ccnp-switch - gratis exam · ccnp-switch number : 642-813 passing score : 790 time limit : 150 min...

176
CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0 http://www.gratisexam.com/ Sections 1. VLAN VTP STP 2. VLAN 3. VLAN Trunking 4. STP 5. VTP 6. VLAN Hopping 7. DHCP Snooping 8. Dynamic ARP Inspection DAI 9. VLAN Access Map 10. Port Security 11. Private VLAN 12. EtherChannel 13. InterVLAN Routing 14. Voice Support 15. HSRP 16. VRRP 17. GLBP 18. Gateway Redundancy 19. Wireless

Upload: lamduong

Post on 04-May-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

CCNP-SWITCH

Number: 642-813Passing Score: 790Time Limit: 150 minFile Version: 1.0

http://www.gratisexam.com/

Sections1. VLAN VTP STP2. VLAN3. VLAN Trunking4. STP5. VTP6. VLAN Hopping7. DHCP Snooping8. Dynamic ARP Inspection DAI9. VLAN Access Map10.Port Security11.Private VLAN12.EtherChannel13. InterVLAN Routing14.Voice Support15.HSRP16.VRRP17.GLBP18.Gateway Redundancy19.Wireless

Page 2: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Exam A

QUESTION 1Regarding the exhibit and the partial configuration of switch SA and SB. STP is configured on all switches in thenetwork. SB receives this error message on the console port:

00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex),with SA FastEthernet0/4 (half duplex), with TBA05071417(Cat6K-B) 0/4 (half duplex).

What would be the possible outcome of the problem?

A. The root port on switch P4S-SB will fall back to full-duplex mode.B. The interfaces between switches P4S-SA and P4S-SB will transition to a blocking state. C. The root port on switch P4S-SA will automatically transition to full-duplex mode.D. Interface Fa0/6 on switch SB will transit to a forwarding state and create a bridging loop.

Correct Answer: DSection: VLAN VTP STPExplanation

Explanation/Reference:From the output, we learned that the interfaces on two switches are operating in different duplex modes: Fa0/4of SA in half-duplex mode & Fa0/5 of SB in full-duplex mode. In this case, because SB is operating in fullduplex mode, it does not check the carrier sense before sending frames (CSMA/CD is not used in full-duplexmode). Therefore, SB can start to send frames even if SA is using the link and a collision will occur. The resultof this is SA will wait a random time before attempting to transmit another frame. If B sends enough frames to Ato make every frame sent from A (which includes the BPDUs) get dropped then SB can think it has lost rootbridge (B does not receive BPDUs from A anymore). Therefore SB will unblock its Fa0/6 interface fortransmitting and cause a bridging loop.

Page 3: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 2On a multilayer Catalyst switch, which interface command is used to convert a Layer 3 interface to a Layer 2interface?

A. switchport access vlan vlan-idB. switchportC. switchport mode accessD. no switchport

Correct Answer: BSection: VLANExplanation

Explanation/Reference:

QUESTION 3Refer to the exhibit and the show interfaces fastethernet0/1 switchport outputs. Users in VLAN 5 on switchSW_A complain that they do not have connectivity to the users in VLAN 5 on switch SW_B. What should bedone to fix the problem?

Page 4: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Configure the same number of VLANs on both switches.B. Create switch virtual interfaces (SVI) on both switches to route the traffic.C. Define VLAN 5 in the allowed list for the trunk port on SW_A.D. Disable pruning for all VLANs in both switches.E. Define VLAN 5 in the allowed list for the trunk port on SW_B.

Correct Answer: CSection: VLANExplanation

Explanation/Reference:SW_A is missing VLAN 5 in the “Trunking VLANs Enabled”, that means the trunk link currently does not accepttraffic from VLAN 5 to be sent on the link.

QUESTION 4Refer to the show interface Gi0/1 switchport command output shown in the exhibit. Which two statements aretrue about this interface? (Choose two)

A. This interface is a member of a voice VLAN.B. This interface is configured for access mode.C. This interface is a dot1q trunk passing all configured VLANs.D. This interface is a member of VLAN 7.E. This interface is a member of VLAN 1.

Page 5: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BDSection: VLANExplanation

Explanation/Reference:

QUESTION 5In the three-layer hierarchical network design model; what’s associated with the access layer? (Choose two)

http://www.gratisexam.com/

A. optimized transport structureB. high port densityC. boundary definitionD. data encryptionE. local VLANsF. route summaries

Correct Answer: BESection: VLANExplanation

Explanation/Reference:Main characteristics of three layers in the three-layer hierarchical network design model:

* Access layer:+ Low cost per switch port+ High port density+ Scalable uplinks to higher layers+ User access functions such as VLAN membership, traffic and protocol filtering, and quality of service (QoS)+ Resiliency through multiple uplinks

* Distribution Layer:+ Aggregation of multiple access-layer devices+ High Layer 3 throughput for packet handling+ Security and policy-based connectivity functions through access lists or packet filters+ QoS features+ Scalable and resilient high-speed links to the core and access layers

* Core layer:+ Very high throughput at Layer 3+ No costly or unnecessary packet manipulations (access lists, packet filtering)+ Redundancy and resilience for high availability+ Advanced QoS functions

Also, end-to-end VLANs and local VLANs belong to access layer.

QUESTION 6

Page 6: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Refer to the following exhibits:

Exhibit #1

Exhibit #2

Page 7: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Study the exhibits carefully. The switchport output in Exhibit #1 displays the default settings of interfaceFastEthernet 0/13 on switch Sw1. Figure 2 displays the desired interface settings. Which command sequencewould configure interface FastEthernet 0/13 as displayed in Exhibit #2?

A. Sw1(config-if)# switchport trunk encapsulation dot1q Sw1 (config-if)# switchport mode dynamic auto Sw1 (config-if)# switchport trunk native DATA Sw1 (config-if)# switchport trunk allowed vlan add 1,10,20

B. Sw1(config-if)# switchport trunk encapsulation dot1q Sw1(config-if)# switchport mode dynamic desirable Sw1(config-if)# switchport trunk native vlan DATA Sw1(config-if)# switchport trunk allowed vlan 1,10,20

C. Sw1 (config-if)# switchport trunk encapsulation dot1q Sw1 (config-if)# switchport mode trunk Sw1 (config-if)# switchport trunk native DATA Sw1 (config-if)# switchport trunk allowed vlan 1,10,20

D. Sw1(config-if)# switchport trunk encapsulation dot1qSw1(config-if)#switchport mode dynamic desirableSw1(config-if)#switchport trunk native vlan 10

E. Sw1 (config-if)# switchport trunk encapsulation dot1q Sw1 (config-if)# switchport mode dynamic desirable Sw1 (config-if)# switchport trunk native vlan 10Sw1 (config-if)# switchport trunk allowed vlan 1,10,20

Correct Answer: ESection: VLAN

Page 8: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation

Explanation/Reference:

QUESTION 7Which configuration option will cause the link between two Cisco 3600 Series Multiservice Platforms to becomea functional trunk?

A. switchport dynamic auto switchport dynamic autoB. switchport access vlan 10

switchport mode dynamic desirableC. switchport mode trunk switchport nonegotiateD. Leave both ports with the default trunk settings.

Correct Answer: DSection: VLAN TrunkingExplanation

Explanation/Reference:

QUESTION 8If you were to set up a VLAN trunk over a Fast Ethernet link on switch R1, which trunk mode would you set thelocal port to on R1 if you wanted it to respond to requests from its link partner (R2) and become a trunk?

A. AutoB. NegotiateC. DesignateD. Nonegotiate

Correct Answer: ASection: VLAN TrunkingExplanation

Explanation/Reference:

QUESTION 9Which two statements are true about best practices in VLAN design? (Choose two)

A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at thedistribution layer.

B. Routing may be performed at all layers but is most commonly done at the core and distribution layers.C. Routing should not be performed between VLANs located on separate switches.D. VLANs should be local to a switch.E. VLANs should be localized to a single switch unless voice VLANs are being utilized.

Correct Answer: BDSection: VLAN TrunkingExplanation

Explanation/Reference:

Page 9: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 10You need to configure a new Company switch to support DTP. Which DTP switchport mode parameter sets theswitch port to actively send and respond to DTP negotiation frames?

A. AccessB. NonegotiateC. TrunkD. Dynamic desirableE. Dynamic auto

Correct Answer: DSection: VLAN TrunkingExplanation

Explanation/Reference:

QUESTION 11Refer to the exhibit. Which statement is true about the output?

Page 10: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The port on switch CAT1 is forwarding and sending BPDUs correctly.B. The port on switch CAT1 is blocking and sending BPDUs correctlyC. The port on switch CAT2 is forwarding and receiving BPDUs correctly.D. The port on switch CAT2 is blocking and sending BPDUs correctly.E. The port on switch CAT3 is forwarding and receiving BPDUs correctly.F. The port on switch CAT3 is forwarding, sending, and receiving BPDUs correctly.

Correct Answer: ASection: STPExplanation

Explanation/Reference:From the first lines of the “show” commands and the BPDU sent and received we can conclude:

CAT1 is forwarding and sending BPDUs correctly (BPDU: sent 237, received 1) but it is not receiving BPDUs.CAT2 is blocking and receiving BPDUs correctly (BPDU: sent 1, received 242) but it is not sending BPDUs.CAT3 is forwarding and sending BPDUs correctly (BPDU: sent 24, received 0) but it is not receiving BPDUs.

-> only answer A is correct.

QUESTION 12Which of the following specifications is a companion to the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP)algorithm, and warrants the use multiple spanning-trees?

A. IEEE 802.1s (MST)B. IEEE 802.1Q (CST)C. Cisco PVST+D. IEEE 802.1d (STP)

Correct Answer: ASection: STPExplanation

Explanation/Reference:MST maps multiple VLANs into a spanning tree instance, with each instance having a spanning tree topologyindependent of other spanning tree instances. This architecture provides multiple forwarding paths for datatraffic, enables load balancing, and reduces the number of STP instances required to support a large number ofVLANs. MST improves the fault tolerance of the network because a failure in one instance (forwarding path)does not affect other instances (forwarding paths).

Note: RSTP is automatically turned on along with MST (the “spanning-tree mode mst” in global configurationmode will turn on both RSTP & MST)

(Reference: http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_rel_4_0_1a/MST.html)

QUESTION 13What two things will occur when an edge port receives a BPDU? (Choose two)

A. The port immediately transitions to the Forwarding state.B. The switch generates a Topology Change Notification (TCN) BPDU.

Page 11: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. The port immediately transitions to the err-disable state.D. The port becomes a normal STP switch port.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:The concept of edge port basically corresponds to the PortFast feature. An edge port directly transitions to theforwarding state, and skips the listening and learning stages. An edge port that receives a BPDU immediatelyloses edge port status and becomes a normal spanning tree port.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml#edge)

QUESTION 14Which statement is true about RSTP topology changes?

A. Only nonedge ports moving to the blocking state generate a TC BPDU.B. Any loss of connectivity generates a TC BPDU.C. Any change in the state of the port generates a TC BPDU.D. Only nonedge ports moving to the forwarding state generate a TC BPDU.E. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.

Correct Answer: DSection: STPExplanation

Explanation/Reference:When a Switch (Bridge) discovers topology change, it generates a TCN (Topology Change Notification) BPDU(Bridge Protocol Data Unit) and sends the TCN BPDU on its root port. The upstream Switch (Bridge) respondsback the sender with TCA (Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit) and TCA(Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit)The upstream Switch (Bridge) (bridge which received the TCN BPDU) generates another TCN BPDU andsends out via its Root Port. The process continues until the Root Switch (Bridge) receives the TCN BPDU.When the Root Switch (Bridge) is aware that there is a topology change in the network, it starts to send out itsConfiguration BPDUs with the topology change (TC) bit set. Configuration BPDUs are received by every Switch(Bridge) in the network and all bridges become aware of the network topology change.

The switch never generates a TCN when a port configured for PortFast goes up or down -> it means no TC willbe created for PortFast (or Edge Port) -> D is correct.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094797.shtml)

QUESTION 15Which of the following conditions guarantees that a broadcast storm cannot occur?

A. a native VLAN mismatch on either side of an 802.1Q linkB. BPDU filter configured on a link to another switchC. Spanning Tree Protocol enabled on both Layer 2 and multilayer switchesD. PortFast enabled on all access and trunk ports

Correct Answer: C

Page 12: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Section: STPExplanation

Explanation/Reference:

QUESTION 16Which two statements are true about port BPDU Guard and BPDU filtering? (Choose two)

A. BPDU guard can be enabled globally, whereas BPDU filtering must be enabled on a per-interface basis.B. When globally enabled, BPDU port-guard and BPDU filtering apply only to PortFast enabled ports.C. When globally enabled. BPDU port-guard and BPDU filtering apply only to trunking-enabled ports.D. When a BPDU is received on a BPDU port-guard enabled port, the interface goes into the err-disabled

state.E. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the err-disabled state.F. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the STP blocking state.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:

QUESTION 17Which of the following will generate an RSTP topology change notification?

A. an edge port that transitions to the forwarding stateB. a non-edge port that transitions to the blocking stateC. a non-edge port that transitions to the forwarding stateD. an edge port that transitions to the blocking stateE. any port that transitions to the blocking stateF. any port that transitions to the forwarding state

Correct Answer: CSection: STPExplanation

Explanation/Reference:

QUESTION 18What is the effect of configuring the following command on a switch?

A. If BPDUs are received by a port configured for PortFast, then PortFast is disabled and the BPDUs areprocessed normally.

B. If BPDUs are received by a port configured for PortFast, they are ignored and none are sent.C. If BPDUs are received by a port configured for PortFast, the port will transition to forwarding state.D. The command will enable BPDU filtering on all ports regardless of whether they are configured for BPDU

Page 13: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

filtering at the interface level.

Correct Answer: ASection: STPExplanation

Explanation/Reference:

QUESTION 19Refer to the show spanning-tree mst configuration output shown in the exhibit. What should be changed in theconfiguration of the switch SW_2 in order for it to participate in the same MST region?

A. Switch SW_2 must be configured with the revision number of 2.B. Switch SW_2 must be configured with a different VLAN range.C. Switch SW_2 must be configured with the revision number of 1.D. Switch SW_2 must be configured with a different MST name.

Correct Answer: CSection: STPExplanation

Explanation/Reference:

QUESTION 20Switch R1 has been configured with the root guard feature. What statement is true if the spanning treeenhancement Root Guard is enabled?

A. If BPDUs are not received on a non-designated port, the port is moved into the STP loop-inconsistentblocked state

B. If BPDUs are received on a PortFast enabled port, the port is disabled.C. If superior BPDUs are received on a designated port, the interface is placed into the root-inconsistent

blocked state.D. If inferior BPDUs are received on a root port, all blocked ports become alternate paths to the root bride.

Correct Answer: CSection: STPExplanation

Explanation/Reference:

QUESTION 21Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STPprocess for VLAN 200 are true? (Choose two)

Page 14: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. BPDUs will be sent out every two seconds.B. The time spent in the listening state will be 30 secondsC. The time spent in the learning state will be 15 seconds.D. The maximum length of time that the BPDU information will be saved is 30 seconds. E. This switch is the root bridge for VLAN 200.F. BPDUs will be sent out every 10 seconds.

Correct Answer: BFSection: STPExplanation

Explanation/Reference:From the output you learn that:

+ This is not the root bridge for VLAN 200 (it does not have the line “This bridge is the root” and the root bridgeinformation is shown first. It has a Alternative port).+ The root bridge is sending Hello every 10 seconds, Max Age is 20 seconds and Forward Delay is 15 secondswhile the local bridge is sending Hello every 2 seconds, Max Age is 20 seconds and Forward Delay is 15seconds.

Aan IEEE bridge is not concerned about the local configuration of the timers value. The IEEE bridge considersthe value of the timers in the BPDU that the bridge receives. Effectively, only a timer that is configured on theroot bridge of the STP is important. In this case, the local switch will import STP timers from the root bridge ->The listening state (or learning state) will be 30 seconds, which equals to Forward Delay. Also BPDUs will besent out every 10 seconds (Hello packets).

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094954.shtml)

QUESTION 22What is the default VTP advertisement for subset advertisements in Catalyst switches that are in server orclient mode?

Page 15: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. 30 secondsB. 5 minutesC. 1 minuteD. 10 secondsE. 5 seconds

Correct Answer: BSection: VTPExplanation

Explanation/Reference:Subset advertisements list the specific changes that have been performed, such as creating or deleting aVLAN, suspending or activating a VLAN, changing the name of a VLAN, and changing a VLAN’s maximumtransmission unit (MTU), status of the VLAN, VLAN type (such as Ethernet or Token Ring), length of the VLANname, VLAN number, security association identifier (SAID) value. Summary advertisements are sent out every300 seconds (5 minutes) by default.

QUESTION 23Two Company switches are connected via a trunk using VTP. Which VTP information does a Catalyst switchadvertise on its trunk ports when using VTP? (Choose two)

A. STP root statusB. VTP modeC. Negotiation statusD. Management domainE. Configuration revision number

Correct Answer: DESection: VTPExplanation

Explanation/Reference:

QUESTION 24The network operations center has received a call stating that users in VLAN 107 are unable to accessresources through Router 1. From the information contained in the graphic, what is the cause of this problem?

Page 16: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. VLAN 107 does not exist on switch A.B. VTP is pruning VLAN 107.C. VLAN 107 is not configured on the trunk.D. Spanning tree is not enabled on VLAN 107.

Correct Answer: BSection: VTPExplanation

Explanation/Reference:From the “VLANs in spanning tree forwarding state and not pruned” we can deduce that VLAN 107 is currentlypruned on switch A.

QUESTION 25A switch that is to be added to the production network has been preconfigured (trunks, VLANs, VTP, and STP)and was tested in your lab. After installing the switch into the network, the entire network went down. Whatmight explain what happened?

Page 17: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The new switch happened to be running Cisco Catalyst operating system, while the other network switcheswere running Cisco IOS Software.

B. The configuration revision of the new switch was higher than the configuration revision of the productionVTP domain.

C. The link costs on the new switch are set to a high value, causing all ports on the new switch to go into aforwarding mode and none into blocking mode, thereby causing a spanning-tree loop.

D. The ports connecting to the two switches have been configured incorrectly. One side has the commandswitchport mode access and the other switchport mode trunk.

Correct Answer: BSection: VTPExplanation

Explanation/Reference:If the configuration revision number of the new switch is higher than that of the rest of Cisco switches and it is inClient or Server mode with the same VTP domain then it can wipe out other switches’ VLAN information. This isa nightmare if you are working for a large company and it can make you to lose your job so please rememberthis: always set your newly added Cisco switch to VTP Transparent mode before plugging into your workingnetwork. This step also resets the Configuration Revision Number of that switch back to 0, which is safe to pluginto your network.

QUESTION 26Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network. How dothe switch ports handle the DHCP messages?

A. Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages andrespond to DHCP requests.

B. Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messagesC. Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port

Fa3/1 can source DHCP requests only.D. All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP

requests.

Correct Answer: CSection: DHCP SnoopingExplanation

Explanation/Reference:

Page 18: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Trusted ports are allowed to send all types of DHCP messages. Untrusted ports can send only DHCP requests.If a DHCP response is seen on an untrusted port, the port is shut down. In this case, Fa2/1 & Fa2/2 are trusted(can send all types of DHCP messages) while Fa3/1 is untrusted (can only send DHCP requests).

QUESTION 27Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish aDHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type ofattack?

A. All switch ports in the Building Access block should be configured as DHCP untrusted ports.B. All switch ports in the Building Access block should be configured as DHCP trusted ports.C. All switch ports connecting to servers in the Server Farm block should be configured as DHCP untrusted

ports.D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP trusted

ports.E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.F. All switch ports connecting to hosts in the Building Access block should be configured as DHCP untrusted

ports.

Correct Answer: FSection: DHCP SnoopingExplanation

Explanation/Reference:All switch ports connecting to hosts should only send DHCP Requests and they are the ports that can be easilyaccessed by an attacker -> They should be configured as DHCP untrusted ports.

QUESTION 28Refer to the exhibit. Which statement is true?

Page 19: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. IP traffic matching access list ABC is forwarded through VLANs 5-10.B. IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.C. All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list ABC is

dropped.D. All VLAN traffic in VLANs 5-10 that match access list ABC will be forwarded, and all else will be dropped.

Correct Answer: DSection: VLAN Access MapExplanation

Explanation/Reference:Each VACL has an implicit “deny all” statement at the end, just like a regular ACL. From the exhibit we learn theVACL “pass” is applied from VLAN 5 to 10 with “action forward” -> All VLAN traffic in VLANs 5-10 that matchABC access list will be forwarded, other traffic in VLAN 5 to 10 will be dropped.

QUESTION 29

Refer to the exhibit. The “show port-security interface fa0/1” command was issued on switch SW1. Given theoutput that was generated, which two security statements are true? (Choose two)

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.

Page 20: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.D. When the number of secure IP addresses reaches 10, the interface will immediately shut down.E. When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an

SNMP trap notification will be sent.

Correct Answer: BESection: Port SecurityExplanation

Explanation/Reference:The “Violation Mode: Protect” tells us this interface has been configured with the switchport port-security protectcommand. Protect mode drops packets with unknown source addresses when the violation occurs -> B iscorrect.

