Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

300-115 Mock Test Free

Table of Contents

Toggle
  • 300-115 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 300-115 Mock Test Free

300-115 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 300-115 certification exam? Start your preparation the smart way with our 300-115 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 300-115 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 300-115 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

On which interface can port security be configured?

A. static trunk ports

B. destination port for SPAN

C. EtherChannel port group

D. dynamic access point

 


Suggested Answer: Explanation

Port Security and Port Types –
You can configure port security only on Layer 2 interfaces. Details about port security and different types of interfaces or ports are as follows:
Access ports–You can configure port security on interfaces that you have configured as Layer 2 access ports. On an access port, port security applies only to
Reference Image
the access VLAN. Trunk ports–You can configure port security on interfaces that you have configured as Layer 2 trunk ports. VLAN maximums are not useful for access ports. The device allows VLAN maximums only for VLANs associated with the trunk port.
SPAN ports–You can configure port security on SPAN source ports but not on SPAN destination ports.
Reference Image
Ethernet Port Channels–Port security is not supported on Ethernet port channels. Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/

<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n18881000001.png” alt=”Reference Image” />
sw/4_1/nx- os/security/configuration/guide/sec_nx-os-cfg/sec_portsec.html

Question 2

Drag and Drop Question -
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 3

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
 Image
Refer to the configuration. For which configured VLAN are untagged frames sent over trunk between SW1 and SW2?

A. VLAN1

B. VLAN 99

C. VLAN 999

D. VLAN 40

E. VLAN 50

F. VLAN 200

G. VLAN 300

 


Suggested Answer: B

The native VLAN is used for untagged frames sent along a trunk. By issuing the “show interface trunk” command on SW1 and SW2 we see the native VLAN is 99.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27518000000.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27518000002.jpg” alt=”Reference Image” />

Question 4

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
 Image
 Image
 Image
 Image
 Image
You are connecting the New_Switch to the LAN topology; the switch has been partially configured and you need to complete the rest of configuration to enable
PC1 communication with PC2. Which of the configuration is correct?
 Image

A. Option A

B. Option B

C. Option C

D. Option D

E. Option E

 


Suggested Answer: Explanation

Within any VTP, the VTP domain name must match. So, step one is to find the correct VTP name on the other switches. Logging in to SW1 and using the “show vtp status” command we see this:
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n18888000005.png” alt=”Reference Image” />
So we know that the VTP domain must be CCNP. This leaves only choice D and E. We also see from the topology diagram that eth 0/0 of the new switch connects to a PC in VLNA 100, so we know that this port must be an access port in VLAN 100, leaving only choice D as correct. Note that the VTP versions supported in this network are 1, 2, 3 so either VTP version 2 or 3 can be configured on the new switch.

Question 5

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure.
 Image
 Image
 Image
What issue is causing Router R1 and R2 to both be displayed as the HSRP active router for group 2?

A. The HSRP group number mismatch

B. The HSRP group authentication is misconfigured

C. The HSRP Hello packets are blocked

D. The HSRP timers mismatch

E. The HSRP group priorities are different

 


Suggested Answer: B

 

Question 6

Which command should you enter to configure a device as an NTP server?

A. ntp server

B. ntp peer

C. ntp master

D. ntp authenticate

 


Suggested Answer: C

 

Question 7

What is the maximum number of 10 Gigabit Ethernet connections that can be utilized in an EtherChannel for the virtual switch link?

A. 4

B. 6

C. 8

D. 12

 


Suggested Answer: C

The VSS is made up of the following:
✑ Virtual switch members: Cisco Catalyst 6500 Series Switches (up to two switches with initial release) deployed with the Virtual Switching Supervisor 720 10GE
✑ Virtual switch link (VSL): 10 Gigabit Ethernet connections (up to eight using EtherChannel) between the virtual switch members.
Reference: http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps9336/prod_qas0900aecd806ed74b.html

Question 8

Which device type can act as a client in a system that uses TACACS+?

A. end user wireless device

B. router

C. end user workstation

D. AD server

 


Suggested Answer: B

 

Question 9

What is the benefit of UDLD?

A. provides backup for fiber

B. help in preventing loops

C. removes loops

D. determines switch path

 


Suggested Answer: B

 

Question 10

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
 Image
 Image
 Image
 Image
 Image
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to the SW4 switch. Which of the following configuration steps will allow creating private VLANs?

A. Disable VTP pruning on SW1 only

B. Disable VTP pruning on SW2 only

C. Disable VTP pruning on SW4 only

D. Disable VTP pruning on SW2, SW4 and New_Switch

E. Disable VTP pruning on New_Switch and SW4 only.

 


Suggested Answer: C

To create private VLANs, you will need to only disable pruning on the switch that contains the private VLANs. In this case, only SW4 will connect to servers in a private VLAN.
Topic 2, Infrastructure Security

Question 11

A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?

