwarding state.
Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.html

Free Access Full 300-115 Practice Exam Free

Looking for additional practice? Click here to access a full set of 300-115 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your 300-115 certification journey!

Share18Tweet11
Previous Post

300-101 Practice Exam Free

Next Post

300-160 Practice Exam Free

Next Post

300-160 Practice Exam Free

300-320 Practice Exam Free

300-410 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.