Well, I cannot say answer E is correct. There is something wrong here. In “Protect” mode, when the number ofsecure MAC addresses reaches 10, the interface will not be shut down (it just drops unknown source MAC);also an SNMP trap notification will not be sent (an SNMP would be sent in “Shutdown” or “Restrict” mode). Soin the exam you I am sure you will see another version of answer E.

QUESTION 30Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1?

A. The first address learned on the port will be removed from the secure address list and be replaced with thenew address.

B. All secure addresses will age out and be removed from the secure address list. This will cause the securityviolation counter to increment.

C. The packets with the new source addresses will be dropped until a sufficient number of secure MACaddresses are removed from the secure address list.

D. The interface will be placed into the error-disabled state immediately, and an SNMP trap notification will besent.

Correct Answer: DSection: Port SecurityExplanation

Explanation/Reference:There are three violation mode of port security:

Page 21: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

+ Protect: drop packets (port is not shutdown) + Restrict: drop packets and increase violation counter, send SNMP trap notification (port is not shutdown)+ Shutdown (default mode): put port into error-distabled state (same as shutdown state), send SNMP trapnotification

QUESTION 31When you enable port security on an interface that is also configured with a voice VLAN, what is the maximumnumber of secure MAC addresses that should be set on the port?

A. No more than one secure MAC address should be set.B. The default will be set.C. The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D. No value is needed if the switchport priority extend command is configured.E. No more than two secure MAC addresses should be set.

Correct Answer: ESection: Port SecurityExplanation

Explanation/Reference:Usually, an IP Phone needs two MAC addresses, one for the voice vlan and one for the access vlan. If youdon’t want other devices to access this port then you should not set more than two secure MAC addresses.

Below is an example for this configuration:

(For more information about this, please read http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/31sg/configuration/guide/port_sec .html )

QUESTION 32Private VLANs can be configured as which three of these port types? (Choose three)

A. isolatedB. protectedC. privateD. associatedE. promiscuousF. community

Correct Answer: AEFSection: Private VLANExplanation

Page 22: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:There are three types of ports can be configured in a Private VLAN: isolated, promiscuous, community.

* Isolated: only communicate with promiscuous ports. Notice that it cannot even communicate with anotherisolated port. Also, there can be only 1 isolated VLAN per PVLAN.* Promiscuous : can communicate with all other ports. The default gateway is usually connected to this port sothat all devices in PVLAN can go outside.* Community: can communicate with other members of that community and promiscuous ports but cannotcommunicate with other communities. There can be multiple community VLANs per PVLAN.

QUESTION 33Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switchCAT1. What will be the result?

A. The command will be rejected by the switch.B. Interfaces FastEthernet0/13 and FastEthemet0/14 will no longer be bundled.C. Dynamic Trunking Protocol will be turned off on interfaces FastEthernet0/13 and FastEthemet0/14.D. Interfaces FastEthernet0/13 and FastEthernet0/14 will only allow traffic from the native VLAN.E. Interfaces FastEthernet0/13 and FastEthernet0/14 will continue to pass traffic for VLANs 88,100,360.

Correct Answer: BSection: EtherChannelExplanation

Explanation/Reference:The default channel protocol in Cisco switches is Port Aggregation Protocol (PAgP). PAgP groups the

Page 23: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

interfaces with the same speed, duplex mode, native VLAN, VLAN range, and trunking status and type. Aftergrouping the links into an EtherChannel, PAgP adds the group to the spanning tree as a single switch port.

An interface in the on mode that is added to a port channel is forced to have the same characteristics as thealready existing on mode interfaces in the channel (applied for both PAgP & LACP). So if we configure“switchport mode access” on Fa0/13, this interface will no longer be bundled with Fa0/14.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_14_ea1/configuration/guide/swethchl.html#wpxref12539)

QUESTION 34Which three statements are true of the Link Aggregation Control Protocol (LACP)? (Choose three)

A. LACP is used to connect to non-Cisco devices.B. LACP packets are sent with the command channel-group 1 mode desirable.C. LACP packets are sent with the command channel-group 1 mode active.D. Standby interfaces should be configured with a higher priority.E. Standby interfaces should be configured with a lower priority.

Correct Answer: ACDSection: EtherChannelExplanation

Explanation/Reference:LACP is part of the IEEE specification 802.3ad so that it can be used on non-Cisco devices -> A is correct.

With mode “active”, the switch will send LACP packets, initiates negotiations with remote ports and willing toform a port-channel if it receives a response -> C is correct.

LACP uses the port priority with the port number to form the port identifier. The port priority determines whichports should be put in standby mode when there is a hardware limitation that prevents all compatible ports fromaggregating.

An example of configuring LACP port priority:

Note: Valid range is from 1 to 65535. The higher the number, the lower the priority so standby interfaces shouldbe configured with a higher priority -> D is correct.

QUESTION 35Based on the network diagram and routing table output in the exhibit, which one of these statements is true?

Page 24: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. InterVLAN routing has been configured properly, and the workstations have connectivity to each other.B. InterVLAN routing will not occur since no routing protocol has been configured.C. Although interVLAN routing is not enabled, both workstations will have connectivity to each other.D. Although interVLAN routing is enabled, the workstations will not have connectivity to each other.E. None of the above.

Correct Answer: ASection: InterVLAN RoutingExplanation

Explanation/Reference:In the output we can see both VLAN10 and VLAN20 are shown up (as networks 10.1.1.0 and 10.2.2.0) so therouting has been configured properly. Notice that the “C” letter indicates that these networks are directlyconnected with the router.

QUESTION 36If you are a network technician, study the exhibit carefully. Which switch interface configuration commandwould automatically configure quality of service (QoS) for voice over IP (VoIP) within a QoS domain?

A. auto qos voip cisco-phoneB. mls qos trust

Page 25: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. switchport priority extend cos 7D. switchport priority extend trust

Correct Answer: ASection: Voice SupportExplanation

Explanation/Reference:The command “mls qos trust” is used to configure the port trust state (by default, the port is not trusted).

The command “switchport priority extend cos 7″ sets the IP phone port to override the priority received from thePC or the attached device (7 is the highest priority).

The command “switchport priority extend trust” tells the Cisco IP Phone to trust the CoS value of the connectedPC without remark all packets sent form PC to CoS 0, by default.

QUESTION 37Study the exhibit carefully. Which statement is true about the voice traffic coming to the switch access port thatis connected to the IP phone?

A. The voice VLAN must be configured as a native VLAN on the switch.B. A PC connected to a switch port via an IP phone must support a trunking encapsulation.C. The traffic on the voice VLAN must be tagged with 802.1p encapsulation in order to coexist on the same

LAN segment with a PC.D. A PC connected to a switch port via an IP phone is unaware of the presence of the phone.

Correct Answer: DSection: Voice SupportExplanation

Explanation/Reference:The voice VLAN can be configured over a unique voice VLAN (known as the voice VLAN ID or VVID) or overnative VLAN -> A is not correct.

The ports k between PC and IP Phone are always functioned as access-mode switch ports so there is no needto support a trunking encapsulation -> B is not correct.

The traffic on the voice VLAN can be tagged with 802.1p encapsulation or 802.1q encapsulation -> C is notcorrect.

Most Cisco IP Phone models operate as a three-port switch as shown below. Nowadays, the voice traffic anddata traffic will normally be on different IP subnets and the IP Phone is unaware of the presence of the phone.

Page 26: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 38Which protocol specified by RFC 2281 provides network redundancy for IP networks, ensuring that user trafficimmediately and transparently recovers from first-hop failures in network edge devices or access circuits?

A. ICMPB. IRDPC. HSRPD. STP

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:HSRP is a Cisco-proprietary protocol developed to allow several routers or multilayer switches to appear as asingle gateway IP address. This protocol is described in RFC 2281.

QUESTION 39Which of the following HSRP router states does an active router enter when it is preempted by a higher priorityrouter?

A. activeB. speakC. learnD. listenE. initF. standby

Correct Answer: BSection: HSRPExplanation

Explanation/Reference:First we should review all the HSRP States:

Page 27: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Now let’s take an example of a router passing through these states. Suppose there are 2 routers A and B in thenetwork; router A is turned on first. It enters the initial state. Then it moves to listen state in which it tries to hearif there are already active or standby routers for this group. After learning no one take the active or standbystate, it determines to take part in the election by moving to speak state. Now it starts sending hello messagescontaining its priority. These messages are sent to the multicast address 224.0.0.2 (which can be heard by allmembers in that group). When it does not hear a hello message with a higher priority it assumes the role ofactive router and moves to active state. In this state, it continues sending out periodic hello messages.

Now router B is turned on. It also goes through initial and listen state. In listen state, it learns that router A hasbeen already the active router and no other router is taking standby role so it enters speak state to compete forthe standby router -> it promotes itself as standby router.

Now to our main question! We want router B to become active router so we set a higher priority number thanthe priority of A and ask router B to take over the role of active router (with the preempt command). Now routerA will fall back to the speak state to compete for active or standby state -> it becomes standby router becauseits priority is now lower than that of router A. (Therefore answer B is correct).

Note: Suppose router A is in active state while router B is in standby state. If router B does not hear hellomessages from router A within the holdtime, router B goes into speak state to announce its priority to all HSRPmembers and compete for the active state. But if at some time it receives a message from the active router thathas a lower priority than its priority (because the administrator change the priority in either router), it can takeover the active role by sending out a hello packet with parameters indicating it wants to take over the activerouter. This is called a coup hello message.

(Reference and good resource: http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml)

QUESTION 40Which three statements are true of a default HSRP configuration? (Choose three)

A. The Standby hello time is 2 seconds.B. Two HSRP groups are configured.C. The Standby track interface priority decrement is 10.D. The Standby hold time is 10 secondsE. The Standby priority is 100.F. The Standby delay is 3 seconds.

Correct Answer: CDESection: HSRPExplanation

Explanation/Reference:

Page 28: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

The table below shows the default values of popular HSRP parameters:

Note:

* Standby delay: If router A is the HSRP active router and then loses a link, which causes it to becomestandby router, and then the link comes back, the delay command causes router A to wait before it becomesactive again. For example, with the “standby preempt delay minimum 30” command, it waits for 30 seconds forthe router to become active.

* Standby track: For example, consider this configuration:standby priority 150standby track serial 0

An HSRP priority of 150 is configured with the standby priority command and HSRP is configured to track thestate of interface Serial0. Because no decrement value is specified in the standby track command, the HSRPpriority is decremented by the default value of 10 when the tracked interface goes down.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_12c_ea1/configuration/guide/swhsrp.html)

QUESTION 41

HSRP was implemented and configured on two switches while scheduled network maintenance wasperformed.After the two switches have finished rebooting, you notice via show commands that Switch2 is the HSRP activerouter. Which two items are most likely the cause of Switch1 not becoming the active router? (Choose two)

Page 29: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. booting delaysB. standby group number does not match VLAN numberC. IP addressing is incorrectD. premption is disabledE. incorrect standby timersF. IP redirect is disabled

Correct Answer: ADSection: HSRPExplanation

Explanation/Reference:When two routers are turned on at the same time, the router completes booting process first will take the activerole. Without the “preempt” configured, even a new router with a higher priority cannot take over the activerole.In the configuration of Switch1 we don’t see the “preempt” command configured.

QUESTION 42

Refer to the exhibit. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. Whatis the most likely cause of this status?

A. this is normal operationB. standby group number does not match VLAN number C. IP addressing is incorrect D. incorrect priority commands

Page 30: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

E. incorrect standby timers

Correct Answer: ASection: HSRPExplanation

Explanation/Reference:Only Switch 1 is not configured with the priority so it will have the default priority of 100, which is smaller thanthat of Switch2 (110) and Switch3 (150). Moreover, both Switch2 and Switch3 have the “preempt” command sosurely Switch3 becomes active router while Switch2 becomes standby router -> Switch1 will be in listen state(Please read the explanation of question 2 to understand more about this state).

QUESTION 43What are three possible router states of HSRP routers on a LAN? (Choose three)

A. StandbyB. EstablishedC. ActiveD. IdleE. BackupF. Init

Correct Answer: ACFSection: HSRPExplanation

Explanation/Reference:

QUESTION 44Refer to the exhibit. Which configuration on the HSRP neighboring device ensures that it becomes the activeHSRP device in the event that port fa1/1 on Switch_A goes down?

A. Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 200Switch_B(config-if)#standby 1 preempt Switch_B(config-if)#standby 1 ip 10.10.10.10 Switch_B(config-if)#standby 1 track interface fa 1/1

B. Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 200Switch_B(config-if)#standby 1 ip 10.10.10.10

C. Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 195Switch_B(config-if)#standby 1 preempt Switch_B(config-if)#standby 1 ip 10.10.10.10

D. Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 190

Page 31: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Switch_B(config-if)#standby 1 ip 10.10.10.10 Switch_B(config-if)#standby 1 track interface fa 1/1

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:Switch_A is not configured standby track priority value so it will use the default track priority of 10 -> WhenSwitch_A goes down, its priority is 200 – 10 = 190 so Switch_B must be configured with a priority higher than190. Also Switch_B must have the “preempt” command configured to take over the active state -> C is correct.

Note: Answer A is not correct because Switch_B has the same priority value of Switch_A, but the Switch_B’s ipaddress on the HSRP interface is higher (10.10.10.2 is higher than 10.10.10.1) so Switch_B will take over theactive state of Switch_A even when Switch_A is still operational.

QUESTION 45Which router redundancy protocol cannot be configured for interface tracking?

A. GLBPB. HSRPC. RPRD. VRRPE. SLBF. RPR+

Correct Answer: DSection: VRRPExplanation

Explanation/Reference:VRRP cannot directly track an interface status but interfaces can be tracked through a tracked object. Noticethat HSRP and GLBP can track both object and interface status.

QUESTION 46Which describes the default load balancing scheme used by the Gateway Load Balancing Protocol (GLBP)?

A. Per host using a strict priority schemeB. Per session using a round-robin schemeC. Per session using a strict priority schemeD. Per GLBP group using a strict priority schemeE. Per host basis using a round robin-schemeF. Per GLBP group using a round-robin scheme

Correct Answer: ESection: GLBPExplanation

Explanation/Reference:In GLBP, there are 3 operational modes for load balancing:

+ Weighted load-balancing: traffic is balanced proportional to a configured weight

Page 32: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

+ Host-dependent load-balancing: a host is used the same virtual MAC address as long as that MAC isparticipating in the GLBP group.+ Round-robin load-balancing: each virtual MAC is used to respond to each ARP Request alternately. This isalso the default load balancing scheme used by GLBP.

QUESTION 47Refer to the exhibit. GLBP has been configured on the network. When the interface serial0/0/1 on router R1goes down, how is the traffic coming from Host1 handled?

A. The traffic coming from Host2 is forwarded through router R2 with no disruption. The traffic from Host1 isdropped due to the disruption of the load balancing feature configured for the glbp group.

B. The traffic coming from both hosts is temporarily interrupted while the switchover to make R2 active occurs.C. The traffic coming from Host2 is forwarded through router R2 with no disruption. Host1 sends an ARP

request to resolve the MAC address for the new virtual gateway.D. The traffic coming from Host1 and Host2 is forwarded through router R2 with no disruption.

Page 33: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: DSection: GLBPExplanation

Explanation/Reference:

QUESTION 48Refer to the exhibit. What statement is true based upon the configuration of router R1 and router R2?

A. Router R2 will become the master for Virtual Router 1, and router R1 will become the backup for VirtualRouter 2.

B. Router R1 will become the master for Virtual Router 1, and router R2 will become the backup for VirtualRouter 2.

C. Router R1 will become the active virtual gateway.D. Router R2 will become the active virtual gateway.E. The hello and hold timers are incompatible with OSPF type 5 LSAs.F. The hello and hold timers are incompatible with multi-homed BGP.

Correct Answer: CSection: GLBPExplanation

Page 34: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:

QUESTION 49Which three protocols have been developed for IP routing redundancy to protect against first-hop router failure?(Choose three)

A. GLBPB. ICMPC. MSTPD. HSRPE. VRRPF. NHRP

Correct Answer: ADESection: Gateway RedundancyExplanation

Explanation/Reference:All three protocols above are used for IP routing redundancy to protect against first-hop router failure. Somemain differences of them are listed below:

HSRP: is a Cisco proprietary protocol.VRRP: Open standard, created by IETFGLBP : is a Cisco proprietary protocol. It is the only protocol (in three) supports load-balancing.

QUESTION 50You work as a network technician ,please study the exhibit carefully. When it attempts to register to a wirelessLAN controller (WLC), what type of message is transmitted by the lightweight access point (LAP)?

A. The LAP will send both Layer 2 and Layer 3 Lightweight Access Point Protocol (LWAPP) mode discoveryrequest messages at the same time.

B. The LAP will send Layer 2 Lightweight Access Point Protocol (LWAPP) mode discovery request messagesonly.

C. The LAP will send Layer 3 Lightweight Access Point Protocol (LWAPP) mode discovery request messagesonly.

Page 35: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

D. The LAP will send Layer 2 Lightweight Access Point Protocol (LWAPP) mode discovery request messages.If the attempt fails, the LAP will try Layer 3 LWAPP WLC discovery.

Correct Answer: DSection: WirelessExplanation

Explanation/Reference:

QUESTION 51Please study the exhibit carefully. Which one is true about the configuration of access point MAC addresses onthe wireless client?

A. If the wireless client is out of range of the specified access point or points it will not associate with otheraccess points.

B. Each access point MAC address that is specified must have a separate SSID configured on the GENERALconfiguration tab.

C. Each access point MAC address that is specified must have the same SSID configured on the GENERALconfiguration tab.

D. If the wireless client is out of range of the specified access point or points it can associate with other accesspoints.

Correct Answer: DSection: WirelessExplanation

Explanation/Reference:

Page 36: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Exam B

QUESTION 1Two switches SA and SB are connected as shown below. Given the below partial configuration, which twostatements are true about VLAN traffic? (Choose two)

A. VLANs 1-5 will be blocked if fa0/10 goes down.B. VLANs 6-10 have a port priority of 128 on fa0/10.C. VLANs 6-10 will use fa0/10 as a backup only.D. VLANs 1-10 are configured to load share between fa0/10 and fa0/12.

Correct Answer: CDSection: VLAN VTP STPExplanation

Explanation/Reference:

Let’s assume that SA is the root bridge for all VLANs, it will make the explanation a bit clearer…

First we should understand what will happen if nothing is configured (use default values). Because we assumedthat SA is the root bridge so all of its ports will forward. SB will need to block one of its ports to avoid a bridgingloop between the two switches. But how does SB select its blocked port? Well, the answer is based on theBPDUs it receives from SA. A BPDU is superior than another if it has:

1. A lower Root Bridge ID2. A lower path cost to the Root3. A lower Sending Bridge ID4. A lower Sending Port ID

These four parameters are examined in order. In this specific case, all the BPDUs sent by SA have the sameRoot Bridge ID, the same path cost to the Root and the same Sending Bridge ID. The only parameter left to

Page 37: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

select the best one is the Sending Port ID (Port ID = port priority + port index). If using default values, thedefault port priority’s value is 32 or 128 (128 is much more popular today but 32 is also a default port priority’svalue), so SB will compare port index values, which are unique to each port on the switch, and because Fa0/12is inferior to Fa0/10, SB will select the port connected with Fa0/10 (of SA) as its root port and block the otherport.

To change the default decision of selecting root port, we can change the port priority of each interface. Theabove picture is true for VLAN 1-5 because port Fa0/10 has a lower port-priority so the peer port will be chosenas the root port. For VLAN 6-10, port Fa0/12 has higher priority ID (lower port priority value) so SB will block itsupper port.

For answer A – “VLANs 1-5 will be blocked if fa0/10 goes down” – is not correct because if Fa0/10 goes down,SB will unblock its lower port therefore VLANs 1-5 will still operate.

For answer B – “VLANs 6-10 have a port priority of 128 on fa0/10″ – is not always correct because VLAN 6-10can have a different port priority (of 32) according to the Cisco’s link below.

Answer C is correct because VLAN 6-10 uses Fa0/12 link as it main path. Fa0/10 is the backup path and is onlyopened when port Fa0/12 fails.

Answer D is correct because this configuration provide load-balance traffic based on VLAN basis. VLANs 1-5use Fa0/10 and VLANs 6-10 use Fa0/12 as their main paths.

Note: We can not assure the answer B is always correct so we should choose C and D if the question asks usto give only 2 choices).

Reference (and good resource, too):

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a00800ae96a.shtml

QUESTION 2You are assigning VLANs to the ports of switch R1. What VLAN number value is an assigned to the defaultVLAN?

A. VLAN 1003B. VLAN 1C. VLAN OND. VLAN AE. VLAN 0

Correct Answer: BSection: VLANExplanation

Explanation/Reference:

QUESTION 3

Page 38: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

What is a characteristic of a static VLAN membership assignment?

A. VMPS server lookup is requiredB. Easy to configureC. Ease of adds, moves, and changesD. Based on MAC address of the connected device

Correct Answer: BSection: VLANExplanation

Explanation/Reference:There are two types of VLAN membership assignment:

* Static VLAN: switch ports are assigned to specific VLANs manually

* Dynamic VLAN: switch automatically assigns the port to a VLAN using information from the user device likeMAC address, IP address etc. When a device is connected to a switch port, the switch must, in effect, query adatabase to establish VLAN membership.

Static VLAN assignment provides a simple way to assign VLAN to a port while Dynamic VLANs allow a greatdeal of flexibility and mobility for end users but require more administrative overhead.

QUESTION 4What is a characteristic of multi-VLAN access ports?