A. Modify the spanning-tree priorities to dictate the traffic flow.

B. Create a Layer 3 transit VLAN to segment the traffic between the sites.

C. Use VTP pruning on the trunk interfaces.

D. Configure manual trunk pruning between the two locations.

 


Suggested Answer: Explanation

Pruning unnecessary VLANs from the trunk can be performed with one of two methods:
Manual pruning of the unnecessary VLAN on the trunk–This is the best method, and it avoids the use of the spanning tree. Instead, the method runs the
Reference Image
pruned VLAN on trunks.
VTP pruning–Avoid this method if the goal is to reduce the number of STP instances. VTP- pruned VLANs on a trunk are still part of the spanning tree.
Reference Image
Therefore, VTP-pruned VLANs do not reduce the number of spanning tree port instances.
Since the question asked for the choice that is an enhancement to the STP design, VTP pruning is the best choice.
Reference:
http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml

Question 12

How to recover err-disable after an UDLD failure?

A. UDLD reset

B. Err-disable auto recovery

C. Shut and no shutdown (restart)

D. Reboot the switch

E. UDLD recovery

 


Suggested Answer: C

 

Question 13

A network engineer is trying to deploy a PC on a network. The engineer observes that when the PC is connected to the network, it takes 30 to 60 seconds for the
PC to see any activity on the network interface card. Which Layer 2 enhancement can be used to eliminate this delay?

A. Configure port duplex and speed to auto negotiation.

B. Configure port to duplex full and speed 1000.

C. Configure spanning-tree portfast.

D. Configure no switchport.

 


Suggested Answer: C

When first powered on, each port goes through 4 states to ensure that there are no physical loops in the layer 2 broadcast domain. These steps are outlined as follows. With the initial version of spanning tree, this process could take from 30-60 seconds.
1.Blocking A port that would cause a switching loop, no user data is sent or received but it may go into forwarding mode if the other links in use were to fail and the spanning tree algorithm determines the port may transition to the forwarding state. BPDU data is still received in blocking state.
2.Listening The switch processes BPDUs and awaits possible new information that would cause it to return to the blocking state.
3.Learning While the port does not yet forward frames (packets) it does learn source addresses from frames received and adds them to the filtering database
(switching database)
4.Forwarding A port receiving and sending data, normal operation. STP still monitors incoming BPDUs that would indicate it should return to the blocking state to prevent a loop.
STP PortFast causes a Layer 2 LAN interface configured as an access port to enter the forwarding state immediately, bypassing the listening and learning states.
Reference: http://net.cmed.us/Home/ethernet-and-ip/spanning-tree-protocol

Question 14

Which of the following features does GLBP provide, but not HSRP and VRRP? (Choose all that apply.)

A. Support for single active router

B. Support for automatic load balancing

C. Support for multiple gateways

D. Support for interface tracking

 


Suggested Answer: BC

Support for automatic load balancing and support for multiple gateways are two features that are provided by Gateway Load Balancing Protocol (GLBP) but not by
Hot Standby Routing Protocol (HSRP) or Virtual Router Redundancy Protocol (VRRP).
GLBP, HSRP, and VRRP provide a redundant and fault-tolerant solution in case of first-hop router failure in a network. The basic operation of these three protocols is the same. In all three protocols, a group of routers on the same LAN is formed. One of the routers is selected as the active router and another as the standby router. The router with the highest priority is automatically selected as the active router. If the active router fails, the standby router assumes the responsibilities of the active router. The role of the active router is to forward the packets from the hosts to the virtual router (default gateway).
GLBP provides automatic load balancing between multiple routers by configuring multiple MAC addresses but a single virtual IP address. Every active virtual forwarder (AVF) in the group is configured with the virtual IP address but with different MAC addresses. All such AVFs can then participate in the packet- forwarding process. Multiple gateways then can share the load. On the contrary, HSRP and VRRP do not support automatic load balancing. Both these protocols require additional configuration on all the routers that need to load balance. The additional configuration involves using multiple groups on the routers or assignment of different default gateways for the hosts.
Note that GLBP and VRRP are supported by both Cisco and non-Cisco routers, whereas, HSRP is supported only by Cisco routers.
Single active router and interface tracking both are supported by GLBP, HSRP, and VRRP.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Home > End-of-Sale and End-of-Life Products > Cisco IOS Software Releases 12.2.T > Product Literature > White Papers > GLBP Gateway Load Balancing
Protocol > Information About Gateway Load Balancing Protocol
Home > Support > Technology Support > IP > IP Application Services > Design > Design Technotes > Hot Standby Router Protocol Features and Functionality >
HSRP Background and Operations > HSRP Operation