A. The port has to support STP PortFast.B. The auxiliary VLAN is for data service and is identified by the PVID.C. The port hardware is set as an 802.1Q trunk. D. Both the voice service and data service use the same trust boundary.

Correct Answer: CSection: VLANExplanation

Explanation/Reference:The multi-VLAN port feature on the Catalyst 2900 XL/3500 XL switches allows for configuring a single port intwo or more VLANs. This feature allows users from different VLANs to access a server or router withoutimplementing InterVLAN routing capability. A multi-VLAN port performs normal switching functions in all itsassigned VLANs. VLAN traffic on the multi-VLAN port is not encapsulated as it is in trunking -> The port is setas an 802.1Q trunk -> C is correct.

Note: The limitations of implementing multi-VLAN port features are listed below.

1) You cannot configure a multi-VLAN port when a trunk is configured on the switch. You must connect themulti-VLAN port only to a router or server. The switch automatically transitions to VTP transparent mode whenthe multi-VLAN port feature is enabled, making the VTP disabled.

2) The multi-VLAN port feature is supported only on the Catalyst 2900 XL/3500 XL series switches. This featureis not supported on the Catalyst 4000/5000/6000 series or any other Cisco Catalyst switches.

The following example shows how to configure a port for multi-VLAN mode:Switch(config-if)# switchport mode multi

The following example shows how to assign a multi-VLAN port already in multi mode to a range of VLANs:

Page 39: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Switch(config-if)# switchport multi vlan 5-10

QUESTION 5The Company LAN switches are being configured to support the use of Dynamic VLANs. Which of the followingare true of dynamic VLAN membership? (Choose two)

A. VLAN membership of a user always remains the same even when he/she is moved to another location. B. VLAN membership of a user always changes when he/she is moved to another location.C. Membership can be static or dynamic.D. Membership can be static only.

Correct Answer: ACSection: VLANExplanation

Explanation/Reference:There are two types of VLAN membership assignment:

* Static VLAN: switch ports are assigned to specific VLANs manually

* Dynamic VLAN: switch automatically assigns the port to a VLAN using information from the user device likeMAC address, IP address etc. When a device is connected to a switch port, the switch must, in effect, query adatabase to establish VLAN membership.

Static VLAN assignment provides a simple way to assign VLAN to a port while Dynamic VLANs allow a greatdeal of flexibility and mobility for end users but require more administrative overhead.

QUESTION 6Which of the following technologies would an Internet Service Provider use to support overlapping customerVLAN ID’s over transparent LAN services?

A. 802.1q tunnelingB. ATMC. SDHD. IP Over Optical NetworkingE. ISL

Correct Answer: ASection: VLANExplanation

Explanation/Reference:Using the IEEE 802.1Q tunneling (QinQ) feature, service providers can use a single VLAN to supportcustomers who have multiple VLANs. The trick here is instead of removing the VLAN tag received fromcustomers, the ISP’s edge switch puts that traffic into the VLAN assigned to that port and adds another VLANtag outside that tag. Let’s see an example:

Page 40: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

When Switch A (of the Service Provider) receives customer traffic from an 802.1Q trunk port, it does not stripthe received 802.1Q tag from the frame header; instead, the tunnel port leaves the 802.1Q tag intact, adds a 1-byte Ethertype field (0×8100) and a 1-byte length field and puts the received customer traffic into the VLAN towhich the tunnel port is assigned. This Ethertype 0×8100 traffic, with the received 802.1Q tag intact, is calledtunnel traffic. Notice that “VLAN X” here can be one or multiple VLANs, all will be tagged with VLAN 4 (supposeVLAN 4 is assigned to Company A).

A benefit of 802.1qQ tunneling is multiple companies can use the overlapped VLANs. For example, Company Acan use VLANs 1 to 100 while Company B can use VLANs 50 to 100 (overlapped from VLANs 50 to 100). TheISP’s switches can still classify them because they are attached to different outer VLAN tags. In the exampleabove Company A is assigned to VLAN 4 so we can assign Company B to VLAN 5, Company C to VLAN 6 andso on.

The link between the 802.1Q trunk port on a customer device and the tunnel port is called an asymmetrical linkbecause one end is configured as an 802.1Q trunk port and the other end is configured as a tunnel port.

Note: By default, the native VLAN traffic of a dot1q trunk is sent untagged, which cannot be double-tagged inthe service provider network. Because of this situation, the native VLAN traffic might not be tunneled correctly.Be sure that the native VLAN traffic is always sent tagged in an asymmetrical link. To tag the native VLANegress traffic and drop all untagged ingress traffic, enter the global vlan dot1q tag native command.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/dot1qtnl.html)

QUESTION 7Static VLANs are being used on the Company network. What is true about static VLANs?

A. Devices use DHCP to request their VLAN.B. Attached devices are unaware of any VLANs.C. Devices are assigned to VLANs based on their MAC addresses,D. Devices are in the same VLAN regardless of which port they attach to.

Correct Answer: BSection: VLANExplanation

Page 41: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:The VLAN tags are only added/removed at the switches. Attached devices are unaware of the existence ofVLAN in the network.

QUESTION 8Which statement is correct about 802.1Q trunking?

A. Both switches must be in the same VTP domain.B. The encapsulation type of both ends of the trunk does not have to match.C. The native VLAN on both ends of the trunk must be VLAN 1.D. 802.1Q trunking can only be configured on a Layer 2 port.E. In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

Correct Answer: ESection: VLAN TrunkingExplanation

Explanation/Reference:By default frames from the native VLAN are not tagged. To force a switch to tag the native VLAN on all its802.1Q trunks, we can use the following command:

QUESTION 9Which switch command enables a trunking protocol that appends a four byte CRC to the packet?

A. CompanySwitch(config-if)#switchport trunk encapsulation dot1qB. CompanySwitch(config-if)#switchport trunk encapsulation itefC. CompanySwitch(config-if)#switchport trunk encapsulation fddiD. CompanySwitch(config-if)#switchport trunk encapsulation isl

Correct Answer: DSection: VLAN TrunkingExplanation

Explanation/Reference:The ISL frame consists of three primary fields: the encapsulation frame (original frame), which is encapsulatedby the ISL header, and the FCS at the end:

In ISL, the original frame is encapsulated and an additional header is added before the frame is carried over atrunk link. Also, a FCS is generated based on some fields in the ISL Header and the Encapsulation Frame andadded to the end of the frame. At the receiving end, the header and FCS are removed and the frame isforwarded to the assigned VLAN. The FCS field consists of 4 bytes and contains a 32-bit CRC value.

Note: The addition of the new FCS does not alter the original FCS that is contained within the encapsulatedframe.

QUESTION 10While using a packet analyzer, you notice four additional bytes being added to the packets in the Company

Page 42: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

network. Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?

A. DTPB. VTPC. 802.1QD. ISL

Correct Answer: CSection: VLAN TrunkingExplanation

Explanation/Reference:802.1Q is the IEEE standard for tagging frames on a trunk and supports up to 4096 VLANs. In 802.1Q, thetrunking device inserts a 4-byte tag into the original frame and recomputes the frame check sequence (FCS)before the device sends the frame over the trunk link. At the receiving end, the tag is removed and the frame isforwarded to the assigned VLAN. 802.1Q does not tag frames on the native VLAN.

Note: IEEE 802.1Q uses an internal tagging mechanism which inserts a 4-byte tag field in the original Ethernetframe itself.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094665.shtml)

Note: From the Question 2 and Question 3 we can see a big difference in the way of using the FCS field in802.1Q and ISL. 802.1Q modifies and FCS field inside the original E thernet frame while ISL leaves theoriginal FCS field inside the Ethernet frame unchan ged , it just adds another FCS field outside the originalEthernet frame.

Therefore please pay attention to which question is asked. Question 2 asks “appends a four byte CRC to thepacket” which means ISL while Question 3 says “inserts a four byte tag into the Ethernet frame” which means802.1Q.

QUESTION 11Which statement is correct about 802.1Q trunking?

A. Both switches must be in the same VTP domain.B. The encapsulation type of both ends of the trunk does not have to match.C. The native VLAN on both ends of the trunk must be VLAN 1.D. 802.1Q trunking can only be configured on a Layer 2 port.E. In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

Correct Answer: ESection: VLAN TrunkingExplanation

Explanation/Reference:

QUESTION 12Which command alone will disable trunking on a Layer 2 switch port?

A. no switchport trunk native vlan vlan-idB. switchport nonegotiate

Page 43: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. no switchport mode dynamic desirableD. switchport mode access

Correct Answer: DSection: VLAN TrunkingExplanation

Explanation/Reference:The “switchport mode access” command forces a switch port to always behave as an access port (with nocapability of establishing trunks).

Note: When using the switchport nonegotiate command, Dynamic Inter-Switch Link Protocol and DynamicTrunking Protocol (DISL/DTP)-negotiation packets are not sent on the interface. The device trunks or does nottrunk according to the mode parameter given: access or trunk .

QUESTION 13Company uses MSTP within their switched LAN. What is the main purpose of Multiple Instance Spanning TreeProtocol (MSTP)?

A. To enhance Spanning Tree troubleshooting on multilayer switchesB. To reduce the total number of spanning tree instances necessary for a particular topologyC. To provide faster convergence when topology changes occur in a switched networkD. To provide protection for STP when a link is unidirectional and BPDUs are being sent but not received

Correct Answer: BSection: STPExplanation

Explanation/Reference:Instead of running an STP instance for every VLAN, MSTP runs a number of VLAN-independent STPinstances. By allowing a single instance of STP to run for multiple VLANs, MSTP keeps the number of STPinstances to minimum (saving switch resources) while optimizing Layer 2 switching environment (loadbalancing traffic to different paths for different VLANs.).

QUESTION 14Which of the following specifications will allow you to associate VLAN groups to STP instances so you canprovide multiple forwarding paths for data traffic and enable load balancing?

A. IEEE 802.1d (STP)B. IEEE 802.1s (MST)C. IEEE 802.1q (CST)D. IEEE 802.1w (RSTP)

Correct Answer: BSection: STPExplanation

Explanation/Reference:

QUESTION 15Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout thenetwork, Front Line users have been complaining that they experience slower network performance when

Page 44: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

accessing the Server Farm than the Reception office experiences. Based on the exhibit, which two statementsare true? (Choose two)

A. Changing the bridge priority of S1 to 4096 would improve network performance.B. Changing the bridge priority of S1 to 36864 would improve network performance.C. Changing the bridge priority of S2 to 36864 would improve network performance. D. Changing the bridge priority of S3 to 4096 would improve network performance.E. Disabling the Spanning Tree Protocol would improve network performance.F. Upgrading the link between S2 and S3 to Gigabit Ethernet would improve performance.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:All three switches have the same bridge priority (32768 – default value) and S1 has the lowest MAC -> S1 is theroot bridge and all traffic must go through it -> Front Line Users (S2) must go through S1 to reach Server Farm(S3). To overcome this problem, S2 or S3 should become the root switch and we can do it by changing thebridge priority of S1 to a higher value (which lower its priority – answer B) or lower the bridge priority value(which higher its priority – answer D)

QUESTION 16Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached betweenSwitchA and HubA. Which two statements are true about the possible result of attaching the second link?(Choose two)

Page 45: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The switch port attached to LinkB will not transistion to up.B. One of the two switch ports attached to the hub will go into blocking mode when a BPDU is received.C. Both switch ports attached to the hub will transition to the blocking state.D. A heavy traffic load could cause BPDU transmissions to be blocked and leave a switching loop.E. The switch port attached to LinkA will immediately transition to the blocking state.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:we know that there will have only one Designated port for each segment (notice that the two ports of SwitchAare on the same segment as they are connected to a hub). The other port will be in Blocking state. But howdoes SwitchA select its Designated and Blocking port? The decision process involves the following parametersinside the BPDU:

* Lowest path cost to the Root* Lowest Sender Bridge ID (BID)* Lowest Port ID

In this case, both interfaces of SwitchA have the same “path cost to the root” and “sender bridge ID” so the thirdparameter “lowest port ID” will be used. Suppose two interfaces of SwitchA are fa0/1 & fa0/2 then SwitchA willselect fa0/1 as its Designated port (because fa0/1 is inferior to fa0/2) -> B is correct.

Suppose the port on LinkA (named portA) is in forwarding state and the port on LinkB (named portB) is inblocking state. In blocking state, port B still listens to the BPDUs. If the traffic passing through LinkA is tooheavy and the BPDUs can not reach portB, portB will move to listening state (after 20 seconds for STP) thenlearning state (after 15 seconds) and forwarding state (after 15 seconds). At this time, both portA & portB are inforwarding state so a switching loop will occur -> D is correct.

QUESTION 17Refer to the exhibit. Switch S1 is running mst IEEE 802.1s. Switch S2 contains the default configuration runningIEEE 802.1D. Switch S3 has had the command spanning-tree mode rapid-pvst running IEEE 802.1w. What willbe the result?

A. IEEE 802.1D and IEEE 802.1w are incompatible. All three switches must use the same standard or notraffic will pass between any of the switches.

Page 46: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. Switches S1, S2, and S3 will be able to pass traffic between themselves.C. Switches S1, S2, and S3 will be able to pass traffic between themselves. However, if there is a topology

change, Switch S2 will not receive notification of the change.D. Switches S1 and S3 will be able to exchange traffic but neither will be able to exchange traffic with Switch

S2

Correct Answer: BSection: STPExplanation

Explanation/Reference:A switch running both MSTP and RSTP supports a built-in protocol migration mechanism that enables it tointeroperate with legacy 802.1D switches. If this switch receives a legacy 802.1D configuration BPDU (a BPDUwith the protocol version set to 0), it sends only 802.1D BPDUs on that port. An MST switch can also detect thata port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (version 3) associatedwith a different region, or an RST BPDU (version 2).However, the switch does not automatically revert to the MSTP mode if it no longer receives 802.1D BPDUsbecause it cannot determine whether the legacy switch has been removed from the link unless the legacyswitch is the designated switch

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_9_ea1/configuration/guide/swmstp.html)

QUESTION 18Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had thecommand spanning-tree mode rapid-pvst issued on them. What will be the result?

A. IEEE 802.1D and IEEE 802.1w are incompatible. All three switches must use the same standard or notraffic will pass between any of the switches.

B. Switches S1, S2. and S3 will be able to pass traffic between themselves.C. Switches S1, S2. and S3 will be able to pass traffic between themselves. However, if there is a topology

change. Switch S2 will not receive notification of the change.D. Switches S1 and S3 will be able to exchange traffic but neither will be able to exchange traffic with Switch

S2.

Correct Answer: BSection: STPExplanation

Page 47: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:

QUESTION 19Which two statements are true when the extended system ID feature is enabled? (Choose two)

A. The BID is made up of the bridge priority value (2 bytes) and bridge MAC address (6 bytes).B. The BID is made up of the bridge priority (4 bits), the system ID (12 bits), and a bridge MAC address (48

bits).C. The BID is made up of the system ID (6 bytes) and bridge priority value (2 bytes).D. The system ID value is the VLAN ID (VID).E. The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the

switch or module.F. The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree

algorithm.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:In short, with the use of IEEE 802.1t spanning-tree extensions, some of the bits previously used for the switchpriority are now used for the extended system ID

Only four high-order bits of the 16-bit Bridge Priority field carry actual priority. Therefore, priority can beincremented only in steps of 4096. In most cases, the Extended System ID holds the VLAN ID. For example, ifour VLAN ID is 5 and we use the default bridge priority 32768 then the 16-bit Priority will be 32768 + 5 = 32773.

Note: The MAC address is reserved when the extended system ID feature is enabled.

QUESTION 20Which set of statements about Spanning Tree Protocol default timers is true?

A. The hello time is 2 seconds.The forward delay is 10 seconds.The max_age timer is 15 seconds.

B. The hello time is 2 seconds.The forward delay is 15 seconds.

Page 48: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

The max_age timer is 20 seconds.C. The hello time is 2 seconds.

The forward delay is 20 seconds.The max_age timer is 30 seconds.

D. The hello time is 5 seconds.The forward delay is 10 seconds.The max_age timer is 15 seconds.

E. The hello time is 5 seconds.The forward delay is 15 seconds.The max_age timer is 20 seconds.

Correct Answer: BSection: STPExplanation

Explanation/Reference:There are several STP timers, as this list shows:

* Hello - The hello time is the time between each bridge protocol data unit (BPDU) that is sent on a port. Thistime is equal to 2 seconds (sec) by default, but you can tune the time to be between 1 and 10 sec.* Forward delay – The forward delay is the time that is spent in the listening and learning state. This time isequal to 15 sec by default, but you can tune the time to be between 4 and 30 sec.* Max age – The max age timer controls the maximum length of time that passes before a bridge port saves itsconfiguration BPDU information. This time is 20 sec by default, but you can tune the time to be between 6 and40 sec.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094954.shtml)

QUESTION 21Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STPconfiguration is correct, what will be true about Switch 15?

A. All ports will be in forwarding mode.B. All ports in VLAN 10 will be in forwarding mode.

Page 49: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in blocking mode.D. All ports in VLAN 10 will be in forwarding mode and all ports in VLAN 20 will be in standby mode.

Correct Answer: BSection: STPExplanation

Explanation/Reference:All ports on root bridge are designated ports, which are in forwarding state but notice in this case Switch 15 isthe root switch for VLAN 10 -> all ports in VLAN 10 will be in forwarding state. We can not say anything aboutthe modes of ports of Switch 15 in other VLANs.

QUESTION 22Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the defaultVLAN. To reduce the broadcast domain, the network administrator decides to split users on the network intoVLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switchSW_A. What will happen as a result of this change?

A. All ports of the root switch SW_A will remain in forwarding mode throughout the reconvergence of thespanning tree domain.

B. Switch SW_A will change its spanning tree priority to become root for VLAN 2 only.C. Switch SW_A will remain root for the default VLAN and will become root for VLAN 2.D. No other switch in the network will be able to become root as long as switch SW_A is up and running.

Correct Answer: CSection: STPExplanation

Explanation/Reference:This command sets the switch to become root for a given VLAN. It works by lowering the priority of the switchuntil it becomes root. Once the switch is root, it will not prevent any other switch from becoming root. Inparticular, if the current root bridge is greater than 24576 then our switch will drop to 24576. If the current rootbridge is less than 24576, our new bridge priority will be (Priority value of the current root bridge – 4096).

This command does not affect other VLAN so SW_A will remain root for the default VLAN -> C is correct.

Note: This command is not shown in a Catalyst switch configuration because the command is actually a macroexecuting other switch commands.

Page 50: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 23Switch R1 and R2 both belong to the Company VTP domain. What’s true about the switch operation in VTPdomains? (Choose two)

A. A switch can only reside in one management domainB. A switch is listening to VTP advertisements from their own domain onlyC. A switch is listening to VTP advertisements from multi domainsD. A switch can reside in one or more domainsE. VTP is no longer supported on Catalyst switches

Correct Answer: ABSection: VTPExplanation

Explanation/Reference:A VTP domain (also called a VLAN management domain) is made up of one or more network devices thatshare the same VTP domain name and that are interconnected with trunks. A network device can beconfigured to be in one and only one VTP domain -> A is correct.

If the switch receives a VTP advertisement over a trunk link, it inherits the management domain name and theVTP configuration revision number. The switch ignores advertisements with a different management domainname or an earlier configuration revision number -> B is correct.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/vtp.html)

Note: Just for your information, if a switch has not belonged to any VTP domain yet and it receives a VTPadvertisement with a VTP domain (whose password is not set), it will join that domain automatically.

QUESTION 24How does VTP pruning enhance network bandwidth?

A. by restricting unicast traffic to across VTP domainsB. by reducing unnecessary flooding of traffic to inactive VLANsC. by limiting the spreading of VLAN informationD. by disabling periodic VTP updates

Correct Answer: BSection: VTPExplanation

Explanation/Reference:VTP Pruning makes more efficient use of trunk bandwidth by forwarding broadcast and unknown unicastframes on a VLAN only if the switch on the receiving end of the trunk has ports in that VLAN.

The following example shows the operation of a VTP domain without and with VTP Pruning.

Without VTP Pruning:

Page 51: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

When PC A sends a broadcast frame on VLAN 10, it travels across all trunk links in the VTP domain. SwitchesServer, Sw2, and Sw3 all receive broadcast frames from PC A. But only Sw3 has user on VLAN 10 and it is awaste of bandwidth on Sw2. Moreover, that broadcast traffic also consumes processor time on Sw2. The linkbetween switches Server and Sw2 does not carry any VLAN 10 traffic so it can be “pruned”.

QUESTION 25VTP devices in a network track the VTP revision number. What is a VTP configuration revision number?

Page 52: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. A number for identifying changes to the network switch.B. A number for identifying changes to the network router.C. A number for identifying changes to the network topology.

Correct Answer: CSection: VTPExplanation

Explanation/Reference:

QUESTION 26VTP switches use advertisements to exchange information with each other. Which of the followingadvertisement types are associated with VTP? (Choose three)

A. Domain advertisementsB. Advertisement requests from clientsC. Subset advertisementsD. Summary advertisements

Correct Answer: ACDSection: VTPExplanation

Explanation/Reference:All VTP packets contain these fields in the header:

* VTP protocol version: 1, 2, or 3* VTP message types:1) Summary advertisements (inform adjacent Catalysts of the current VTP domain name and theconfiguration revision number)2) Subset advertisement (is sent following the summary advertisement and contains a list of VLANinformation)3) Advertisement requests (is needed in the case it is reset, the VTP domain name has been changed or ithas received a VTP summary advertisement with a higher configuration revision than it own).

(For more information about these VTP types, please read: http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094c52.shtml)

4) VTP join messages (similar to the Advertisement request messages but with a different Message Type fieldvalue and a few more parameters, including VTP domain name, and a VLAN bit string. If the bit is set, floodedtraffic for that VLAN should be received on that trunk. Each trunk port maintains a state variable per VLAN –Joined/Pruned. If the state is Joined, the trunk port is allowed to send broadcast and flooded unicast traffic onthis VLAN. If the state is Pruned, the trunk port will not send the broadcast or flooded unicast traffic on thisVLAN. VTP join messages are sent when the VTP Client first joins a VTP domain to inform the VTP Serversabout its existence in that VTP domain).* Management domain length* Management domain name

QUESTION 27What two steps can be taken to help prevent VLAN hopping? (Choose two)

A. Place unused ports in a common unrouted VLANB. Enable BPDU guard

Page 53: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. Implement port securityD. Prevent automatic trunk configuration E. Disable CDP on ports where it is not necessary

Correct Answer: ADSection: VLAN HoppingExplanation

Explanation/Reference:VLAN Hopping: By altering the VLAN ID on packets encapsulated for trunking, an attacking device can send orreceive packets on various VLANs, bypassing Layer 3 security measures. VLAN hopping can be accomplished by switch spoofingor double tagging.

1) Switch spoofing:

The attacker can connect an unauthorized Cisco switch to a Company switch port. The unauthorized switch cansend DTP frames and form a trunk with the Company Switch. If the attacker can establish a trunk link to theCompany switch, it receives traffic to all VLANs through the trunk because all VLANs are allowed on a trunk bydefault.

(Instead of using a Cisco Switch, the attacker can use a software to create and send DTP frames).

2) Double-Tagging:

In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the nativeVLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a host it wants to attack(VLAN 20).

When the packet from the attacker reaches Switch A, Switch A only sees the first VLAN 10 and it matches withits native VLAN 10 so this VLAN tag is removed. Switch A forwards the frame out all links with the same nativeVLAN 10. Switch B receives the frame with an tag of VLAN 20 so it removes this tag and forwards out to theVictim computer.

Note: This attack only works if the trunk (between two switches) has the same native VLAN as the attacker.

Please notice that if the port in which the attacker connects to is an access port then he can make an attacktoo. But maybe you will wonder “what a switch do if it receives tagged traffic from an access port?”. Here is theanswer quoted from Cisco site:

Page 54: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Traffic arriving on an access port is assumed to belong to the VLAN assigned to the port. If an access portreceives a tagged packet (Inter-Switch Link [ISL] or 802.1Q tagged) for the VLAN assigned to the port, thepacket is forwarded. If the port receives a tagged packet for another VLAN, the packet is dropped, the sourceaddress is not learned, and the frame is counted in the No destination statistic.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1/configuration/guide/swint.html#wp1107751)

So in this case, the attacker is on VLAN 10, which is also the native VLAN -> the packet is forwarded.

To mitigate VLAN Hopping, the following things should be done:

1) If no trunking is required, configure port as an access port, this also disables trunking on that interface:

Switch(config-if)# switchport mode access

2) If trunking is required, try to configure the port to Nonegotiate to prevent DTP frames from being sent.

Switch(config-if)# switchport mode trunkSwitch(config-if)# switchport nonegotiate

-> Therefore answer D – Prevent automatic trunk configuration is correct.

3) Set the native VLAN to an unused VLAN and don’t use this VLAN for any other purpose:

Switch(config-if)# switchport trunk native vlan VLAN-ID

4) Force the switch to tag the native VLAN on all its 802.1Q trunks:

Switch(config)# vlan dot1q tag native

In this question, answer A – Place unused ports in a common unrouted VLAN is also correct because theDouble-Tagging method requires the attacker’s port must be in the same VLAN with Native VLAN -> Placethese ports in unrouted VLAN will put these ports in different VLAN from the Native VLAN.

QUESTION 28What are three required steps to configure DHCP snooping on a switch? (Choose three)

A. Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCPrequest messages.

B. Configure DHCP snooping globally.C. Configure the switch as a DHCP server.D. Configure DHCP snooping on an interface.E. Configure all interfaces as DHCP snooping trusted interfaces.F. Configure DHCP snooping on a VLAN or range of VLANs.

Correct Answer: BDFSection: DHCP SnoopingExplanation

Explanation/Reference:To configure DHCP snooping feature, at least three steps must be done:

Page 55: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Other steps are just optional:

+ Configure DHCP Option 82Switch(config)# ip dhcp snooping information option

+ Configure the number of DHCP packets per second (pps) that are acceptable on the port:Switch(config-if)# ip dhcp snooping limit rate {rate}

Reference: SWITCH Student Guide

QUESTION 29Which three statements are true about the dynamic ARP inspection (DAI) feature? (Choose three)

A. DAI can be performed on ingress ports only.B. DAI can be performed on both ingress and egress ports.C. DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.D. DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP caches of

hosts in the domain.E. DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other

switches as trusted.F. DAI is supported on access and trunk ports only.

Correct Answer: ACESection: Dynamic ARP Inspection DAIExplanation

Explanation/Reference:DAI is an ingress security feature and does not perform any egress checking -> A is correct

DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports -> C is correct.

We should configure access switch ports as untrusted because in most cases an attacker will use these ports.By default, all interfaces are untrusted. We only need to configure all switch ports connected to other switchesas trusted -> E is correct.

(Reference: http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_2/security/configuration/guide/n1000v_security_13arpinspect.html

http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.2_25_see/configuration/guide/swdynarp.html)

QUESTION 30VLAN maps have been configured on switch R1. Which of the following actions are taken in a VLAN map thatdoes not contain a match clause?

Page 56: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Implicit deny feature at end of list.B. Implicit deny feature at start of list.C. Implicit forward feature at end of listD. Implicit forward feature at start of list.

Correct Answer: ASection: VLAN Access MapExplanation

Explanation/Reference:If a VLAN map does not contain a match clause then it matches all type of traffic. Maybe this question is notclear but we should understand as “Which of the following actions are taken in a VLAN map that does notmatch a match clause?”.

QUESTION 31Refer to the exhibit. Which interface or interfaces on switch SW_A can have the port security feature enabled?

A. Ports 0/1 and 0/2B. The trunk port 0/22 and the EtherChannel portsC. Ports 0/1, 0/2 and 0/3D. Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel portsE. Port 0/1F. Ports 0/1, 0/2, 0/3 and the trunk port 0/22

Correct Answer: CSection: Port SecurityExplanation

Explanation/Reference:Port security can only be configured on static access ports or static trunk ports (DTP disabled). In this case wedon’t know if the ports of the trunk link have DTP disabled or not -> only Fa0/1, Fa0/2 and Fa0/3 can beconfigured port security.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_6_ea2c/

Page 57: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

configuration/guide/swgports.html)

QUESTION 32When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if aviolation occurs?

A. protect (drop packets with unknown source addresses)B. restrict (increment SecurityViolation counter)C. shutdown (access or trunk port) D. transition (the access port to a trunking port)

Correct Answer: CSection: Port SecurityExplanation

Explanation/Reference:There are three port security violation modes:+ protect - Drops packets with unknown source addresses until you remove a sufficient number of secure MACaddresses to drop below the maximum value.+ restrict - Drops packets with unknown source addresses until you remove a sufficient number of secure MACaddresses to drop below the maximum value and causes the SecurityViolation counter to increment.+ shutdown - Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.

The default behavior for a security violation is to shut down that port permanently.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)

QUESTION 33Refer to the exhibit. What type of attack would be mitigated by this configuration?

Page 58: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. ARP spoofingB. MAC spoofingC. VLAN hoppingD. CDP manipulationE. MAC flood attackF. spanning tree compromises

Correct Answer: ESection: Port SecurityExplanation

Explanation/Reference:The maximum number of hosts allowed is 5 so an attacker can not flood the switch with many source MACaddresses -> This configuration is effective against MAC flooding attack.

QUESTION 34Refer to the exhibit. From the configuration shown, what can you determine about the private VLANconfiguration?

Page 59: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Only VLAN 503 will be the community PVLAN because multiple community PVLANs are not allowed.B. Users of VLANs 501 and 503 will be able to communicate.C. VLAN 502 is a secondary VLAND. VLAN 502 will be a standalone VLAN because it is not associated with any other VLANs.

Correct Answer: CSection: Private VLANExplanation

Explanation/Reference:There are two types of secondary VLAN: isolated and community. In this case VLAN 502 is a community VLAN-> C is correct.

In a PVLAN, multiple community VLANs are allowed. But notice a PVLAN can have only one primary VLAN andone isolated VLAN -> A is not correct.

Only community in the same VLAN can communicate with each other. Users in different communities are notable to communicate -> B is not correct.

The command “private-vlan association 501-503″ associates VLANs 501, 502 and 503 to the Primary VLAN 20-> D is not correct.

QUESTION 35What is the result of entering the command “port-channel load-balance src-dst-ip” on an EtherChannel link?

A. Packets are distributed across the ports in the channel based on both the source and destination MACaddresses.

B. Packets are distributed across the ports in the channel based on both the source and destination IPaddresses.

C. Packets are balanced across the ports in the channel based first on the source MAC address, then on thedestination MAC address, then on the IP address.

D. Packets are distributed across the access ports in the channel based first on the source IP address andthen the destination IP addresses.

Page 60: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BSection: EtherChannelExplanation

Explanation/Reference:The syntax of configuring load balancing on a Cisco switch is:

Many methods can be used here. By default, the “src-dst-ip” (source and destination IP address) method isused for Layer 3 switching. Let’s take an example to understand more about this method.

In the topology above, Switch1 uses the “src-dst-ip” method to load balancing traffic to Switch2. With thismethod, only one link is used for a specific pair of source & destination IP address and the switch uses theXOR function to generate the hash that is used to determine which interface to use. Suppose the packets havethe source IP of 1.1.1.1 & destination IP of 1.1.1.2. Write them in binary we get:

1.1.1.1 = 0000 0001.0000 0001.0000 0001.0000 00011.1.1.2 = 0000 0001.0000 0001.0000 0001.0000 0010

In this case we have only 2 interfaces in this channel group so the XOR function only gets the last bit, whichmeans 1 XOR 0 = 1. Each interface is assigned an index that starts from 0 so Fa0/2 will be indexed 1 -> trafficwill be sent over Fa0/2.

If we have 4 interfaces in a channel group then XOR function gets last 2 bits. If we have 8 interfaces, it gets 3bits and so on. For example, with 8 interfaces the result will be 3 (because 001 XOR 010 = 011) -> Fa0/4 will beused.

Note: If the two address values have the same bit value, the XOR result is always 0. If the two address bitsdiffer, the XOR result is always 1. For example, 0 XOR 0 = 0; 0 XOR 1 = 1; 1 XOR 0 = 1; 1 XOR 1 = 0.

In conclusion, the “port-channel load-balance src-dst-ip” command uses a pair of source & destination IPaddress to select the port to send traffic to -> B is correct.

QUESTION 36Refer to the exhibit. What does the command channel-group 1 mode desirable do?

A. enables LACP unconditionallyB. enables PAgP only if a PAgP device is detectedC. enables PAgP unconditionallyD. enables Etherchannel onlyE. enables LACP only if a LACP device is detected

Correct Answer: CSection: EtherChannel

Page 61: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation

Explanation/Reference:First, “desirable” is a mode on PAgP, not LACP. “enable PAgP unconditionally” means that port will send PAgPpackets to form an EtherChannel port (initiate negotiations with other ports). A channel is formed with anotherport group in either desirable or auto mode.

Note:

Mode “auto” enables PAgP only if a PAgP device is detected and mode “on” forces the port to form a channel.

QUESTION 37Study the following exhibit carefully, what is the reason that users from VLAN 100 can’t ping users on VLAN200?

A. IP routing needs to be enabled on the switchB. Trunking needs to be enabled on Fa0/1C. VLAN 1 needs the no shutdown commandD. The native VLAN is wrong

Page 62: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BSection: InterVLAN RoutingExplanation

Explanation/Reference:The Fa0/1 interface on the switch is not configured with trunking mode. It needs to be configured as shownbelow:

SA(config)#interface Fa0/1SA(config-if)#switchport mode trunkSA(config-if)#switchport trunk encapsulation dot1q

QUESTION 38Study the exhibit carefully. Which statement is true when voice traffic is forwarded on the same VLAN used bythe data traffic?

A. Quality of service cannot be applied for the voice traffic.B. The voice traffic cannot be forwarded to the distribution layer.C. Port security cannot be enabled on the switch that is attached to the IP phone.D. The voice traffic cannot use 802.1p priority tagging.

Correct Answer: DSection: Voice SupportExplanation

Explanation/Reference:

QUESTION 39

Examine the router output above. Which two items are correct? (Choose two)

Page 63: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The local IP address of Router A is 10.1.0.6.B. The local IP address of Router A is 10.1.0.20.C. If Ethernet 0/2 goes down, the standby router will take over.D. When Ethernet 0/3 of RouterA comes back up, the priority will become 105. E. Router A will assume the active state if its priority is the highest.

Correct Answer: DESection: HSRPExplanation

Explanation/Reference:The current state of this router is “active” and the standby router is 10.1.0.6, which makes answer A incorrect)

The IP address of the local router is not mentioned so we can’t conclude answer B. Notice that the IP 10.1.0.20is just the virtual IP address of this HSRP group.

+ “Tracking 2 objects, 0 up” -> both Ethernet0/2 and 0/3 are currently down so the priority of RouterA wasreduced from 120 to 95 (120 – 15 – 10). Therefore when Ethernet0/3 is up again, the priority of RouterA will be95 + 10 = 105 -> D is correct.

From the line “preempt enabled” we learn this router is configured with “preempt” command so it will take overthe active state if its priority is the highest -> E is correct. But a funny thing in this question is even when twointerfaces are down, the priority of RouterA is still higher than the standby router so it is still the active router(the priority of standby router is 75). This also makes answer C incorrect.

QUESTION 40Refer to the exhibit. On the basis of the information provided in the exhibit, which two sets of procedures arebest practices for Layer 2 and 3 failover alignment? (Choose two)

A. Configure the D-SW1 switch as the active HSRP router and the STP root for all VLANs. Configure the D-SW2 switch as the standby HSRP router and backup STP root for all VLANs.

Page 64: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. Configure the D-SW1 switch as the standby HSRP router and the STP root for VLANs 11 and 110.Configure the D-SW2 switch as the standby HSRP router and the STP root for VLANs 12 and 120.

C. Configure the D-SW1 switch as the active HSRP router and the STP root for VLANs 11 and 110. Configurethe D-SW2 switch as the active HSRP router and the STP root for VLANs 12 and 120.

D. Configure the D-SW2 switch as the active HSRP router and the STP root for all VLANs. Configure the D-SW1 switch as the standby HSRP router and backup STP root for all VLANs.

E. Configure the D-SW1 switch as the active HSRP router and the backup STP root for VLANs 11 and 110.Configure the D-SW2 switch as the active HSRP router and the backup STP root for VLANs 12 and 120.

F. Configure the D-SW1 switch as the standby HSRP router and the backup STP root for VLANs 12 and 120.Configure the D-SW2 switch as the standby HSRP router and the backup STP root for VLANs 11 and 110.

Correct Answer: CFSection: HSRPExplanation

Explanation/Reference:The “best practices for Layer 2 and 3 failover alignment” here means using load sharing of HSRP.

To load sharing with HSRP, we can divide traffic into two HSRP groups:

+ One group assigns the active state for one switch+ The other group assigns the active state for the other switch

-> C and F are correct.

QUESTION 41Which three of the following network features are methods used to achieve high availability? (Choose three)

A. Spanning Tree Protocol (STP)B. Delay reductionC. Hot Standby Routing Protocol (HSRP)D. Dynamic routing protocolsE. Quality of Service (QoS)F. Jitter management

Correct Answer: ACDSection: HSRPExplanation

Explanation/Reference:STP, HSRP and dynamic routing protocols provide backup paths to reach the destination and achieve highavailability.

Note: Quality of Service (Qos) only prioritizes specific type of data over other types and provides no highavailability.

QUESTION 42Which command will ensure that R2 will be the primary router for traffic using the gateway address of172.16.15.20?

Page 65: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. On R2 add the command standby 1 priority 80B. On R1 add the command standby 1 priority 110C. On R1 add the command standby 1 priority 80D. On R2 remove the command standby 1 preempt

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:By default the priority value of HSRP is 100 so in order to ensure that R2 will be the primary router for trafficusing the gateway address of 172.16.15.20 we can set the priority of R2 higher than 100 or set the priority of R1lower than 100 -> only C is correct.

QUESTION 43Which command will need to be added to External_A to ensure that it will take over if serial 0/0 on External_Bfails?

Page 66: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. standby 1 priority 130B. standby 1 preemptC. standby 1 track fastethernet 0/0D. standby 1 track 10.10.10.1

Correct Answer: BSection: HSRPExplanation

Explanation/Reference:The “standby 1 preempt” command on External_A router will make External_A take over the active state if itlearns that its priority is higher than that of External_B router. In this case, when S0/0 interface of External_Bfails, its priority will be 105 – 10 = 95, which is smaller than the default priority value (100) on External_A.

QUESTION 44Refer to the exhibit and the partial configuration on routers R1 and R2. Hot Standby Routing Protocol (HSRP) isconfigured on the network to provide network redundancy for the IP traffic. The network administrator noticedthat R2 does not became active when the R1 serial0 interface goes down. What should be changed in theconfiguration to fix the problem?

Page 67: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The Serial0 interface on router R2 should be configured with a decrement value of 20.B. The Serial0 interface on router R1 should be configured with a decrement value of 20.C. R2 should be configured with a standby priority of 100.D. R2 should be configured with a HSRP virtual address.

Correct Answer: BSection: HSRPExplanation

Explanation/Reference:When Serial0 of R1 goes down, the priority of R1 is still higher than that of R2 (115 – 10 = 105 > 100) so weshould configured the decrement value of 20 on R1 with the command: standby 1 track Serial0 20.

QUESTION 45Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of themaster virtual router and the backup virtual router?

Page 68: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, RouterB will become the master virtual router. When Router A recovers, Router B will maintain the role of mastervirtual router.

B. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, RouterB will become the master virtual router. When Router A recovers, it will regain the master virtual router role.

C. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, RouterA will become the master virtual router. When Router B recovers, it will regain the master virtual router role.

D. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, RouterA will become the master virtual router. When Router B recovers, Router A will maintain the role of mastervirtual router.

Correct Answer: BSection: VRRPExplanation

Explanation/Reference:RouterA is the master virtual router because of higher priority value.

By default, a preemptive scheme is enabled whereby a higher priority backup virtual router that becomesavailable takes over for the backup virtual router that was elected to become master virtual router. You candisable this preemptive scheme using the no vrrp preempt command. If preemption is disabled, the backupvirtual router that is elected to become master virtual router remains the master until the original master virtualrouter recovers and becomes master again.

-> B is correct.

(Reference: http://www.cisco.com/en/US/docs/ios/12_0st/12_0st18/feature/guide/st_vrrpx.html)

Page 69: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 46Which protocol allows for the automatic selection and simultaneous use of multiple available gateways as wellas automatic failover between those gateways?

A. VRRPB. GLBPC. IRDPD. HSRP

Correct Answer: BSection: GLBPExplanation

Explanation/Reference:In HSRP and VRRP, only the primary router is used to forward traffic, others routers must wait for the primaryone down before they are used. Also, the bandwidth of the standby (and other) routers are not used andwasted. With GLBP, up to four gateways can be used simultaneously. There is still one virtual IP address in agroup, but GLBP can automatically select which router in the group to forward traffic by sending the virtual MACaddress of a selected router to that host.

QUESTION 47Which two statements are true about HSRP, VRRP, and GLBP? (Choose two)

A. GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.B. HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP does not.C. GLBP allows for router load balancing of traffic from a network segment without the different host IP

configurations required to achieve the same results with HSRP.D. Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple available

gateways.E. GLBP allows for router load balancing of traffic from a network segment by utilizing the creation of multiple

standby groups.

Correct Answer: CDSection: GLBPExplanation

Explanation/Reference:

QUESTION 48You have just purchased a new Cisco 3550 switch running the enhanced IOS and need to configure it to beinstalled in a high availability network. Which three types of interfaces can be used to configure HSRP on a3550 EMI switch? (Choose three)

A. BVI interfaceB. routed portC. SVI interfaceD. Access portE. EtherChannel port channelF. Loopback Interface

Page 70: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BCESection: Gateway RedundancyExplanation

Explanation/Reference:To configure HSRP, a Layer 3 interface is needed. They can be:

- Routed port: a physical port configured as a Layer 3 port by entering the no switchport interface configurationcommand.– SVI: a VLAN interface created by using the interface vlan vlan_id global configuration command and bydefault a Layer 3 interface.– Etherchannel port channel in Layer 3 mode: a port-channel logical interface created by using the interfaceport-channel port-channel-number global configuration command and binding the Ethernet interface into thechannel group.

Reference:

http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1/configuration/guide/swhsrp.html

QUESTION 49You work as a network technician , study the exhibit carefully. Which two statements are true about the outputfrom the show standby vlan 50 command? (Choose two)

Page 71: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Catalyst_A is load sharing traffic in VLAN 50.B. Hosts using the default gateway address of 192.168.1.2 will have their traffic sent to Catalyst_A.C. The command standby 1 preempt was added to Catalyst_A.D. Hosts using the default gateway address of 192.168.1.1 will have their traffic sent to 192.168.1.11 even

after Catalyst _A becomes available again.