Question 15

Which two command sequences must you enter on a pair of switches so that they negotiate an EtherChannel using the Cisco proprietary port-aggregation protocol? (Choose two.)
A.
 Image
B.
 Image
C.
 Image
D.
 Image
E.
 Image

 


Suggested Answer: BD

 

Question 16

Instructions:
✑ Enter IOS commands on the device to verify network operation and answer the multiple-choice questions.
✑ THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
✑ Click on R1 and R2 to gain access to the consoles of these devices. No console or enable passwords are required.
✑ To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
✑ There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button
Scenario:
Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure. Click on the devices or the tabs at the bottom of the screens to access the CLI to answer their questions.
 Image
 Image
 Image
What issue is causing Router R1 and R2 to both be displayed as the HSRP active router for group 2?

A. The HSRP group number mismatch

B. The HSRP group authentication is misconfigured

C. The HSRP Hello packets are blocked

D. The HSRP timers mismatch

E. The HSRP group priorities are different

 


Suggested Answer: B

Based on the configuration output, we see that authentication is configured on R2, but not on R1:
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n44089800001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n44089800002.jpg” alt=”Reference Image” />
This can be further verified by issuing the “show standby” command on each router.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n44089800004.jpg” alt=”Reference Image” />

Question 17

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure. Click on the devices or the tabs at the bottom of the screens to access the CLI to answer their questions.
 Image
 Image
 Image
What is the virtual mac-address of HSRP group 1?

A. 0000.0c07.ac02

B. 4000.0000.0010

C. 0000.0c07.ac01

D. 4000.0000.ac01

E. 4000.0000.ac02

F. 0000.0c07.0010

 


Suggested Answer: B

Issuing the “show standby” command on either router shows us that the virtual MAC used by HSRP group 1 is 4000.0000.0010 as shown below:
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/0019800001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/0019900001.jpg” alt=”Reference Image” />

Question 18

What happens spoofed packet or something like untrusted packet is detected? (Choose three)

A. log

B. deletes

C. intercepts

D. accepts

E. discad

 


Suggested Answer: ACE

 

Question 19

Which two limitations of IP Source Guard are true? (Choose two.)

A. It is supported only on packets switched in hardware.

B. It is supported only on ingress Layer 2 ports.

C. It is supported only on egress Layer 3 ports.

D. It is supported only an PAgP EtherChannels.

E. It is supported only on ingress Layer 3 ports.

 


Suggested Answer: AB

Restrictions for IP Source Guard
Because the IP source guard feature is supported only in hardware, IP source guard is not applied if there are insufficient hardware resources available. These hardware resources are shared by various other ACL features that are configured on the system. The following restrictions apply to IP source guard:
✑ Supported only on ingress Layer 2 ports.
✑ Supported only in hardware; not applied to any traffic that is processed in software.
✑ Does not support filtering of traffic based on MAC address.
✑ Is not supported on private VLANs.
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/ip_source_guard.html

Question 20

Examine the configuration shown below in a partial output of the show run command executed from Router 5.
 Image
With this configuration, which of the following is true?

A. if POS 1/0 goes down, Router 5 will become the AVG.

B. if POS 1/0 goes down, Router 5 will relinquish its role as AVG.

C. if POS 1/0 and POS 2/0 go down, Router 5 will relinquish its role as AVG.

D. if POS 1/0 and POS 2/0 go down, Router 5 will become the AVG. C

 


Suggested Answer: Explanation

If POS 1/0 and POS 2/0 go down, Router 5 will relinquish its role as active virtual gateway (AVG). The example indicates that Router 5 is configured a member of
Gateway Load Balancing Protocol (GLBP) group 156 and that it is tracking the state of two of interfaces, POS 1/0 and 2/0. An initial weighting value of 120 has been assigned to the router in line 4, and upper and lower thresholds of 95 and 110 have been configured, respectively.
In lines 5 and 6, decrement values of 20 and 10 have assigned to the tracking of interface POS 1/0 and POS2/0, respectively. If either of the tracked interfaces goes down, the weight value of the router will be decreased by the amount of the decrement value. If the weight falls below the lower threshold (95), the router will relinquish its role as the AVG. If either single interface that is being tracked goes down, the weight value will not fall below the lower threshold, and the router will maintain its role of AVG. This occurs because 120 – 20 = 100, which is higher than 95 (the lowest threshold), and 120 – 10 = 110, which is also higher than 95. If both interfaces go down, the value will fall below the lower threshold (120 – 10 – 20 = 90, which is lower than 95), and the router will give up its role as the AVG.
The loss of interfaces will never cause a router to become the AVG. That can only occur if the router functioning as the current AVG in the group loses its interfaces.
The loss of either of the interfaces alone will not decrement the initial weighting value enough for it to fall below the lower threshold, and therefore will not cause the router to relinquish its role as AVG.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Cisco > Home > End-of-Sale and End-of-Life Products > Cisco IOS Software Releases > 12.2T > Product Literature > White Papers > GLBP – Gateway Load
Balancing Protocol –
Cisco > Cisco IOS IP Application Services Command Reference > threshold metric through weight (real server) > track

Question 21

What does the interface subcommand switchport voice vlan 222 indicate?