Correct Answer: ACSection: Gateway RedundancyExplanation

Explanation/Reference:The output shows that the Catalyst_A switch is the active router for HSRP group 1 and the standby router forHSRP group 2 on interface VLAN 50. This means that another switch is the active router for HSRP group 2 oninterface VLAN 50 -> A is correct, Catalyst_A is load sharing traffic in VLAN 50.

B is not correct, only hosts using the default gateway address of 192.168.1.1 will have their traffic sent toCatalyst_A

From the output, we notice that there is a line showing that “Local State is Active, priority 200 may preempt”.This indicates the command “standby 1 preempt” was added to Catalyst_A. If the active router (this router) fails,another router takes over its active role. The original active router is not allowed to resume the active role whenit is restored until the new active router fails. Pre-empting allows a higher-priority router to take over the activerole immediately.

QUESTION 50Which two Lightweight Access Point Protocol (LWAPP) statements are true? (Choose two)

A. Layer 3 LWAPP is a UDP / IP frame that requires a Cisco Aironet AP to obtain an IP address using DHCP.B. Data traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.C. Data traffic is encapsulated in TCP packets with a source port of 1024 and destination port of 12223.D. Control traffic is encapsulated in UDP packets with a source port of 1024 and a destination port of 12223.

Correct Answer: ADSection: WirelessExplanation

Explanation/Reference:

QUESTION 51Which statement about the Lightweight Access Point Protocol (LWAPP) is true?

A. LWAPP encrypts control traffic between the AP and the controller.B. LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP.C. LWAPP encrypts both control traffic and user data.D. When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

Correct Answer: ASection: WirelessExplanation

Explanation/Reference:

Page 72: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN
Page 73: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Exam C

QUESTION 1The network operations center has received a call stating that Users in VLAN 107 are unable to accessresources through R1. From the information contained in the graphic, what is the cause of this problem?

Page 74: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. spanning tree is not enabled on VLAN 107 B. VTP is pruning VLAN 107C. VLAN 107 does not exist on switch SAD. VLAN 107 is not configured on the trunk

Correct Answer: BSection: VLAN VTP STPExplanation

Explanation/Reference:

“VLAN allowed on trunk” – Each trunk allows all VLANs by default. However, administrator can remove or addto the list by using the “switchport trunk allowed” command.

“VLANs allowed and active in management” – To be active, a VLAN must be in this list.

“VLANs in spanning tree forwarding state and not pruned” – This list is a subset of the “allowed and active” listbut with any VTP-pruned VLANs removed.

All VLANs were configured except VLAN 101 so D is not correct. VLAN 107 exists in the “allowed and active”section so A and C are not correct, too. In the “forwarding state and not pruned” we don’t see VLAN 107 so theadministrator had wrongly configured this VLAN as pruned.

QUESTION 2The Company LAN switches are being configured to support the use of Dynamic VLANs. What should beconsidered when implementing a dynamic VLAN solution? (Choose two)

A. Each switch port is assigned to a specific VLAN.B. Dynamic VLANs require a VLAN Membership Policy Server.

Page 75: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. Devices are in the same VLAN regardless of which port they attach to.D. Dynamic VLAN assignments are made through the command line interface.

Correct Answer: BCSection: VLANExplanation

Explanation/Reference:Dynamic VLANs provide membership based on the MAC address of an end-user device. When a device isconnected to a switch port, the switch must, in effect, query a database to establish VLAN membership. Anetwork administrator also must assign the user’s MAC address to a VLAN in the database of a VLANMembership Policy Server (VMPS) -> B is correct.

When the link comes up, the switch does not forward traffic to or from this port until the port is assigned to aVLAN. The source MAC address from the first packet of a new host on the dynamic port is sent to the VMPS,which attempts to match the MAC address to a VLAN in the VMPS database. If there is a match, the VMPSsends the VLAN number for that port. If there is no match, the VMPS either denies the request or shuts downthe port (depending on the VMPS secure mode setting) -> Devices are in the same VLAN regardless of whichport they attach to -> C is correct.

QUESTION 3The Company LAN is becoming saturated with broadcasts and multicast traffic. What could you do to help anetwork with many multicasts and broadcasts?

A. Creating smaller broadcast domains by implementing VLANs.B. Separate nodes into different hubs.C. Creating larger broadcast domains by implementing VLANs.D. Separate nodes into different switches.E. All of the above.

Correct Answer: ASection: VLANExplanation

Explanation/Reference:By default, switches flood multicasts out all ports (same as broadcasts). However, many switches and routerscan be configured to support multicast traffic, and that support is based on the network addresses uses bymulticasts. By implementing VLANs, broadcasts and multicast traffic are only sent to ports in the same VLAN ofthe sending device.

QUESTION 4You have just created a new VLAN on your network. What is one step that you should include in your VLANbased implementation and verification plan?

A. Verify that different native VLANs exist between two switches for security purposes,B. Verify that the VLAN was added on all switches with the use of the show vlan command.C. Verify that the switch is configured to allow for trunking on the switch ports,D. Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

Correct Answer: BSection: VLANExplanation

Page 76: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:Different native VLANs will cause error messages about the mismatch, and the potential exists that traffic willnot pass correctly between the two native VLANs (although a trunk can be brought up with different nativeVLANs on each end) -> A is not correct.

Answer C is reasonable but it should be done after configuring trunking, not creating a new VLAN -> C is notcorrect.

A layer 2 switch only needs one IP address for management purpose -> D is not correct.

Answer B is the best choice to verify if our new VLAN was created, and which ports are associated with it.

QUESTION 5You have configured a Cisco Catalyst switch to perform Layer 3 routing via an SVI and have assigned thatinterface to VLAN 20. To check the status of the SVI, you issue the show interfaces vlan 20 command at theCLI prompt. You see from the output display that the interface is in an “up/up” state. What must be true in anSVI configuration to bring the VLAN and line protocol up?

A. The port must be physically connected to another Layer 3 device.B. At least one port in VLAN 20 must be active.C. The Layer 3 routing protocol must be operational and receiving routing updates from neighboring peer

devices.D. Because this is a virtual interface, the operational status will always be in an “up/up” state.

Correct Answer: BSection: VLANExplanation

Explanation/Reference:To be “up/up,” a router VLAN interface must fulfill the following general conditions:

* The VLAN exists and is “active” on the VLAN database of the switch.* The VLAN interface exists on the router and is not administratively down.* At least one Layer 2 (access port or trunk) port exists, has a link “up” on this VLAN and is in spanning-treeforwarding state on the VLAN.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/37sg/configuration/guides/l3_int.html)

QUESTION 6Refer to the exhibit. Based upon the output of show vlan on switch CAT2, what can we conclude aboutinterfaces Fa0/13 and Fa0/14?

Page 77: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. That interfaces Fa0/13 and Fa0/14 are in VLAN 1B. That interfaces Fa0/13 and Fa0/14 are downC. That interfaces Fa0/13 and Fa0/14 are trunk interfacesD. That interfaces Fa0/13 and Fa0/14 have a domain mismatch with another switchE. That interfaces Fa0/13 and Fa0/14 have a duplex mismatch with another switch

Correct Answer: CSection: VLANExplanation

Explanation/Reference:Trunk ports are part of multiple VLANs, not of just a single VLAN so they never show up in the show vlancommand. You can check the trunk port with the show interfaces trunk or show interface {port} switchportcommand. You can find an example output of this command in Question 8.

Note: Trunk ports that are not connected appear by default in vlan 1 and also appear in the output of the showvlan command.

QUESTION 7What two pieces of information will the show vlan id 5 command display? (Choose two)

A. Ports in VLAN 5

Page 78: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

http://www.gratisexam.com/

B. UtilizationC. VLAN information on port 0/5D. FiltersE. MTU and type

Correct Answer: AESection: VLANExplanation

Explanation/Reference:The show vlan id vlan-id command display information about a particular VLAN. But notice that this commandwill also list trunk ports that allow this VLAN to run on. An example of the “show vlan id” command is shownbelow:

QUESTION 8ISL is being configured on a Company switch. Which of the following choices are true regarding the ISLprotocol? (Choose two)

A. It can be used between Cisco and non-Cisco switch devices.B. It calculates a new CRC field on top of the existing CRC field.C. It adds 4 bytes of protocol-specific information to the original Ethernet frame.D. It adds 30 bytes of protocol-specific information to the original Ethernet frame.

Correct Answer: BDSection: VLAN TrunkingExplanation

Explanation/Reference:ISL encapsulates the entire Ethernet frame (Fast Ethernet or Gigabit Ethernet) with a 26-byte header and a 4-byte frame check sequence (FCS) for a total of 30 bytes of overhead.

Page 79: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 9A new Company switch was just configured using the “switchport trunk native vlan 7″ command. What does thisinterface command accomplish?

A. Causes the interface to apply ISL framing for traffic on VLAN 7B. Configures the trunking interface to forward traffic from VLAN 7C. Configures the interface to be a trunking port and causes traffic on VLAN 7 to be 802.1q taggedD. Configures the trunking interface to send traffic from VLAN 7 untagged

Correct Answer: DSection: VLAN TrunkingExplanation

Explanation/Reference:The “switchport trunk native vlan 7″ sets VLAN 7 to be the native VLAN so traffic to this VLAN will be untagged. Also untagged traffic are automatically assumed to be in VLAN 7 -> D is correct.

QUESTION 10If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTOwas insistent on using an open standard, which protocol would you use?

A. 802.11BB. spanning-treeC. 802.1QD. ISLE. VTPF. Q.921

Correct Answer: CSection: VLAN TrunkingExplanation

Explanation/Reference:EEE’s 802.1Q VLAN tagging is the industry standard to carry traffic for multiple VLANs on a single trunkinginterface between two Ethernet switches while Inter-Switch Link (ISL) is a Cisco proprietary VLAN taggingprotocol.

QUESTION 11The Company core switches use 802.1Q trunks to connect to each other. How does 802.1Q trunking keeptrack of multiple VLANs?

A. It tags the data frame with VLAN information and recalculates the CRC valueB. It encapsulates the data frame with a new header and frame check sequenceC. It modifies the port index of a data frame to indicate the VLAN D. It adds a new header containing the VLAN ID to the data frame

Page 80: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: ASection: VLAN TrunkingExplanation

Explanation/Reference:IEEE 802.1Q uses an internal tagging mechanism which inserts a 4-byte tag field in the original Ethernet frameitself between the Source Address and Type/Length fields. This tag includes VLAN information (12 bits) todistinguish between VLANs on the link.

QUESTION 12You are the network administrator tasked with designing a switching solution for the Company network. Whichof the following statements describing trunk links are INCORRECT? (Choose four)

A. The trunk link belongs to a specific VLAN.B. Multiple trunk links are used to connect multiple end user devices.C. A trunk link only supports native VLAN.D. Trunk links use 802.10 to identify a VLAN.E. The native VLAN of the trunk link is the VLAN that the trunk uses for untagged packets.

Correct Answer: ABCDSection: VLAN TrunkingExplanation

Explanation/Reference:

QUESTION 13Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true?

Page 81: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Switch SW1 has been configured with the spanning-tree vlan 1 root primary global configuration command.B. Switch SW1 has been configured with the spanning-tree vlan 1 root secondary global configuration

command.C. Switch SW1 has been configured with the spanning-tree vlan 1 priority 24577 global configuration

command.D. Switch SW1 has been configured with the spanning-tree vlan 1 hello-time 2 global configuration command.E. The root bridge has been configured with the spanning-tree vlan 1 root secondary global configuration

command.

Correct Answer: BSection: STPExplanation

Explanation/Reference:The command “spanning-tree vlan 1 root secondary” sets its bridge ID to a value which is higher than thecurrent root bridge but lower than other switches in the network -> If the current root bridge fails, Sw1 willbecome the root bridge.

If no priority has been configured, every switch will have the same default priority of 32768. Assuming all otherswitches are at default priority, the spanning-tree vlan vlan-id root primary command sets a value of 24576.Also, assuming all other switches are at default priority, the spanning-tree vlan vlan-id root secondary commandsets a value of 28672.

In this question, the bridge priority of Sw1 is 28673, not 28672 because the extended system ID (indicated assys-id-ext) is 1, indicating this is the STP instance for VLAN 1. In fact, the bridge priority is 28672.

QUESTION 14Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, whichstatement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?

Page 82: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. They have been configured with the spanning-tree bpdufilter disable command.B. They have been configured with the spanning-tree bpdufilter enable command.C. They have been configured with the spanning-tree bpduguard disable command.D. They have been configured with the spanning-tree bpduguard enable command.E. They have been configured with the spanning-tree guard loop command.F. They have been configured with the spanning-tree guard root command.

Correct Answer: FSection: STPExplanation

Explanation/Reference:We can configure the root guard feature to prevent unauthorized switches from becoming the root bridge.When you enable root guard on a port, if that port receives a superior BPDU, instead of believing the BPDU,the port goes into a root-inconsistent state. While a port is in the root-inconsistent state, no user data is sentacross it. However, after the superior BPDUs stop, the port returns to the forwarding state.

For example, in the topology above suppose S1 is the current root bridge. If a hacker plugs a switch on S3which sends superior BPDUs then it will become the new root bridge, this will also change the traffic path andmay result in a traffic jam. By enabling root guard on S3 port, if spanning-tree calculations cause an interface tobe selected as the root port, the interface transitions to the root-inconsistent (blocked) state instead to preventthe hacker’s switch from becoming the root switch or being in the path to the root.

QUESTION 15Refer to the exhibit. What information can be derived from the output?

Page 83: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Devices connected to interfaces FastEthemet3/1 and FastEthemet3/2 are sending BPDUs with a superiorroot bridge parameter and no traffic is forwarded across the ports. Once inaccurate BPDUs have beenstopped, the interfaces will need to be administratively shut down, and brought back up, to resume normaloperation.

B. Devices connected to interfaces FastEthemet3/1 and FastEthernet3/2 are sending BPDUs with a superiorroot bridge parameter, but traffic is still forwarded across the ports.

C. Devices connected to interfaces FastEthemet3/1 and FastEthemet3/2 are sending BPDUs with a superiorroot bridge parameter and no traffic is forwarded across the ports. Once inaccurate BPDUs have beenstopped, the interfaces automatically recover and resume normal operation.

D. Interfaces FastEthemet3/1 and FastEthemet3/2 are candidate for becoming the STP root port, but neithercan realize that role until BPDUs with a superior root bridge parameter are no longer received on at leastone of the interfaces.

Correct Answer: CSection: STPExplanation

Explanation/Reference:We can configure the root guard feature to prevent unauthorized switches from becoming the root bridge.When you enable root guard on a port, if that port receives a superior BPDU, instead of believing the BPDU,the port goes into a root-inconsistent state. While a port is in the root-inconsistent state, no user data is sentacross it. However, after the superior BPDUs stop, the port returns to the forwarding state.

Page 84: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

For example, in the topology above suppose S1 is the current root bridge. If a hacker plugs a switch on S3which sends superior BPDUs then it will become the new root bridge, this will also change the traffic path andmay result in a traffic jam. By enabling root guard on S3 port, if spanning-tree calculations cause an interface tobe selected as the root port, the interface transitions to the root-inconsistent (blocked) state instead to preventthe hacker’s switch from becoming the root switch or being in the path to the root.

QUESTION 16Which statement is correct about RSTP port roles?

A. The designated port is the switch port on every nonroot bridge that is the chosen path to the root bridge.There can be only one designated port on every switch. The designated port assumes the forwarding statein a stable active topology. All switches connected to a given segment listen to all BPDUs and determine theswitch that will be the root switch for a particular segment.

B. The disabled port is an additional switch port on the designated switch with a redundant link to the segmentfor which the switch is designated. A disabled port has a higher port 10 than the disabled port on thedesignated switch. The disabled port assumes the discarding state in a stable active topology.

C. The backup port is a switch port that offers an alternate path toward the root bridge. The backup portassumes a discarding state in a stable, active topology. The backup port will be present on nondesignatedswitches and will make a transition to a designated port if the current designated path fails.

D. The root port is the switch port on every nonroot bridge that is the chosen path to the root bridge. There canbe only one root port on every switch. The root port assumes the forwarding state in a stable activetopology.

Correct Answer: DSection: STPExplanation

Explanation/Reference:

QUESTION 17How are STP timers and state transitions affected when a topology change occurs in an STP environment?

A. All ports will temporarily transition to the learning state for a period equal to the max age timer plus theforward delay interval.

B. All ports will transition temporarily to the learning state for a period equal to the forward delay interval.C. The default aging time for MAC address entries will be reduced for a period of the max age timer plus the

forward delay interval.

Page 85: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

D. The default hello time for configuration BPDUs will be reduced for the period of the max age timer.

Correct Answer: CSection: STPExplanation

Explanation/Reference:If a switch stops receiving Hellos, it means that there is a failure in the network. The switch will initiate theprocess of changing the Spanning-tree topology. The process requires the use of 3 STP timers:* Hello - the time between each bridge protocol data unit (BPDU) that is sent on a port. This time is equal to 2seconds (sec) by default, but you can tune the time to be between 1 and 10 sec.* Forward delay – the time that is spent in the listening and learning state. This time is equal to 15 sec bydefault, but you can tune the time to be between 4 and 30 sec.* Max age – maximum length of time a BPDU can be stored without receiving an update.. This time is 20 secby default, but you can tune the time to be between 6 and 40 sec.

Max Age is the time that a bridge stores a BPDU before discarding it.

Switches (Bridges) keep its MAC address table entries for 300 seconds (5 minutes, known as aging time), bydefault. When a network topology change happens, the Switch (Bridge) temporarily lowers the aging time to thesame as the forward delay time (15 seconds) to relearn the MAC address changes happened because oftopology change.

This is important because normally only after five minutes an entry is aged out from the MAC address table ofthe switch and the network devices could be unreachable for up to 5 minutes. This is known as a black holebecause frames can be forwarded to a device, which is no longer available.

Notice that shortening the aging time to 15 seconds does not flush the entire table, it just accelerates the agingprocess. Devices that continue to “speak” during the 15-second age-out period never leave the bridging table.

Therefore in this question, to be clearer answer C should state “The default aging time for MAC address entrieswill be reduced to forward_delay time for a period of the max age timer plus the forward delay interval.”

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094797.shtml)

QUESTION 18Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switchS2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switchS2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?

Page 86: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Fifty percent of the traffic will successfully reach Host B, and fifty percent will dead-end at switch S3because of a partial spanning-tree loop.

B. No. Traffic will pass from switch S6 to S2 and dead-end at S2.C. No. Traffic will loop back and forth between switch S6 and Host A.D. No. Traffic will loop back and forth between switches S2 and S3.E. Yes. Traffic will pass from switch S6 to S2 to S1.

Correct Answer: ESection: STPExplanation

Explanation/Reference:First we should understand about UpLinkFast.

Suppose S1 is the root bridge in the topology above. S3 is connected to S1 via two paths: one direct path andanother goes through S2. Suppose the port directly connected to S1 is root port -> port connected to S2 will bein Blocking state. If the primary link goes down, the blocked port will need about 50 seconds to move fromBlocking -> Listening -> Learning -> Forwarding to be used.

To shorten the downtime, a feature called Uplink Fast can be used. When the primary (root) link fails, anotherblocked link can be brought up immediately for use. When UplinkFast is enabled, it is enabled for the entireswitch and all VLANs. It cannot be enabled for individual VLANs.

In this question, the Root Guard feature has been enabled on Gi0/0 of S2 & S5 so these two Gi0/0 ports cannotbe root ports and cannot forward traffic -> the link between S2 & S6 must be used.

Note: The idea of Uplink Fast is based on blocked ports which are possible to become a root port. Thereforethe Uplink Fast feature is not allowed on the root bridge -> S2 & S5 cannot be root bridges in this case.

QUESTION 19Refer to the exhibit. The command spanning-tree guard root is configured on interface Gi0/0 on both switchS2 and S5. The global configuration command spanning-tree uplinkfast has been configured on both switchS2 and S5. The link between switch S4 and S5 fails. Will Host A be able to reach Host B?

Page 87: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Yes. Traffic can pass either from switch S6 to S3 to S2 to S1, or, from switch S6 to S5 to S2 to S1.B. No. Traffic will pass from switch S6 to S5 and dead-end at interface Gi0/0.C. No. Traffic will loop back and forth between switch S5 and S2.D. Yes. Traffic will pass from switch S6 to S3 to S2 to S1.E. No. Traffic will either pass from switch S6 to S5 and dead-end, or traffic will pass from switch S6 to S3 to S2

and dead-end.

Correct Answer: DSection: STPExplanation

Explanation/Reference: When the link between S4 – S5 goes down, Gi0/0 on S5 cannot become root port because of Root Guardfeature on it. But maybe Host A can’t reach host B in the first 15 seconds after the link between S4 & S5 fails bydefault. It is the time for S5 to clear the MAC address table

QUESTION 20Which two statements about the various implementations of STP are true? (Choose two)

A. Common Spanning Tree maintains a separate spanning-tree instance for each VLAN configured in thenetwork.

B. The Spanning Tree Protocol (STP) is an evolution of the IEEE 802.1w standard.C. Per-VLAN Spanning Tree (PVST) supports 802.1Q trunking.D. Per-VLAN Spanning Tree Plus (PVST+) is an enhancement to 802.1Q specification and is supported only

on Cisco devices.E. Rapid Spanning Tree Protocol (RSTP) includes features equivalent to Cisco PortFast, UplinkFast, and

BackboneFast for faster network reconvergence.F. Multiple Spanning Tree (MST) assumes one spanning-tree instance for the entire Layer 2 network,

regardless of the multiple number of VLANs.

Correct Answer: DESection: STPExplanation

Explanation/Reference:Common Spanning Tree only uses one spanning-tree instance for all VLANs in the network -> A is not correct.

Page 88: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) can be seen as an evolution of the 802.1D standard morethan a revolution. The 802.1D terminology remains primarily the same. Most parameters have been leftunchanged so users familiar with 802.1D can rapidly configure the new protocol comfortably -> B is not correct.

Per-VLAN spanning tree protocol plus (PVST+) is a Cisco proprietary protocol that expands on the SpanningTree Protocol (STP) by allowing a separate spanning tree for each VLAN. Cisco first developed this protocol asPVST, which worked with the Cisco ISL trunking protocol, and then later developed PVST+ which utilizes the802.1Q trunking protocol. PVST+ allows interoperability between CST and PVST in Cisco switches -> C is notcorrect but D is correct.

RSTP significantly reduces the time to reconverge the active topology of the network when changes to thephysical topology or its configuration parameters occur. RSTP supports Edge Ports (similar to PortFast),UplinkFast, and BackboneFast for faster network reconvergence. Rapid Spanning Tree Protocol (RSTP) canalso revert back to 802.1D STP for interoperability with older switches and existing infrastructures -> E iscorrect.

Multiple Spanning Tree can map one or more VLANs to a single STP instance. Multiple instances of STP canbe used (hence the name MST), with each instance supporting a different group of VLANs. For example,instead of creating 50 STP separate STP instances for 50 VLANs, we can create only 2 STP instances – eachfor 25 VLANs. This helps saving switch resources -> F is not correct.

QUESTION 21Given the diagram and assuming that STP is enabled on all switch devices, which two statements are true?(Choose two)

A. DSW11 will be elected the root bridge.B. DSW12 will be elected the root bridge.C. ASW13 will be elected the root bridge.D. P3/1 will be elected the nondesignated port.E. P2/2 will be elected the nondesignated port.F. P3/2 will be elected the nondesignated port.

Correct Answer: ADSection: STPExplanation

Explanation/Reference:

Page 89: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

If all the switches are turned on at the same time, DSW11 will win the election and become Root Bridgebecause it has lowest Bridge ID (including Bridge Priority and MAC address) so all of its ports are DesignatedPort (forwarding state).

Also P2/1, P3/2 and P4/1 become Root Ports because they are closest to the Root Bridge (in terms of pathcost) for each switch.

P3/1 will be Nondesignated (Blocked) Port because P1/2 must be a Designated Port (of course P1/2 advertisesbetter BPDU, in other words better Bridge ID, than P3/1).

QUESTION 22Which two RSTP port roles include the port as part of the active topology? (Choose two)

A. rootB. designatedC. alternateD. backupE. forwardingF. learning

Correct Answer: ABSection: STPExplanation

Explanation/Reference:

QUESTION 23The lack of which two prevents VTP information from propagating between switches? (Choose two)

A. A root VTP serverB. A trunk portC. VTP priorityD. VLAN 1

Correct Answer: BD

Page 90: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Section: VTPExplanation

Explanation/Reference:VTP advertisements only travel through trunk ports -> B is correct.

VLAN 1 is a special VLAN selected by design to carry specific information such as CDP (Cisco DiscoveryProtocol), VTP, PAgP and DTP. This is always the case and cannot be changed. Cisco recommends not to useVLAN 1 as a standard VLAN to carry network data -> D is correct.

QUESTION 24Which two DTP modes will permit trunking between directly connected switches? (Choose two)

A. dynamic desirable (VTP domain A) to dynamic desirable (VTP domain A)B. dynamic desirable (VTP domain A) to dynamic desirable (VTP domain B)C. dynamic auto (VTP domain A) to dynamic auto (VTP domain A)D. dynamic auto (VTP domain A) to dynamic auto (VTP domain B)E. dynamic auto (VTP domain A) to nonegotiate (VTP domain A)F. nonegotiate (VTP domain A) to nonegotiate (VTP domain B)

Correct Answer: AFSection: VTPExplanation

Explanation/Reference:Below is the switchport modes for easy reference:

Note: If an interface is set to switchport mode dynamic desirable, it will actively attempt to convert the link intotrunking mode. If the peer port is configured as switchport mode trunk, dynamic desirable, or dynamic automode, trunking is negotiated successfully -> A is correct.

B is not correct because 2 dynamic desirable mode in 2 different VTP domains cannot create a trunk link.

Dynamic auto waits to receive DTP from the neighbor so if 2 interfaces are set to this mode, none of them willreceive DTP frames -> C and D are not correct.

A port in Nonegotiate mode can be set to access or trunk port mode but it will not send DTP. Dynamic auto also

Page 91: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

does not send DTP -> a trunk link cannot be created -> E is not correct.

Also, when setting ports to nonegotiate, that port will not send DTP. We can set both interfaces to trunk link -> atrunk link can be created between two different VTP domains -> F is correct.

QUESTION 25The Company switches are configured to use VTP. What’s true about the VLAN trunking protocol (VTP)?(Choose two)

A. VTP messages will not be forwarded over nontrunk links.B. VTP domain names need to be identical. However, case doesn’t matter.C. A VTP enabled device which receives multiple advertisements will ignore advertisements with higher

configuration revision numbers.D. A device in “transparent” VTP v.1 mode will not forward VTP messages.E. VTP pruning allows switches to prune VLANs that do not have any active ports associated with them.

Correct Answer: ADSection: VTPExplanation

Explanation/Reference:Answer A is obviously correct as VTP advertisements only travel through trunk ports.

VTP domain names are case-sensitive. That means the domain “certprepare” is different from “Certprepare”.There is no exception -> B is not correct.

A VTP enabled device which receives multiple advertisements will update (not ignore) advertisements withhigher configuration revision numbers, provided that it has the same VTP domain name and password -> C isnot correct.

Answer D is not clear. In VTP Version 1, a VTP transparent switch inspects VTP messages for the domainname and version and forwards a message only if the version and domain name match. Because VTP Version2 supports only one domain, it forwards VTP messages in transparent mode without inspecting the version anddomain name. So in this case we don’t have enough information to conclude about answer D.

Answer E is not clear too. VTP will prune VLANs on trunks connected to switches that do not have portsassociated with the VLANs. I am not sure what Cisco wants to say in answer E.

But if we consider answer E to be incorrect then the best answers should be A and D.

Page 92: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_50_se/configuration/guide/swvtp.html#wp1035121)

QUESTION 26The Company switches have all been upgraded to use VTP version 2. What are two benefits provided in VTPVersion 2 that are not available in VTP Version 1? (Choose two)

A. VTP version 2 supports Token Ring VLANs.B. VTP version 2 allows VLAN consistency checksC. VTP version 2 saves VLAN configuration memory.D. VTP version 2 reduces the amount of configuration necessary.E. The VTP version 2 allows active redundant links when used with spanning tree.

Correct Answer: ABSection: VTPExplanation

Explanation/Reference:The major difference is that VTP V2 introduces support for Token Ring VLANs. If you use Token Ring VLANs,you must enable VTP V2 -> A is correct.

In VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when youenter new information through the command-line interface (CLI) or Simple Network Management Protocol(SNMP). Consistency checks are not performed when new information is obtained from a VTP message orwhen information is read from NVRAM. If the digest on a received VTP message is correct, its information isaccepted without consistency checks -> B is correct.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094c52.shtml)

QUESTION 27What is one method that can be used to prevent VLAN hopping on the network?

Page 93: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Configure VACLs.B. Configure all frames with two 802.1Q headers.C. Enforce username/password combinations.D. Explicitly turn off Dynamic Trunking Protocol (DTP) on all unused ports.E. All of the above

Correct Answer: DSection: VLAN HoppingExplanation

Explanation/Reference:Disable DTP so that switchport will not negotiate trunking on the link by this command:

Or a better way is to configure it as an access port:

Note: VACLs should only be used to mitigate DHCP Snooping, not VLAN Hopping by filtering out DHCP Replyfrom outside ports.

QUESTION 28Which statement is true about DHCP spoofing operation?

A. DHCP spoofing and SPAN cannot be used on the same port of a switch.B. To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a

dynamic ARP packet.C. To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry

pointing towards the DHCP server.D. DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.

Correct Answer: BSection: DHCP SnoopingExplanation

Explanation/Reference:First let’s analyze answer A.

Switched Port Analyzer (SPAN) feature copies network traffic from a VLAN or group of ports to a selected port.SPAN is generally referred to as Port mirroring. An example of configuring SPAN port is shown below:

The above configuration will capture all traffic from interface FastEthernet 0/1 and send it to interfaceFastEthernet 0/2.

Answer A is a bit unclear because SPAN involves 2 ports: source and destination ports; but we don’t knowwhich port is mentioned. SPAN does not affect the switching function on the source port but it does affect thedestination port: all incoming traffic is disable on destination port so DHCP spoofing cannot be done on thisport. I suppose this question wants to mention about source port, which makes answer A incorrect.

Although it is not mentioned in the books but answer B is the best choice. If the DHCP server can create a

Page 94: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

static ARP entry that cannot be updated by a dynamic ARP packet then the attacker cannot change the MACaddress information of the DHCP server on client -> B is correct.

Usually a switch does not have DHCP server services; also a static entry pointing towards the DHCP server willnot help prevent DHCP spoofing -> C is not correct.

Place all unused ports in an unused VLAN can prevent VLAN Hopping, not DHCP spoofing -> D is not correct.

QUESTION 29What does the global configuration command “ip arp inspection vlan 10-12,15″ accomplish?

A. Discards ARP packets with invalid IP-to-MAC address bindings on trusted portsB. Validates outgoing ARP requests for interfaces configured on VLAN 10,11,12, or 15C. Intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindingsD. Intercepts all ARP requests and responses on trusted ports

Correct Answer: CSection: Dynamic ARP Inspection DAIExplanation

Explanation/Reference:The function of DAI is:

+ Intercepts all ARP requests and responses on untrusted ports+ Verifies that each of these intercepted packets has a valid IP-to-MAC address binding before updating thelocal ARP cache or before forwarding the packet to the appropriate destination+ Drops invalid ARP packets

On untrusted ports, the switch captures all ARP packets (both request and reply) and then validates the SourceProtocol and Source Hardware address values against the snooping table database for that port.If the MAC address and IP address and the corresponding port do not match the snooping database entry, theARP packets are dropped. DAI thus prevents the node from specifying a non-legitimate IP-MAC addressbinding which differs from what was given by the DHCP server.

QUESTION 30Refer to the exhibit. What will happen to the traffic within VLAN 14 with a source address of 172.16.10.5?

A. The traffic will be forwarded to the router processor for further processing.B. The traffic will be dropped.C. The traffic will be forwarded to the TCAM for further processing.D. The traffic will be forwarded to without further processing.

Page 95: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BSection: VLAN Access MapExplanation

Explanation/Reference:

QUESTION 31You are responsible for increasing the security within the Company LAN. Of the following choices listed below,which is true regarding layer 2 security and mitigation techniques?

A. Enable root guard to mitigate ARP address spoofing attacks.B. Configure DHCP spoofing to mitigate ARP address spoofing attacks.C. Configure PVLANs to mitigate MAC address flooding attacks.D. Enable root guard to mitigate DHCP spoofing attacks.E. Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F. Configure port security to mitigate MAC address flooding.

Correct Answer: FSection: Port SecurityExplanation

Explanation/Reference:Root guard is used to mitigate Spanning-tree compromises, not ARP address spoofing -> A and D are notcorrect.

DHCP spoofing is mitigated by DHCP snooping -> B is not correct.

PVLAN is often used to protect devices on a common VLAN, give them more separation even though they areon the same VLAN. It is not used to mitigate MAC address flooding attacks -> C is not correct.

DAI should be used to mitigate ARP Spoofing attack in which the attacker fakes its MAC as the destinationMAC to receive traffic intended for valid destination -> E is not correct.

MAC flooding attack is a technique in which the attacker floods the switch with packets, each containingdifferent source MAC address. This makes the switch learn the MAC addresses until its memory is used up.Now the switch acts like a hub, in which all incoming packets are broadcast out on all ports instead of just to thecorrect destination port as normal operation. The attacker can listen to these broadcast packets and capturesensitive data.

To protect against this type of attack, port security feature can be used to limit and allow specific MAC toaccess the port -> F is correct. (VLAN Access map with a “mac access list” can also be used to filter MAC).

QUESTION 32Refer to the exhibit. From the configuration shown, what can be determined?

Page 96: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The sticky addresses will only be those manually configured MAC addresses enabled with the stickykeyword.

B. The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MACaddresses, and added to the running configuration.

C. Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.D. A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN

and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.

Correct Answer: BSection: Port SecurityExplanation

Explanation/Reference:The “sticky” keyword in switchport port-security mac-address sticky command converts all thedynamic secure MAC addresses, including those that were dynamically learned before sticky learning wasenabled, to sticky secure MAC addresses and adds to the running configuration.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_44_se/configuration/guide/swtrafc.html)

QUESTION 33Refer to the exhibit. Port security has been configured on port Fa0/5. What would happen if another device isconnected to the Fa0/5 port after the maximum number of devices has been reached, even if one or more ofthe original MAC addresses are inactive?

Page 97: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The port will permit the new MAC address because one or more of the original MAC addresses are inactive.B. The port will permit the new MAC address because one or more of the original MAC addresses will age out.C. Because the new MAC address is not configured on the port, the port will not permit the new MAC address.D. Although one or more of the original MAC addresses are inactive, the port will not permit the new MAC

address.

Correct Answer: DSection: Port SecurityExplanation

Explanation/Reference:The port-security aging time is set to 0 so it is disabled for this port -> even if the original MAC addresses areinactive, the port will not permit the new MAC address.

QUESTION 34When configuring private VLANs, which configuration task must you do first?

A. Configure the private VLAN port parameters.B. Configure and map the secondary VLAN to the primary VLAN.C. Disable IGMP snooping.D. Set the VTP mode to transparent.

Correct Answer: DSection: Private VLANExplanation

Explanation/Reference:Before configuring private VLANs, we must set VTP mode to transparent because VTP version 1 and 2 do notsupport private VLAN (VTP version 3 does support PVLAN). Notice that a switch in VTP transparent mode stillforwards other VTP updates to its neighbors.

QUESTION 35Refer to the exhibit. Which statement is true about the display of the command “show pagp 1 neighbor”command?

A. STP packets are sent out the Gi0/1 interface only.

Page 98: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. STP packets are sent out both the Gi0/1 and Gi0/2 interfaces.C. CDP packets are sent out the Gi0/1 interface only.D. CDP packets are sent out the Gi0/2 interface only.

Correct Answer: ASection: EtherChannelExplanation

Explanation/Reference:DTP and CDP send and receive packets over all the physical interfaces in the EtherChannel while STP alwayschooses the first operational port in an EtherChannel bundle -> A is correct.

QUESTION 36Which statement best describes implementing a Layer 3 EtherChannel?

A. EtherChannel is a Layer 2 and not a Layer 3 feature.B. Implementation requires switchport mode trunk and matching parameters between switches.C. Implementation requires disabling switchport mode. D. A Layer 3 address is assigned to the channel-group interface.

Correct Answer: CSection: EtherChannelExplanation

Explanation/Reference:By default, the ports on a multilayer switch (MLS) will all be running in Layer 2 mode. A port must be configuredas a routing port before it is configured as a Layer 3 EtherChannel -> require to use the “no switchport”command.

QUESTION 37Assume that a host sends a packet to a destination IP address and that the CEF-based switch does not yethave a valid MAC address for the destination. How is the ARP entry (MAC address) of the next-hop destinationin the FIB get?

A. The sending host must send an ARP request for itB. All packets to the destination are droppedC. The Layer 3 forwarding engine (CEF hardware) must send an ARP request for itD. CEF must wait until the Layer 3 engine sends an ARP request for it

Correct Answer: DSection: InterVLAN RoutingExplanation

Explanation/Reference:If a valid MAC address for the destination is not found, the Layer 3 forwarding engine can’t forward the packetin hardware due to the missing Layer 2 next-hop address. Therefore the packet is sent to the Layer 3 Engine sothat it can generate an ARP request (this is called the “CEF glean” state)

Page 99: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 38Which two codes are supported by Cisco VoIP equipment?

A. G.701 and G719B. G.711 and G.729C. G.721 and G.739D. G.731 and G.749

Correct Answer: BSection: Voice SupportExplanation

Explanation/Reference:

QUESTION 39Refer to the exhibit. Assume that Switch_A is active for the standby group and the standby device has only thedefault HSRP configuration. What conclusion is valid?

A. If port Fa1/1 on Switch_A goes down, the standby device will take over as active.

Page 100: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. If the current standby device were to have the higher priority value, it would take over the role of active forthe HSRP group.

C. If port Fa1/1 on Switch_A goes down, the new priority value for the switch would be 190.D. If Switch_A had the highest priority number, it would not take over as active router.

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:By default, the standby track interface decrement is 10 so if interface fa1/1 goes down, the new priority value is200 – 10 = 190

QUESTION 40Which statement best describes first-hop redundancy protocol status, given the command output in the exhibit?

A. The first-hop redundancy protocol is not configured for this interface.B. HSRP is configured for group 10.C. HSRP is configured for group 11.D. VRRP is configured for group 10.E. VRRP is configured for group 11.F. GLBP is configured with a single AVF.

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:The MAC address of the last IP is 0000.0c07.ac0b indicates HSRP has been configured for group 11 (0b inhexa = 11 in decimal).

QUESTION 41HSRP has been configured between two Company devices. What kind of message does an HSRP configuredrouter send out every 3 seconds?

A. RetireB. CoupC. ResignD. SendE. Hello

Correct Answer: ESection: HSRP

Page 101: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation

Explanation/Reference:

QUESTION 42The following command was issued on a router that is being configured as the active HSRP router. standby ip 10.2.1.1

Which statement is true about this command?

A. This command will not work because the HSRP group information is missingB. The HSRP MAC address will be 0000.0c07.ac00 C. The HSRP MAC address will be 0000.0c07.ac01D. The HSRP MAC address will be 0000.070c.ad01E. This command will not work because the active parameter is missing

Correct Answer: BSection: HSRPExplanation

Explanation/Reference:The full syntax of the command above is:

Therefore in the command “standby ip 10.2.1.1″ we recognize it is using the default group-number, which is 0 -> The last two-digit hex value of HSRP MAC address should be “00″.

QUESTION 43What can be determined about the HSRP relationship from the displayed debug output?

Page 102: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Router 172.16.11.112 will be the active router because its HSRP priority is preferred over router172.16.11.111

B. Router 172.16.11.111 will be the active router because its HSRP priority is preferred over router172.16.11.112

C. The IP address 172.16.11.111 is the virtual HSRP router IP address.D. The IP address 172.16.11.112 is the virtual HSRP router IP address.E. The nonpreempt feature is enabled on the 172.16.11.112 router.F. The preempt feature is not enabled on the 172.16.11.111 router.

Correct Answer: FSection: HSRPExplanation

Explanation/Reference:

Page 103: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 44Refer to the exhibit. Based on the “debug standby” output in the exhibit, which HSRP statement is true?

Page 104: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. DSW111 is the active router because it is the only HSRP-enabled router on that segment.B. DSW111 is the active router because the standby timer has been incorrectly configured.C. DSW111 is the active router because it has a lower priority on that VLAN.D. DSW111 is the active router because it has a lower IP address on that VLAN.E. DSW111 is the active router and is advertising the virtual IP address 10.10.10.111 on VLAN 11.

Correct Answer: ASection: HSRPExplanation

Explanation/Reference:From the output we learn that DSW111 moves from Init -> Listen -> Speak -> Standby -> Active and all themessages are “Hello out” (no messages are “Hello in”). This means that DSW111 is the only router sendingmessages in this segment.

QUESTION 45Refer to the exhibit. Based on the debug output shown in the exhibit, which three statements about HSRP aretrue? (Choose three.)

Page 105: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The router with IP address 172.16.11.111 has preempt configured.B. The final active router is the router with IP address 172.16.11.111.C. The router with IP address 172.16.11.112 has nonpreempt configured.D. The priority of the router with IP address 172.16.11.112 is preferred over the router with IP address

172.16.11.111.E. The router with IP address 172.16.11.112 is using default HSRP priority.F. The IP address 172.16.11.115 is the virtual HSRP IP address.

Correct Answer: ABFSection: HSRPExplanation

Explanation/Reference:

QUESTION 46Refer to the exhibit. What is this configuration an example of?

A. GLBP weightingB. Default AVF and AVG configurationC. GLBP MD5 authenticationD. GLBP text authenticationE. GLBP timer manipulation

Correct Answer: ASection: GLBPExplanation

Page 106: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:The command “glbp 10 weighting 110 lower 95 upper 105″ specifies the initial weighting value (110), the lower(95) and the upper (105) thresholds. Notice that if the weight falls below the lower threshold then the router willnot be an Active Virtual Forwarder (AVF) until the weight rises up to the higher threshold.