A. The port is configured for both data and voice traffic.

B. The port is fully dedicated to forwarding voice traffic.

C. The port operates as an FXS telephony port.

D. Voice traffic is directed to VLAN 222.

 


Suggested Answer: A

The interface subcommand:
Switch(config-if)# switchport voice vlan {vlan-id | dot1p | untagged | none} is used to select the voice VLAN mode that will be used when PC is connected to the switch port through Cisco IP phone.
Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_20_se/configuration/guide/swvoip.html

Question 22

Instructions -
✑ Enter IOS commands on the device to verify network operation and answer the multiple-choice questions.
✑ THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
✑ Click on SW1, SW2, New_Switch or SW4 to gain access to the consoles of these devices. No console or enable passwords are required.
✑ To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
✑ There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button
Scenario -
You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
Topology -
 Image
 Image
 Image
 Image
 Image
You are adding new VLANs. VLAN500 and VLAN600 to the topology in such way that you need to configure SW1 as primary root for VLAN 500 and secondary for
VLAN 600 and SW2 as primary root for VLAN 600 and secondary for VLAN 500. Which configuration step is valid?

A. Configure VLAN 500 & VLAN 600 on both SW1 & SW2

B. Configure VLAN 500 and VLAN 600 on SW1 only

C. Configure VLAN 500 and VLAN 600 on SW2 only

D. Configure VLAN 500 and VLAN 600 on SW1 ,SW2 and SW4

E. On SW2; configure vtp mode as off and configure VLAN 500 and VLAN 600; configure back to vtp server mode.

 


Suggested Answer: A

By issuing the “show vtp status command on SW2, SW2, and SW4 we see that both SW1 and SW2 are operating in VTP server mode, but SW4 is a client, so we will need to add both VLANs to SW1 and SW2.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/0011500001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/0011600001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/0011700001.jpg” alt=”Reference Image” />

Question 23

A new network that consists of several switches has been connected together via trunking interfaces. If all switches currently have the default VTP domain name
"null", which statement describes what happens when"a do"ain name is configured on one of the switches?

A. The switch with the non-default domain name restores back to “null” upon reboot.

B. Switches with higher revisio” num”ers does not accept the new domain name.

C. VTP summary advertisements are sent out of all ports with the new domain name.

D. All other switches with the default domain name become VTP clients.

 


Suggested Answer: C

By default, a switch will have a domain name of NULL and no password. If the switch hears a VTP advertisement it will automatically learn the VTP domain name,
VLANs, and the configuration revision number.
Summary advertisements sent out every 300 seconds and every time a change occurs on the VLAN database. Contained in a summary advertisement:
✑ VTP version
✑ Domain name
✑ Configuration revision number
✑ Time stamp
✑ MD5 encryption hash code
Reference: https://rowell.dionicio.net/configuring-cisco-vtp/

Question 24

Which Cisco StackWise feature is supported?

A. using different SDM templates on each switch

B. using different versions of the Cisco IOS on each switch

C. using mixed software feature set on all members

D. using same software feature set on all members

 


Suggested Answer: D

 

Question 25

Which feature rate-limits DHCP traffic?

A. DHCP Snooping

B. DHCP Acknowledge

C. DHCP Request

D. DHCP Spoofing

 


Suggested Answer: A

 

Question 26

Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure.
 Image
 Image
 Image
What is the virtual mac-address of HSRP group 1?

A. 0000.0c07.ac02

B. 4000.0000.0010

C. 0000.0c07.ac01

D. 4000.0000.ac01

E. 4000.0000.ac02

F. 0000.0c07.0010

 


Suggested Answer: B

Issuing the “show standby” command on either router shows us that the virtual MAC used by HSRP group 1 is 4000.0000.0010 as shown below:
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27558700001.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27558700000.jpg” alt=”Reference Image” />

Question 27

If VLAN 99 is set to trunk, how can you set it to untagged from trunk VLAN 99?

A. switchport access vlan 99

B. switchport vlan 99 access

C. switchport vlan 99 allow access

D. switchport allow access vlan 99

 


Suggested Answer: A

 

Question 28

What Cisco switch features are designed to work together to mitigate ARP spoofing attacks? (Choose two.)

A. DHCP snooping

B. port security

C. 802.1x

D. DAI

 


Suggested Answer: AD

Dynamic ARP inspection (DAI) and DHCP snooping are Cisco features designed to work together to mitigate ARP spoofing attacks. DAI validates ARP packets in a network. DAI determines the validity of an ARP packet based on the valid MAC address-to-IP-address bindings stored in the DHCP snooping database. This capability protects the network from some man-in-the-middle attacks. The following global configuration command instructs the switch to intercept, log, and discard packets with invalid IP-to-MAC address bindings for the specified VLANs. switch(config)# ip arp inspection vlan 10-12,15
When configuring DAI, ports are configured as either trusted or untrusted. DAI forwards all packets received on a trusted interface without checks but intercepts all packets on an untrusted port.
DHCP snooping creates an IP address to MAC address database that DAI uses to validate ARP packets. It compares the MAC address and IP address in ARP packets and only permits the traffic if the addresses match. This eliminates attackers spoofing MAC addresses. The following command enables DHCP MAC address verification: router(config)# ip dhcp snooping verify mac-address
DHCP Authorized ARP can also be used to mitigate ARP spoofing. When implemented, the server assigns an IP address to a client and then creates a static mapping. The DHCP server then sends periodic ARPs to clients to make sure that the clients are still active. Clients respond with an ARP reply. Unauthorized clients cannot respond to these periodic ARPs. The unauthorized ARP responses are blocked at the DHCP server.
DHCP snooping also is used to define ports as trusted for DHCP server connections. The purpose of DHCP snooping is to mitigate DHCP spoofing attacks.
DHCP snooping can be used to determine what ports are able to send DHCP server packets such as DHCPOFFER, DHCPACK, and DHCPNAK. DHCP snooping can also cache the MAC address to IP address mapping for clients receiving DHCP addresses from a valid DHCP server.
Port security is a method of only permitting specified MAC addresses access to a switch port. This can be used to define what computer or device can be connected to a port, but not eliminate ARP spoofing.
802.1x is a method of determining authentication before permitting access to a switch port. This is useful in restricting who can connect to the switch; it does not inspect ARP packets.
Objective:
Infrastructure Security –
Sub-Objective:
Configure and verify switch security features
References:
Catalyst 6500 Release 12.2SXF and Rebuilds Software Configuration Guide > Configuring Dynamic ARP Inspection (DAI)
Cisco > Cisco IOS IP Addressing Services Command Reference > ARP Commands > ip arp inspection vlan

Question 29

DRAG DROP -
Match the HSRP states on the left with the correct definition on the right.
Select and Place:
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 30

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
 Image
 Image
 Image
 Image
 Image
Refer to the configuration. For which configured VLAN are untagged frames sent over trunk between SW1 and SW2?

A. VLAN1

B. VLAN 99

C. VLAN 999

D. VLAN 40

E. VLAN 50

F. VLAN 200

G. VLAN 300

 


Suggested Answer: B

The native VLAN is used for untagged frames sent along a trunk. By issuing the “show interface trunk” command on SW1 and SW2 we see the native VLAN is 99.
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27553200006.jpg” alt=”Reference Image” />
<img src=”https://www.examtopics.com/assets/media/exam-media/01585/n27553200004.jpg” alt=”Reference Image” />

Question 31

Which statements about RSPAN are true? (Choose two.)

A. It supports MAC address learning.

B. RSPAN VLANS can carry RSPAN traffic only.

C. only one RSPAN VLAN can be configured per device.

D. RSPAN VLANs are exempt from VTP pruning.

E. MAC address learning is not supported

F. RSPAN uses are GRE tunnel to transmit captured traffic.

 


Suggested Answer: BE

The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. It has these special characteristics:
All traffic in the RSPAN VLAN is always flooded.
No MAC address learning occurs on the RSPAN VLAN.
RSPAN VLAN traffic only flows on trunk ports.
RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN configuration mode command.
STP can run on RSPAN VLAN trunks but not on SPAN destination ports.
An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.
For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its associated RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the extended VLAN range (1006 to 4094), you must manually configure all intermediate switches.
It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining a network-wide RSPAN session. That is, multiple
RSPAN source sessions anywhere in the network can contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN VLAN ID separates the sessions. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_40_se/configuration/guide/scg/swspan.pdf

Question 32

Which two statements about Cisco Discovery Protocol are true? (Choose two.)