When the track object fails, the weighting is decremented by the value after the “decrement” keyword. In thiscase, POS5/0 and POS6/0 are tracked objects and if one of them fails, the weighting is decreased by 10 -> theweighting = 110 – 10 = 100. This value is still higher than the lower value 95 so this router is still the AVF. Ifboth interfaces fail, the weighting will be smaller than the lower value so this router loses the AVF (until bothinterfaces are up again).

QUESTION 47Refer to the exhibit. Which four statements accurately describe this GLBP topology? (Choose four)

A. Router A is responsible for answering ARP requests sent to the virtual IP address.B. If Router A becomes unavailable. Router B will forward packets sent to the virtual MAC address of Router

A.C. Router A alternately responds to ARP requests with different virtual MAC addresses.D. Router B will transition from blocking state to forwarding state when it becomes the AVG.E. If another router were added to this GLBP group, there would be two backup AVGs.F. Router B is in GLBP listen state.

Correct Answer: ABCESection: GLBPExplanation

Explanation/Reference:In a GLBP group, the AVG assigns a virtual MAC address to each member of the GLBP group. It also answersAddress Resolution Protocol (ARP) requests for the virtual IP address -> A is correct.

Page 107: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

When Router A becomes unavailable, Router B will take over the job of forwarding packets for virtual MACaddress 0007.b400.0101 of Router A -> B is correct.

Router A can load balance traffic by alternately responding to ARP requests with different virtual MACaddresses. In this case two virtual MAC addresses 0007.b400.0101 and 0007.b400.0102 will be usedalternately in ARP Replies -> C is correct.

Both Router A and Router B are in forwarding state. The trick here is client 1 only sends traffic to Router Awhile client 2 only sends traffic to Router B -> D is not correct.

If another router were added to this GLBP group, Router B and it can forward packets in the case of Router Afails -> E is correct (but notice that the newly added router would be in listening state).

In GLBP, there are 3 states in a group: active, standby, or listen. Members of a GLBP group elect one gatewayto be the Active Virtual Gateway (AVG) for that group. It also elects one member as Standby Virtual Gateway(SVG). If there are more than two members, then the members that remain are in the listen state. In this case,Router A is elected as AVG while Router B is elected as SVG -> Router B is in active state -> F is not correct.

(Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_example09186a00807d2520.shtml)

QUESTION 48You are a network technician, study the exhibit carefully. Both routers are configured for the Gateway LoadBalancing Protocol (GLBP). Which statement is true?

A. The default gateway address of each host should be set to the virtual IP address.B. The default gateway addresses of both hosts should be set to the IP addresses of both routers.C. The hosts will have different default gateway IP addresses and different MAC addresses for each.D. The hosts will learn the proper default gateway IP address from Router RA.

Correct Answer: ASection: Gateway RedundancyExplanation

Explanation/Reference:

Page 108: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 49You are a network technician, study the exhibit carefully. Assume that Host PC can ping the CorporateHeadquarters and that HSRP is configured on DS1, which is then reloaded. Assume that DS2 is thenconfigured and reloaded. On the basis of this information, what conclusion can be drawn?

A. DS1 will be the active router because it booted first.B. DS1 will be the standby router because it has the lower IP address.C. DS1 will be the active router because it has the lower priority configured.D. DS2 will be the active router because it booted last.

Correct Answer: ASection: Gateway RedundancyExplanation

Explanation/Reference:The configuration does not have the “standby 60 preempt”command so the first booted router will take theactive role with any priority.

Page 109: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 50LWAPP is meant to be a network protocol for access points that also provides for centralized management.Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?

A. provides security by blocking communication between access points and wireless clients.B. reduction of processing in wireless controllers.C. distributed approach to authentication, encryption, and policy enforcement.D. access point discovery, information exchange, and configuration.

Correct Answer: DSection: WirelessExplanation

Explanation/Reference:

QUESTION 51If you are a network technician, which two WLAN client utility statements do you think are true? (Choose two)

A. In a Windows XP environment, a client adapter can only be configured and managed with the MicrosoftWireless Configuration Manager.

B. The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility(ASTU) icon in the Windows system tray.

C. The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can both beenabled at the same time to setup WLAN client cards.

D. The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAPauthentication with dynamic WEP.

Correct Answer: BDSection: WirelessExplanation

Explanation/Reference:

Page 110: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Exam D

QUESTION 1The network administrator needs to enable VTP pruning within the network. What action should a networkadministrator take to enable VTP pruning on an entire management domain?

A. enable VTP pruning on every switch in the domainB. enable VTP pruning on any client switch in the domainC. enable VTP pruning on any switch in the management domainD. enable VTP pruning on a VTP server in the management domain

Correct Answer: DSection: VLAN VTP STPExplanation

Explanation/Reference:

QUESTION 2What are some virtues of implementing end-to-end VLANs? (Choose two)

A. End-to-end VLANs are easy to manage.B. Users are grouped into VLANs independent of a physical location.C. Each VLAN has a common set of security and resource requirements for all members. D. Resources are restricted to a single location.

Correct Answer: BCSection: VLANExplanation

Explanation/Reference:There are two kinds of VLANs:

* End-to-end VLANs: also called campuswide VLANs, span the entire switch fabric of a network. They arepositioned to support maximum flexibility and mobility of end devices. Users can be assigned to VLANsregardless of their physical location. As a user moves around the campus, that user’s VLAN membership staysthe same. End-to-end VLANs should group users according to common requirements. All users in a VLANshould have roughly the same traffic flow patterns

* Local VLANs: based on geographic locations by demarcation at a hierarchical boundary (core, distribution,access)

(Reference: CCNP SWITCH 642-813 Official Certification Guide)

QUESTION 3Which two statements are true about a switched virtual interface (SVI)? (Choose two)

A. An SVI is created by entering the no switchport command in interface configuration mode.B. An SVI is normally created for the default VLAN (VLAN1) to permit remote switch administration.C. An SVI provides a default gateway for a VLAN.D. Multiple SVIs can be associated with a VLAN.E. SVI is another name for a routed port.

Page 111: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BCSection: VLANExplanation

Explanation/Reference:Catalyst L2 fixed configuration switches that run Cisco IOS Software have only one configurable IPmanagement interface, which by default is interface VLAN 1. Pure layer 2 switches can have only one interfaceVLAN up at the time. This is called the management VLAN (in IOS) or the sc0 interface (in CatOS). The mainpurpose of this interface is management (telnet, SNMP, etc). If the switch is a Layer 3 switch, you can configuremultiple VLANs and route between them. An L3 switch can handle multiple IPs, so there is no specificmanagement VLAN on the switch.

(Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008010e9ca.shtml)

QUESTION 4You have just created a new VLAN on your network. What is one step that you should include in your VLANbased implementation and verification plan?

A. Verify that trunked links are configured to allow the VLAN traffic.B. Verify that the switch is configured to allow for trunking on the switch ports.C. Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D. Verify that different native VLANs exist between two switches for security purposes.

Correct Answer: ASection: VLANExplanation

Explanation/Reference:A VLAN-based implementation and verification plan should include:

* Verification that trunked links are configured to allow the newly created VLANs.* Verification that the SVI has already been created and that it shows up on all required switches using theshow vlan command.

QUESTION 5You have just created a new VLAN on your network for inter-VLAN routing. What is one step that you shouldinclude in your VLAN-based implementation and verification plan?

A. Verify that different native VLANs exist between two switches for security purposes.B. Verify that the switch is configured to allow for trunking on the switch ports.C. Verify that each switch port has the proper IP address space assigned to it for the new VLAN.D. Verify that the VLAN virtual interface has been correctly created and enabled.

Correct Answer: DSection: VLANExplanation

Explanation/Reference:A VLAN-based implementation and verification plan should include:

* Verification that trunked links are configured to allow the newly created VLANs.

Page 112: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

* Verification that the SVI has already been created and that it shows up on all required switches using theshow vlan command.

QUESTION 6Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?

A. Eighty percent of traffic on the network is destined for Internet sites.B. There are common sets of traffic filtering requirements for workgroups located in multiple buildings.C. Eighty percent of a workgroup’s traffic is to the workgroup’s own local server. D. Users are grouped into VLANs independent of physical location.

Correct Answer: ASection: VLANExplanation

Explanation/Reference:End-to-end VLAN follows the 80/20 rule in which 80 percent of user traffic stays within the local workgroup,whereas 20 percent is destined for a remote resource in the campus network (like Internet…).

In contrast to end-to-end-VLAN, local VLAN follows the 20/80 rule: only 20 percent of traffic is local, whereas 80percent is destined to a remote re-source across the core layer -> A is correct.

(Reference: CCNP SWITCH 642-813 Official Certification Guide)

QUESTION 7Which of the following statements is true about the 80/20 rule (Choose two)?

A. 20 percent of the traffic on a network segment should be local.B. no more than 20 percent of the network traffic should be able to move across a backbone.C. no more than 80 percent of the network traffic should be able to move across a backbone. D. 80 percent of the traffic on a network segment should be local.

Correct Answer: BDSection: VLANExplanation

Explanation/Reference:The 80/20 rule states that 80 percent of user traffic stays within the local workgroup, whereas 20 percent isdestined for a remote resource in the campus network

QUESTION 8You are the network administrator at Company and switch R1 is configured as shown below:

interface GigabitEthernet0/1 switchport mode trunk switchport trunk encapsulation dot1q switchport trunk native vlan 5

If untagged frames are arriving on interface GigabitEthernet0/1 of R1, which of the following statement arecorrect?

Page 113: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Untagged frames are automatically assumed to be in VLAN 5.B. Untagged frames are defaulted to VLAN 1 traffic.C. Untagged frames are dropped because all packets are tagged when dot1q trunked.D. Untagged frames are determined on the other switchE. Untagged frames are not supported on 802.1Q trunks.

Correct Answer: ASection: VLAN TrunkingExplanation

Explanation/Reference:The “switchport trunk native vlan 5″ sets VLAN 5 to be the native VLAN so traffic to this VLAN will be untagged.Also untagged traffic are automatically assumed to be in VLAN 5 -> A is correct.

Note: The native VLAN must match on both sides of the trunk link for 802.1Q; otherwise the link will not work.

QUESTION 9What are three results of issuing the “switchport host” command? (Choose three)

A. disables EtherChannelB. enables port securityC. disables Cisco Discovery ProtocolD. enables PortFastE. disables trunkingF. enables loopguard

Correct Answer: ADESection: VLAN TrunkingExplanation

Explanation/Reference:Catalyst switches running Cisco IOS software support the macro command switchport host. The switchporthost macro command was designed to facilitate the configuration of switch ports that connect to end stations.Entering this command sets the switch port mode to access, enables spanning tree PortFast, and disableschannel grouping, all at the same time. The switchport host macro command can be used as an alternative tothe switchport mode access command.

(Reference: http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/Baseline_Security/sec_chap7.html)

QUESTION 10If you were to configure an ISL Ethernet trunk between two Cisco switches, named R1 and R2, what would youhave to include at the end of the link for the trunk to operate correctly? (Choose two)

A. An identical VTP mode.B. An identical speed/duplex.C. An identical trunk negotiation parameter.D. An identical trunk encapsulation parameter.

Correct Answer: BDSection: VLAN TrunkingExplanation

Page 114: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:One of the requirements for trunking to work is for speed and duplex to be the same on both sides. -> B iscorrect.

Maybe answer D wants to mention about encapsulation type (ISL or 802.1q) so it is an acceptable answer.

(Reference: http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_example09186a008014859e.shtml)

QUESTION 11Which three statements are correct with regard to the IEEE 802.1Q standard? (Choose three)

A. The IEEE 802.1Q frame format adds a 4 byte field to a Ethernet frame B. The packet is encapsulated with a 26 byte header and a 4 byte FCSC. The protocol uses point-to-multipoint connectivityD. The protocol uses point-to-point connectivityE. The IEEE 802.1Q frame uses multicast destination of 0×01-00-0c-00-00 F. The IEEE 802.1Q frame retains the original MAC destination address

Correct Answer: ADFSection: VLAN TrunkingExplanation

Explanation/Reference:There are two ways to implement Ethernet trunking:

* Inter-Switch Link Protocol (ISL, a Cisco proprietary protocol)* 802.1Q (IEEE standard)

In Cisco implementation, a trunk is a point-to-point link, although it is possible to use the 802.1Q encapsulationon an Ethernet segment shared by more than two devices. Such a configuration is seldom needed but is stillpossible with the disablement of DTP negotiation -> D is correct.

IEEE 802.1Q uses an internal tagging mechanism which inserts a 4-byte tag field in the original Ethernet frameitself between the Source Address and Type/Length fields -> A is correct.

QUESTION 12Refer to the exhibit. Why are users from VLAN 100 unable to ping users on VLAN 200?

Page 115: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Encapsulation on the switch is wrong.B. Trunking needs to be enabled on Fa0/1.C. The native VLAN is wrong.D. VLAN 1 needs the no shutdown command.E. IP routing needs to be enabled on the switch.

Correct Answer: BSection: VLAN TrunkingExplanation

Explanation/Reference:In this question, maybe the exhibit forgot to describe Fa0/1 is the port on the switch which is connected to therouter. To allow interVLAN routing between VLAN 100 and 200, this port must be configured as trunk port.

QUESTION 13What is the result of entering the command spanning-tree loopguard default?

A. The command enables both loop guard and root guard.B. The command changes the status of loop guard from the default of disabled to enabled.C. The command activates loop guard on point-to-multipoint links in the switched network.D. The command will disable EtherChannel guard.

Page 116: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BSection: STPExplanation

Explanation/Reference:This command is used in global configuration mode to enable loop guard on all ports of a given switch. Todisable it, use the “no” keyword at the beginning of this command.

QUESTION 14Refer to the exhibit. The service provider wants to ensure that switch S1 is the root switch for its own networkand the network of the customer. On which interfaces should root guard be configured to ensure that thishappens?

A. interfaces 1 and 2B. interfaces 1,2,3, and 4C. interfaces 1, 3, 5, and 6D. interfaces 5 and 6E. interfaces 5, 6, 7, and 8F. interfaces 11 and 12

Correct Answer: DSection: STPExplanation

Explanation/Reference:Let’s see what will happen if we set port 5 & 6 as “root guard” ports:

First, notice that the “root guard” command cannot be used on root switch (because this command is based onblocked port – while a root switch can’t have a blocked port -> two middle switches cannot become rootbridges.

Moreover, the neighbor switch which has its port connected with this “root guard” port can’t be the root bridge.For example if we configure port 6 as “root guard” port, the left-bottom switch (the switch with ports 3, 4) can’tbe root bridge because that will make port 6 root port. Therefore by configuring port 5 & 6 as “root guard” ports,two switches in the “Customer network” cannot become root bridge.

QUESTION 15

Page 117: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Examine the diagram. A network administrator has recently installed the above switched network using 3550sand would like to control the selection of the root bridge. Which switch should the administrator configure as theroot bridge and which configuration command must the administrator enter to accomplish this?

A. DSW11(config)# spanning-tree vlan 1 priority 4096B. DSW12(config)# set spanning-tree priority 4096C. ASW13(config)# spanning-tree vlan 1 priority 4096D. DSW11(config)# set spanning-tree priority 4096E. DSW12(config)# spanning-tree vlan 1 priority 4096F. ASW13(config)# set spanning-tree priority 4096

Correct Answer: ESection: STPExplanation

Explanation/Reference:First, only switches in Distribution section should become root bridge -> only DSW11 or DSW12 should bechosen.

The traffic passing root bridge is always higher than other switches so we should choose switch with highestspeed connection to be root bridge -> DSW12 with two 100Mbps connections should be chosen.

Also, the correct command to change priority value for a specific VLAN is spanning-treee vlan VLAN-ID priorityPriority-number.

QUESTION 16What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?

A. VLAN instance mapping and revision numberB. VLAN instance mapping and member listC. VLAN instance mapping, revision number, and member listD. VLAN instance mapping, revision number, member list, and timers

Correct Answer: ASection: STPExplanation

Page 118: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:MST maps multiple VLANs that have the same traffic flow requirements into the same spanning-tree instance.The main enhancement introduced by MST raises the problem, however, of determining what VLAN is to beassociated with what instance. More precisely, based on received BPDUs, devices need to identify theseinstances and the VLANs that are mapped to the instance.

To be part of a common MST region, a group of switches must share the same configuration attributes. Inparticular, the configuration name (or region name – 32 bits), revision number (16 bits), and VLAN mapping(associate VLANs with spanning-tree instances) need to be the same for all the switches within the sameregion.

An example of configuring MST on a switch is shown below:

QUESTION 17Which three items are configured in MST configuration submode? (Choose three)

A. Region nameB. Configuration revision numberC. VLAN instance mapD. IST STP BPDU hello timerE. CST instance mapF. PVST+ instance map

Correct Answer: ABCSection: STPExplanation

Explanation/Reference:

QUESTION 18Which three statements about the MST protocol (IEEE 802.1S) are true? (Choose three)

A. To verify the MST configuration, the show pending command can be used in MST configuration mode.B. When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.C. All switches in the same MST region must have the same VLAN-to-instance mapping, but different

Page 119: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

configuration revision numbers.D. All switches in an MST region, except distribution layer switches, should have their priority lowered from the

default value 32768.E. An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST

regions.F. Enabling MST with the “spanning-tree mode mst” global configuration command also enables RSTP.

Correct Answer: AEFSection: STPExplanation

Explanation/Reference:The show pending command can be used to verify the MST configuration (pending configuration). An exampleof this command is shown below:

Note:

The above commands do these tasks: + Enter MST configuration mode+ Map VLANs 10 to 20 to MST instance 1+ Name the region certprepare+ Set the configuration revision to 1+ Display the pending configuration+ Apply the changes, and return to global configuration mode

The MST region appears as a single bridge to spanning tree configurations outside the region -> a MST regionappears as a single virtual bridge to adjacent CST and MST regions -> E is correct.

By enabling MST you also enable RSTP because MST relies on the RSTP configuration to operate -> F iscorrect.

Page 120: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 19Which two statements concerning STP state changes are true? (Choose two)

A. Upon bootup, a port transitions from blocking to forwarding because it assumes itself as root.B. Upon bootup, a port transitions from blocking to listening because it assumes itself as root.C. Upon bootup, a port transitions from listening to forwarding because it assumes itself as root.D. If a forwarding port receives no BPDUs by the max_age time limit, it will transition to listening.E. If a forwarding port receives an inferior BPDU, it will transition to listening.F. If a blocked port receives no BPDUs by the max_age time limit, it will transition to listening.

Correct Answer: BFSection: STPExplanation

Explanation/Reference:

QUESTION 20Which statement correctly describes the Cisco implementation of RSTP?

A. PortFast, UplinkFast, and BackboneFast specific configurations are ignored in Rapid PVST mode.B. RSTP is enabled globally and uses existing STP configuration.C. Root and alternative ports transition immediately to the forwarding state.D. Convergence is improved by using sub-second timers for the blocking, listening, learning, and forwarding

port states.

Correct Answer: BSection: STPExplanation

Explanation/Reference:To turn on RSTP, use this command in global configuration mode:

switch(config)# spanning-tree mode rapid-pvst

QUESTION 21The network administrator maps VLAN 10 through 20 to MST instance 2. How will this information bepropagated to all appropriate switches?

A. Information will be carried in the RSTP BPDUs.B. It will be propagated in VTP updates.C. Information stored in the Forwarding Information Base and the switch will reply on query.D. Multiple Spanning Tree must be manually configured on the appropriate switches.

Correct Answer: DSection: STPExplanation

Explanation/Reference:

QUESTION 22

Page 121: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Which MST configuration statement is correct?

A. MST configurations can be propagated to other switches using VTP.B. After MST is configured on a Switch, PVST+ operations will also be enabled by default.C. MST configurations must be manually configured on each switch within the MST region.D. MST configurations only need to be manually configured on the Root Bridge.E. MST configurations are entered using the VLAN Database mode on Cisco Catalyst switches.

Correct Answer: CSection: STPExplanation

Explanation/Reference:

QUESTION 23Switch R1 is configured to use the VLAN Trunking Protocol (VTP). What does R1 advertise in its VTP domain?

A. The VLAN ID of all known VLANs, the management domain name, and the total number of trunk links onthe switch.

B. The VLAN ID of all known VLANs, a 1-bit canonical format (CF1 Indicator), and the switch configurationrevision number.

C. The management domain name, the switch configuration revision number, the known VLANs, and theirspecific parameters.

D. A 2-byte TPID with a fixed value of 0×8100 for the management domain number, the switch configurationrevision number, the known VLANs, and their specific parameters

Correct Answer: CSection: VTPExplanation

Explanation/Reference:VTP advertises its management domain name, the switch configuration revision number, the known VLANs,and their specific parameters -> C is correct.

Note: IEEE 802.1Q VLAN (not VTP) tag uses the tag protocol identifier (TPID) field to identify the protocol type.The Default TPID value in IEEE 802.1Q, is 0×8100 -> D is not correct.

QUESTION 24Which two statements correctly describe VTP? (Choose two.)

A. Transparent mode always has a configuration revision number of 0.B. Transparent mode cannot modify a VLAN database.C. Client mode cannot forward received VTP advertisements.D. Client mode synchronizes its VLAN database from VTP advertisements.E. Server mode can synchronize across VTP domains.

Correct Answer: ADSection: VTPExplanation

Explanation/Reference:

Page 122: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 25What action should a network administrator take to enable VTP pruning on an entire management domain?