A. It is not supported with SNMP

B. It runs on OSI Layer 2

C. It is supported on Frame Relay subinterfaces

D. It uses a TLV to advertise the native VLAN

E. It runs on OSI Layer 1

 


Suggested Answer: BD

 

Question 33

Instructions -
To configure a switch click on the console host icon in the topology.
You can click on the buttons to view the different windows.
Each of the windows can be minimized by clicking on the [-]. You can also reposition a window by dragging it by the title bar.
Most commands that use the "Control" or "Escape" keys are not supported and are not necessary to complete this simulation. The help command does not display all commands of the help system.
Scenario -
You work for SWITCH.com. They have just added a new switch (SwitchB) to the existing network as shown in the topology diagram.
RouterA is currently configured correctly and is providing the routing function for devices on SwitchA and SwitchB. SwitchA is currently configured correctly, but will need to be modified to support the addition of SwitchB. SwitchB has a minimal configuration. You have been tasked with competing the needed configuring of
SwitchA and SwitchB. SwitchA and SwitchB use cisco as the enable password.
All commands must be entered at the physical interface level.
Configuration Requirement for SwitchA:
✑ The VTP and STP configuration modes on SwitchA should not be modified.
✑ SwitchA needs to be the root switch for vlans 11, 12, 13, 21, 22, and 23. All other vlans should be left are their default values.
Configuration Requirement for SwitchB:
✑ Vlan 21
- Name:  Marketing
- will support wo servers attached to fa0/9 and fa0/10
✑ Vlan 22
- Name:  Sales
- will support two servers attached to fa0/13 and fa0/14
✑ Vlan 23
- Name:  Engineering
- will support two servers attached to fa0/15 and fa0/16
✑ Access ports that connect to server should transition immediately to forwarding state upon detecting the connection of a device.
✑ SwitchB VTP mode needs to be the same as SwitchA.
✑ SwitchB must operate in the same spanning tree mode as SwitchA.
✑ No routing is to be configured on SwitchB
✑ Only the SVl Vlan 1 is to be configured and it is to use address 192.168.1.11/24
Inter-switch Connectivity Configuration Requirements
✑ For operational and security reasons trunking should be unconditional and Vlans 1, 21, 22, and 23 should tagged when traversing the trunk link.
✑ The two trunks between SwitchA and SwitchB need to be configured in a mode that allows for the maximum use of their bandwidth for all vlans. This mode should be done with a non-proprietary protocol, with SwitchA controlling activation.
✑ Propagation of unnecessary broadcasts should be limited using manual pruning on this trunk link.
Topology -
 Image
Refer to the exhibit.
 Image
Which configuration ensures that the Cisco Discovery Protocol packet update frequency sent from DSW1 to ALS1 is half of the default value?

A. DSW1(config)#cdp timer 90

B. DSW1(config-if)#cdp holdtime 60

C. DSW1(config)#cdp timer 30

D. DSW1(config)#cdp holdtime 90

E. DSW1(config-if)#cdp holdtime 30

F. DSW1(config-if)#cdp timer 60

 


Suggested Answer: C

 

Question 34

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
 Image
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to the SW4 switch. Which of the following configuration steps will allow creating private VLANs?

A. Disable VTP pruning on SW1 only

B. Disable VTP pruning on SW2 only

C. Disable VTP pruning on SW4 only

D. Disable VTP pruning on SW2, SW4 and New_Switch

E. Disable VTP pruning on New_Switch and SW4 only.

 


Suggested Answer: C

To create private VLANs, you will need to only disable pruning on the switch that contains the private VLANs. In this case, only SW4 will connect to servers in a private VLAN.

Question 35

You are configuring an interface, and you want to enable Layer 3 mode on an EtherChannel. Which task must you perform?

A. issue the no switchport command

B. Set the channel group to desirable

C. Set the channel group to active

D. Issue the ip address command

 


Suggested Answer: D

 

Question 36

In which two ways can a port respond to a port-security violation? (Choose two.)

A. The port enters the err-disabled state

B. The port enters the shutdown state

C. The port triggers an EEM script to notify support staff and continues to forward traffic normally

D. The SecurityViolation counter is incremented and the port sends an SNMP trap

E. The SecurityViolation counter is incremented and the port sends a critical syslog message to the console

F. The port immediately begins to drop all traffic

 


Suggested Answer: AD

protect – The PFC drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value. restrict – The PFC drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the security violation counter to increment. shutdown – Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.
Restrict increments the counter and sends an SNMP trap. And shutdown puts the interface in err-disabled state.

Question 37

Which statement about the configuration of MST on an IOS switch is true?

A. When MST is enabled, RSTP is automatically enabled and MST will use BPDU version 4, maximum of 16 instances of MST can exist.

B. When MST is enabled, RSTP is automatically disabled and MST will use BPDU version 4, maximum of 16 instances of MST can exist.

C. When MST is enabled, RSTP is automatically disabled and MST will use BPDU version 2, maximum of 16 instances of MST can exist.

D. When MST is enabled, RSTP is automatically enabled and MST will use BPDU version 2, maximum of 16 instances of MST can exist.

 


Suggested Answer: D

 

Question 38

Which two commands configure SPAN to monitor outgoing traffic across multiple interfaces? (Choose two.)

A. monitor session 1 destination interface gigabitethernet1/0/2 rx

B. monitor session 1 source vlan 10 – 20 tx

C. monitor session 1 destination interface gigabitethernet1/0/2

D. monitor session 1 source interface gigabitethernet1/0/1 tx

E. monitor session 1 source interface gigabitethernet1/0/1 rx

 


Suggested Answer: BC

 

Question 39

CORRECT TEXT -
Scenario:
You work for SWITCH.com. They have just added a new switch (SwitchB) to the existing network as shown in the topology diagram.
RouterA is currently configured correctly and is providing the routing function for devices on SwitchA and SwitchB. SwitchA is currently configured correctly, but will need to be modified to support the addition of SwitchB. SwitchB has a minimal configuration. You have been tasked with competing the needed configuring of
SwitchA and SwitchB. SwitchA and SwitchB use Cisco as the enable password.
Configuration Requirements for SwitchA
The VTP and STP configuration modes on SwitchA should not be modified.
SwitchA needs to be the root switch for vlans 11, 12, 13, 21, 22 and 23. All other vlans should be left are their default values.
Configuration Requirements for SwitchB
Vlan 21
- Name: Marketing
- will support two servers attached to fa0/9 and fa0/10  Vlan 22
- Name: Sales
- will support two servers attached to fa0/13 and fa0/14  Vlan 23
-Name: Engineering
-will support two servers attached to fa0/15 and fa0/16
Access ports that connect to server should transition immediately to forwarding state upon detecting the connection of a device.
SwitchB VTP mode needs to be the same as SwitchA.
SwitchB must operate in the same spanning tree mode as SwitchA
No routing is to be configured on SwitchB
Only the SVI vlan 1 is to be configured and it is to use address 192.168.1.11/24
Inter-switch Connectivity Configuration Requirements
For operational and security reasons trunking should be unconditional and Vlans 1, 21, 22 and 23 should tagged when traversing the trunk link.
The two trunks between SwitchA and SwitchB need to be configured in a mode that allows for the maximum use of their bandwidth for all vlans. This mode should be done with a non- proprietary protocol, with SwitchA controlling activation.
Propagation of unnecessary broadcasts should be limited using manual pruning on this trunk link.
 Image
A.
B.
C.
D.

 


Suggested Answer: Answer: Here are steps:

hostname SWITCH_B
!
!
vlan 21
name Marketing
vlan 22
name Sales
vlan 23
name Engineering
!
!
interface FastEthernet0/3
switchport trunk allowed vlan 1,21-23
channel-protocol lacp
channel-group 1 mode passive
switchport mode trunk
!
interface FastEthernet0/4
switchport trunk allowed vlan 1,21-23
channel-protocol lacp
channel-group 1 mode passive
switchport mode trunk
!
interface FastEthernet0/9
switchport access vlan 21
switchport mode access
spanning-tree portfast
!
interface FastEthernet0/10
switchport access vlan 21
switchport mode access
spanning-tree portfast
!
interface FastEthernet0/13
switchport access vlan 22
switchport mode access
spanning-tree portfast
!
!
interface FastEthernet0/14
switchport access vlan 22
switchport mode access
spanning-tree portfast
!
interface FastEthernet0/15
switchport access vlan 23
switchport mode access
spanning-tree portfast
!
interface FastEthernet0/16
switchport access vlan 23
switchport mode access
spanning-tree portfast
!
!
interface GigabitEthernet1/1
!
interface GigabitEthernet1/2
!
interface Port-channel 1
switchport mode trunk
switchport trunk encapsulation dot1q
spanning-tree allowed vlans 1,21-23
!
interface Vlan1
ip address 192.168.1.11 255.255.255.0
!
end
SWITCH_B(config)#
hostname SWITCH_A
!
panning-tree vlan 11 root primary
spanning-tree vlan 12 root primary
spanning-tree vlan 13 root primary
spanning-tree vlan 21 root primary
spanning-tree vlan 22 root primary
spanning-tree vlan 23 root primary
!
interface FastEthernet0/3
switchport trunk allowed vlan 1,21-23
channel-protocol lacp
channel-group 1 mode active
switchport mode trunk
!
interface FastEthernet0/4
switchport trunk allowed vlan 1,21-23
channel-protocol lacp
channel-group 1 mode active
switchport mode trunk
!
interface FastEthernet0/21
switchport access vlan 21
switchport mode access
!
interface FastEthernet0/22
switchport access vlan 22
switchport mode access
!
interface FastEthernet0/23
switchport access vlan 23
switchport mode access
!
interface GigabitEthernet1/1
!
interface GigabitEthernet1/2
!
interface Port-channel 1
!
interface Vlan1
no ip address
shutdown
!
ip default-gateway 192.168.1.1
!
!
End

Question 40

Which statement about the default behavior of a Cisco switch MAC address table is true?

A. MAC addresses are not learned on extended VLANs.

B. MAC addresses are aged out of the MAC table after 600 seconds.

C. MAC addresses are associated with a VLAN.

D. MAC address filtering is enabled on trunk ports.

 


Suggested Answer: C

 

Question 41

Refer to the exhibit.
 Image
Which login credentials are required when connecting to the console port in this output?

A. none required

B. username cisco with password cisco

C. no username with password linepass

D. login authentication default

 


Suggested Answer: A

Here the console has been configured with the NO_AUTH name, which lists none as the authentication method. None means no authentication, meaning that credentials are not required and all sessions are allowed access immediately.

Question 42

A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server.
Which action resolves this problem?

A. Reload the new switch.

B. Restart the VTP process on the new switch.

C. Reload the VTP server.

D. Verify connected trunk ports.

 


Suggested Answer: D

VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work. The first thing that should be done is to verify that the trunk ports are connected and up.

Question 43

Which command can you enter to set the time between BPDUs in an MST environment by route bridge?

A. spanning-tree mst 1 cost 5

B. spanning-tree mst mst forward-time 5

C. spanning-tree mst hello-time 2

D. spanning-tree mst max-age 20

 


Suggested Answer: C

 

Question 44

How do you configure loop guard?

A. (config)#spanning-tree loop guard default

B. (config-if)#spanning-tree loop

C. (config)#spanning-tree loop-guard default

D. (config-if)#spanning-tree guard loop

 


Suggested Answer: D

 

Question 45

DRAG DROP -
Drag and Drop - STP Timer Delay (Concepts Only)
✑ Diameter of the STP Domain (dia)
✑ Bridge Transit Delay (transit delay)
✑ BPDU Transmission Delay (bpdu_delay)
Select and Place:
Select and Place:

 


Suggested Answer:

 

Question 46

What is the link called between a VSS?

A. VSL (Virtual Switch Link)

B. SVI

C. DCSP

D. VLAN

 


Suggested Answer: A

 

Question 47

Which two functions of DHCP snooping are true? (Choose two.)

A. It rate-limits DHCP traffic from trusted and untrusted sources.

B. It listens to multicast messages between senders and receiver.

C. It helps build the route table.

D. It filters invalid messages from untrusted sources.

E. It correlates IP address to hostnames.

 


Suggested Answer: AD

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html

Question 48

Which two statements about configuring EtherChannels are true? (Choose two.)

A. They can be configured with the no switchport command to place them in Layer 3 mode.

B. They can be configured to send Layer 2 packets.

C. They can be configured to operate with up to links in a single channel.

D. They can be configured to passively negotiate a channel with a connected peer.

E. They can be configured to load-balance traffic based on Layer 7 information.

 


Suggested Answer: AD

 

Question 49

How many Active Virtual Gateways (AVG) can be used in a GLBP protocol?

A. Only one AVG can be elected on a switch

B. Two AVG could be elected on a switch

C. Two AVG just could be elected in GLBP v2

D. GLBP supports 8 AVGs per group

 


Suggested Answer: A

 

Question 50

The partial output displayed in the exhibit is a result of what IOS command? (Click on the Exhibit(s) button.)
 Image

A. switch# show running-config

B. switch# show standby vlan1 active brief

C. switch# show hsrp 1

D. switch# show standby

 


Suggested Answer: D

The command show standby produces the output displayed in the exhibit. This command displays information about HSRP on all configured interfaces and for all
HSRP groups. Important information in the exhibit includes that this router is the active router, the virtual IP address for the HSRP group is 172.16.1.20, the address of the standby router is 172.16.1.6, and the router is configured to preempt.
The command show running-config will display the complete configuration of the device, including the configuration of HSRP, but will not display the current status of HSRP on the switch.
The command show standby vlan 1 active brief provides a summary display of all HSRP groups on the switch that are in the active state. This output would provide basic information, not nearly the detail indicated in the exhibit. The following is an example of output for show standby vlan 1 active brief:
Interface Grp Prio P State Active addr Standby addr Group addr
Vlan1 0 120 Active 172.16.1.5 Unknown 172.16.1.20
The command show hsrp 1 is not valid due to incorrect syntax.
Objective:
Infrastructure Services –
Sub-Objective:
Configure and verify first-hop redundancy protocols
References:
Cisco > Cisco IOS IP Application Services Command Reference > show ip sockets through standby name > show standby
Cisco > Cisco IOS IP Application Services Configuration Guide, Release 12.4 > Part 1: First Hop Redundancy Protocols > Configuring HSRP

Access Full 300-115 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 300-115 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 300-115 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

300-101 Mock Test Free

Next Post

300-160 Mock Test Free

Next Post

300-160 Mock Test Free

300-320 Mock Test Free

300-410 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.