A. Enable VTP pruning on any switch in the management domain.B. Enable VTP pruning on any client switch in the management domain.C. Enable VTP pruning on a VTP server in the management domain.D. Enable VTP pruning on every switch in the management domain.E. Disable VTP pruning on a VTP server in the management domain.

Correct Answer: CSection: VTPExplanation

Explanation/Reference:VTP pruning should only be enabled on VTP servers, all the clients in the VTP domain will automatically enableVTP pruning -> C is correct.

QUESTION 26What must be configured on a Cisco switch in order to advertise VLAN information?

A. VTP modeB. VTP passwordC. VTP revision numberD. VTP pruningE. VTP domain name

Correct Answer: ESection: VTPExplanation

Explanation/Reference:A Cisco switch needs a VTP domain name to advertise VLAN information to other switches and it must beconfigured on a Cisco switch.

Note: If a switch is configured as a VTP server without a VTP domain name, you cannot configure a VLAN onthe switch

QUESTION 27Which two statements about VLAN hopping are true? (Choose two)

A. Attacks are prevented by utilizing the port-security feature.B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q

encapsulation.C. Configuring an interface with the “switchport mode dynamic” command will prevent VLAN hopping.D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q

encapsulation.E. Configuring an interface with the “switchport mode access” command will prevent VLAN hopping.

Page 123: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: BESection: VLAN HoppingExplanation

Explanation/Reference:

QUESTION 28Refer to the exhibit. What type of attack is being defended against?

A. Snooping attack B. Rogue device attack C. STP attack D. VLAN attackE. Spoofing attackF. MAC flooding attack

Correct Answer: ESection: DHCP SnoopingExplanation

Explanation/Reference:DHCP snooping is a method used to defend DHCP spoofing.

QUESTION 29Refer to the exhibit. Dynamic ARP inspection (DAI) is enabled on switch SW_A only. Both Host_A and Host_Bacquire their IP addresses from the DHCP server connected to switch SW_A. What would the outcome be ifHost_B initiated an ARP spoof attack toward Host_A?

Page 124: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The spoof packets will be inspected at the ingress port of switch SW_A and will be permitted.B. The spoof packets will not be inspected at the ingress port of switch SW_A and will be permitted.C. The spoof packets will not be inspected at the ingress port of switch SW_A and will be dropped.D. The spoof packets will be inspected at the ingress port of switch SW_A and will be dropped.

Correct Answer: BSection: Dynamic ARP Inspection DAIExplanation

Explanation/Reference:Port Fa0/23 of SW_A is configured as trusted port while DAI is not enabled on SW_B so if Host_B sends spoofpackets, SW_B and SW_A will not inspect and forward them.

QUESTION 30Which of the following should you enable to prevent a switch from forwarding packets with source addressesthat are outside an administratively defined group? (Select the best answer)

A. DAIB. STP

Page 125: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. PVLAND. port security

Correct Answer: DSection: Port SecurityExplanation

Explanation/Reference:When you assign secure MAC addresses to a secure port, the port does not forward ingress traffic that hassource addresses outside the group of defined addresses.

The example below configures secure MAC address 0000.1234.5678. Only traffic from this MAC is forwarded.

Switch(config)# interface fastethernet 0/1Switch(config-if)# switchport mode accessSwitch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address 0000.1234.5678

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)

QUESTION 31What are two methods of mitigating MAC address flooding attacks? (Choose two)

A. Place unused ports in a common VLAN.B. Implement private VLANs.C. Implement DHCP snooping.D. Implement port security.E. Implement VLAN access maps.

Correct Answer: DESection: Port SecurityExplanation

Explanation/Reference:MAC flooding attack is a technique in which the attacker floods the switch with packets, each containingdifferent source MAC address. This makes the switch learn the MAC addresses until its memory is used up.Now the switch acts like a hub, in which all incoming packets are broadcast out on all ports instead of just to thecorrect destination port as normal operation. The attacker can listen to these broadcast packets and capturesensitive data.

To protect against this type of attack, port security feature can be used to limit and allow specific MAC toaccess the port. VLAN Access map with a “mac access list” can also be used to filter MAC -> D & E arecorrect.

QUESTION 32Given the configuration on a switch interface, what happens when a host with the MAC address of0003.0003.0003 is directly connected to the switch port?

Page 126: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The host will be allowed to connect.B. The port will shut down.C. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.D. The host will be refused access.

Correct Answer: ASection: Port SecurityExplanation

Explanation/Reference:The maximum number of hosts allowed to connect is set to 2. One of them is specified as MAC0002.0002.0002 so another MAC can be allowed to connect.

QUESTION 33Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. Forsecurity reasons, the servers should not communicate with each other, although they are located on the samesubnet. The servers do need, however, to communicate with a database server located in the inside network.What configuration will isolate the servers from each other?

A. The switch ports 3/1 and 3/2 will be defined as secondary VLAN community ports. The ports connecting tothe two firewalls will be defined as primary VLAN promiscuous ports.

B. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as primary VLANpromiscuous ports.

C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as primary VLANcommunity ports.

D. The switch ports 3/1 and 3/2 will be defined as secondary VLAN isolated ports. The ports connecting to thetwo firewalls will be defined as primary VLAN promiscuous ports.

Correct Answer: DSection: Private VLANExplanation

Explanation/Reference:WS_1 and WS_2 cannot communicate with each other so we can put them into isolated ports. Isolated portscan only communicate with promiscuous ports so Fa3/34 and Fa3/35 should be promiscuous ports so that theycan send and receive data with the Data Server.

Page 127: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Note: Answer A is not clear because it does not state the switch ports 3/1 and 3/2 are put into the same ordifferent VLAN community ports. If they are put into different VLAN communities then answer A is correct.

QUESTION 34A switch has been configured with Private VLANs. With that type of PVLAN port should the default gateway beconfigured?

A. TrunkB. IsolatedC. ¨PrimaryD. CommunityE. Promiscuous

Correct Answer: ESection: Private VLANExplanation

Explanation/Reference:A default gateway should be configured Promiscuous type so that all devices in PVLAN can go outside.

QUESTION 35Refer to the exhibit. On the basis of the information that is generated by the show commands, which twoEtherChannel statements are true? (Choose two)

Page 128: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Interfaces FastEthernet 0/1 and 0/2 have been configured with the channel-group 1 mode desirablecommand.

B. Interfaces FastEthernet 0/3 and 0/4 have been configured with the no switchport command.C. Interface Port-Channels 1 and 2 have been assigned IP addresses with the ip address commands.D. Port-Channels 1 and 2 are providing two 400 Mbps EtherChannels.E. Port-Channels 1 and 2 are capable of combining up to 8 FastEthernet ports to provide full-duplex bandwidth

of up to 16 Gbps between a switch and another switch or host.F. Switch SW1 has been configured with a Layer 3 EtherChannel.

Correct Answer: ADSection: EtherChannelExplanation

Explanation/Reference:In fact answer A is not totally correct because two ports Fa0/1 & Fa0/2 of Sw1 can use the “channel-group 1mode auto” command while the peer ports use the “channel-group 1 mode desirable” command. But maybe it

Page 129: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

is the best choice in this case.

Answer B is not correct because this is a Layer 2 EtherChannel (from the lines “Po1 (SU)” & “Group state =L2″) but the “no switchport” is only used to configure Layer 3 EtherChannel.

Answer C is not correct because the port-channel is automatically created in a Layer 2 EtherChannel.

In this case we can see the ports are FastEthernet ports -> Port-Channels 1 and 2 are capable of combining upto 8 FastEthernet ports to provide full-duplex bandwidth of up to 1.6 Gbps (8 links of FastEthernet ports), not 16Gbps. Port-Channels can provide up to 16 Gbps if they group 8 links of GigabitEthernet -> E is not correct.

SW1 has been configured with a Layer 2 EtherChannel (from the lines “Po1 (SU)” & “Group state = L2″) -> F isnot correct.

Usually the EtherChannel protocol is shown when using the “show etherchannel summary” command (after the“Port-channel” column) but in this case we see no “protocol” column so we can assume it uses the defaultEtherChannel protocol PAgP.

There are 2 ports in each group so there are 4 Ethernet ports in total -> 4 x 100Mbps = 400Mbps in full duplex(which means “two 400 Mbps EtherChannels” in answer D) -> D is correct.

QUESTION 36Study the exhibit carefully. Both host stations are part of the same subnet but are in different VLANs. On thebasis of the information presented in the exhibit, which statement is true about an attempt to ping from host tohost?

A. Layer 3 device is needed for the ping command to be successful.B. A trunk port will need to be configured on the link between SA and SB for the ping command to be

successful. C. The two different hosts will need to be in the same VLAN in order for the ping command to be successful.D. The ping command will be successful without any further configuration changes.

Page 130: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Correct Answer: DSection: InterVLAN RoutingExplanation

Explanation/Reference:For two hosts in different VLANs, we must use a layer 3 device to transport packages between them. However,in this case both switches are set in “access” mode therefore the VLAN information sent between them will beset as untagged. Moreover, they are in the same subnet so they can ping each other without a layer 3 device.

QUESTION 37CEF is a complete new routing switch technology . Which two table types are CEF components?(Choose two)

A. adjacency tablesB. caching tablesC. neighbor tablesD. forwarding information base

Correct Answer: ADSection: InterVLAN RoutingExplanation

Explanation/Reference:

QUESTION 38Study the exhibit carefully, then tell me what is the problem with this configuration?

Page 131: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Spanning tree PortFast cannot be configured on a port where a voice VLAN is configured.B. The switch port must be configured as a trunk.C. Sticky secure MAC addresses cannot be used on a port when a voice VLAN is configured.D. Spanning tree PortFast cannot be configured on a port when a sticky secure MAC address is used.

Correct Answer: CSection: Voice SupportExplanation

Explanation/Reference:

QUESTION 39What three tasks must a network administrator perform to properly configure Hot Standby Routing Protocol(HSRP)? (Choose three)

A. Define the encapsulation type.B. Define the standby router.C. Define the standby IP address.D. Enable the standby priority.

Correct Answer: BCDSection: HSRPExplanation

Explanation/Reference:

QUESTION 40You want to allow Router R1 to immediately become the active router if its priority is highest than the activerouter fails. What command would you use if you wanted to configure this?

A. en standby 1 preemptB. standby 1 preempt enableC. standby 1 preemptD. hot standby 1 preempt

Correct Answer: CSection: HSRPExplanation

Explanation/Reference:

QUESTION 41Routers R1 and R2 are configured for HSRP as shown below:

Page 132: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice very frequentHSRP group state transitions. What is the most likely cause of this?

A. physical layer issuesB. no spanning tree loopsC. use of non-default HSRP timersD. failure to set the command standby 35 preempt

Correct Answer: ASection: HSRPExplanation

Explanation/Reference:Both routers are not configured with the “preempt” command so by default they only take over the active statewhen they believe there is no active router (by default they don’t hear 3 successive hello messages from theactive router). Therefore the most likely cause of this problem is a link failure between them (physical layerissue) -> A is correct.

QUESTION 42In which three HSRP states do routers send hello messages? (Choose three)

A. LearnB. SpeakC. StandbyD. ListenE. ActiveF. Remove

Correct Answer: BCESection: HSRPExplanation

Page 133: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:Speak state: sends hello messages to compete for the standby or active role.Standby state: send hello messages to inform it is the standby router so that other routers (which are notactive or standby router, in listen state) know the standby router is still there.Active state: sends hello messages to indicate it is still up

QUESTION 43In the hardware address 0000.0c07.ac0a, what does 07.ac represent?

A. HSRP well-known physical MAC addressB. Vendor codeC. HSRP router number D. HSRP group numberE. HSRP well-known virtual MAC address

Correct Answer: ESection: HSRPExplanation

Explanation/Reference:The HSRP standby IP address is a virtual MAC address which is composed of 0000.0c07.ac**. In which “**” isthe HSRP group number in hexadecimal.

QUESTION 44Refer to the exhibit. Which two problems are the most likely cause of the exhibited output? (Choose two)

A. Transport layer issuesB. VRRP misconfigurationC. HSRP misconfigurationD. Physical layer issuesE. Spanning tree issues

Correct Answer: CDSection: HSRPExplanation

Explanation/Reference:When you see this error, it means the local router fails to receive HSRP hellos from neighbor router. Two thingsyou should check first are the physical layer connectivity and verify the HSRP configuration. An example ofHSRP misconfiguration is the mismatched of HSRP standby group and standby IP address.

Page 134: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Another thing you should check is the mismatched VTP modes.

(Reference: http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094afd.shtml)

QUESTION 45Which two statements are true about the Hot Standby Router Protocol (HSRP)? (Choose two)

A. Load sharing with HSRP is achieved by creating multiple subinterfaces on the HSRP routers. B. Routers configured for HSRP can belong to multiple groups and multiple VLANs.C. Load sharing with HSRP is achieved by creating HSRP groups on the HSRP routers.D. All routers configured for HSRP load balancing must be configured with the same priority.E. Routers configured for HSRP must belong to only one group per HSRP interface.

Correct Answer: BCSection: HSRPExplanation

Explanation/Reference:B is correct according to http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1/configuration/guide/swhsrp.html

To load sharing with HSRP, we can divide traffic into two HSRP groups:

+ One group assigns the active state for one switch+ The other group assigns the active state for the other switch

The example below shows how to load sharing with HSRP:

In this topology, R1 is the active router for Group 1 and is the standby router for Group 2 while R2 is the active

Page 135: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

router for Group 2 and is the standby router for Group 1. The configurations of R1 and R2 are shown below:

-> C is correct.

Note: An interface can belong to multiple HSRP groups, and the same HSRP group can be applied to differentinterfaces -> E is not correct.

QUESTION 46

You work as a network engineer at Certprepare.com. You study the exhibit carefully. Which GLBP device hostsreceive the MAC address assignment?

A. R1B. R2

Page 136: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

C. The AVGD. The AVF

Correct Answer: DSection: GLBPExplanation

Explanation/Reference:Notice that the MAC address of the AVF is not the physical MAC address of R1 or R2. It is a virtual MACaddress used in GLBP and is used by hosts to send traffic to these routers.

QUESTION 47Refer to the exhibit. Host A has sent an ARP message to the default gateway IP address 10.10.10.1. Whichstatement is true?

A. DSw2 will reply with the IP address of the next AVF.B. DSw1 will reply with the MAC address of the next AVF.C. Because of the invalid timers that are configured, DSw1 will not reply.D. DSw1 will reply with the IP address of the next AVF.E. Because of the invalid timers that are configured, DSw2 will not reply.F. DSw2 will reply with the MAC address of the next AVF.

Correct Answer: FSection: GLBPExplanation

Explanation/Reference:The priorities of two switches are equal so GLBP uses IP address of that interface to choose the AVG -> DSw2wins the election because of higher real IP address and become the AVG. Therefore it will reply all the

Page 137: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

incoming ARP Requests with the MAC address of the next AVF (DSw1 and DSw2 alternately in this case.

QUESTION 48You are a network technician, do you know which three statements are correct about a default HSRPconfiguration? (Choose three)

A. The Standby track interface priority is 10.B. The Standby priority is 100.C. The Standby hold time is 10 seconds.D. Two HSRP groups are configured.

Correct Answer: ABCSection: Gateway RedundancyExplanation

Explanation/Reference:

QUESTION 49You work as a network technician at Technical Corporation. Your boss is interested in GLBP. Study the networktopology exhibit carefully. Which three statements accurately describe this GLBP topology? (Choose three)

Page 138: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. If RA becomes unavailable, RB will forward packets sent to the virtual MAC address of RA.B. RA is responsible for answering ARP requests sent to the virtual IP address.C. If another router were added to this GLBP group, there would be two backup AVGs.D. RA alternately responds to ARP requests with different virtual MAC addresses.

Correct Answer: ABDSection: Gateway RedundancyExplanation

Explanation/Reference:If RA fails, the GLBP protocol informs RB to replace the AVG that is down. The new AVG (in this case RB) willforward the packet sent to the 0008.b400.0101 virtual mac address, so the client sees no disruption of servicenor does it need to resolve a new MAC address for the default gateway. -> A is correct.

RA, which is the AVG, replies to the ARP requests from clients with different virtual MAC addresses, thusachieving load balancing -> B is correct.

RA is elected as the AVG and RB is elected as the standby virtual gateway. If another router is added to thisGLBP group, it will become a backup AVG -> there is only one backup AVG -> C is not correct.

“RA alternately responds to ARP requests with different virtual MAC addresses” this is the way GLBP providesload balancing over multiple routers (gateways) using a single virtual IP address and multiple virtual MACaddresses. Which MAC address it returns depends on which load-balancing algorithm it is configured to use ->D is correct.

QUESTION 50In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations. Whichthree WLAN statements are true? (Choose three)

A. A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN.B. Ad hoc mode allows mobile clients to connect directly without an intermediate AP.C. A lightweight AP receives control and configuration from a WLAN controller to which it is associated.D. WLANs are designed to share the medium and can easily handle an increased demand of channel

contention.

Correct Answer: ABCSection: WirelessExplanation

Explanation/Reference:

QUESTION 51Currently in draft status at the IETF, LWAPP outlines a standard protocol to be used by switches or routers tocontrol a group of IEEE 802.11 wireless LAN access points and make their deployment much simpler than ispossible today. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?

A. The processing of 802.11 data and management protocols and access point capabilities is distributedbetween a lightweight access point and a centralized WLAN controller.

B. LWAPP authenticates all access points in the subnet and establishes a secure communication channel witheach of them.

C. LWAPP advertises its WDS capability and participates in electing the best WDS device for the wirelessLAN.

Page 139: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

D. LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.

Correct Answer: ASection: WirelessExplanation

Explanation/Reference:

Page 140: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Exam E

QUESTION 1Study the diagram below carefully, which three statements are true? (Choose three)

A. DTP packets are sent from Switch SB. B. DTP is not running on Switch SA.C. A trunk link will be formed.D. The native VLAN for Switch SB is VLAN 1.

Correct Answer: ACDSection: VLAN VTP STPExplanation

Explanation/Reference:Dynamic Trunking Protocol (DTP) is the Cisco-proprietary that actively attempts to negotiate a trunk linkbetween two switches. If an interface is set to switchport mode dynamic desirable, it will actively attempt toconvert the link into trunking mode. If the peer port is configured as switchport mode trunk, dynamic desirable,or dynamic auto mode, trunking is negotiated successfully -> C is correct.

SB is in “dynamic desirable” mode so it will send DTP packets to SA to negotiate a trunk link -> A is correct.

On an 802.1Q trunk, DTP packets are sent on the native VLAN. By default, it is VLAN 1 (notice that SA’s nativeVLAN is 5) -> D is correct.

(Note: an 802.1Q trunk’s native VLAN is the only VLAN that has untagged frames)

Below is the switchport modes for easy reference:

Mode FunctionDynamic Auto Creates the trunk based on the DTP request from the neighboring switch.Dynamic Desirable Communicates to the neighboring switch via DTP that the interface would like to become a trunk if the neighboring switch interface is able to become a trunk.Trunk Automatically enables trunking regardless of the state of the neighboring switch and regardless of any DTP requests sent from the neighboring switch.Access Trunking is not allowed on this port regardless of the state of the neighboring switch interface and regardless of any DTP requests sent from the neighboring switch.Nonegotiate Prevents the interface from generating DTP frames. This command can be used only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link.

Page 141: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 2Which two statements are true about best practices in VLAN design? (Choose two.)

A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at thedistribution layer.

B. Routing may be performed at all layers but is most commonly done at the core and distribution layers.C. Routing should not be performed between VLANs located on separate switches.D. VLANs should be local to a switch.E. VLANs should be localized to a single switch unless voice VLANs are being utilized.

Correct Answer: BDSection: VLANExplanation

Explanation/Reference:First let’s review main characteristics of three layers in a campus network:

* Access layer:

+ Low cost per switch port+ High port density+ Scalable uplinks to higher layers+ User access functions such as VLAN membership, traffic and protocol filtering, and quality of service (QoS)+ Resiliency through multiple uplinks

* Distribution Layer:

+ Aggregation of multiple access-layer devices+ High Layer 3 throughput for packet handling+ Security and policy-based connectivity functions through access lists or packet filters+ QoS features+ Scalable and resilient high-speed links to the core and access layers

* Core layer:

+ Very high throughput at Layer 3+ No costly or unnecessary packet manipulations (access lists, packet filtering)+ Redundancy and resilience for high availability+ Advanced QoS functions

We can see at Distribution and Core layers, Layer 3 throughput (routing) is very high -> B is correct.

Nowadays, end-to-end VLANs are not recommended in an enterprise network, unless there is a good reason.In an end-to-end VLAN, broadcast traffic is carried over from one end of the network to the other, creating thepossibility for a broadcast storm or Layer 2 bridgingloop to spread across the whole extent of a VLAN. This can exhaust the bandwidth of distribution and core-layer links, as well as switch CPU resources. Now the storm or loop has disrupted users on the end-to-endVLAN, in addition to users on other VLANs that mightbe crossing the core.

When such a problem occurs, troubleshooting becomes more difficult. In other words, the risks of end-to-endVLANs outweigh the convenience and benefits.

From that we can infer VLAN traffic should be local to the switch -> D is correct.

(Reference: CCNP SWITCH 642-813 Official Certification Guide)

Page 142: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 3

Refer to the exhibit. The user who is connected to interface FastEthernet 0/1 is on VLAN 10 and cannot accessnetwork resources. On the basis of the information in the exhibit, which command sequence would correct theproblem?

A. SW1(config)# vlan 10SW1(config-vlan)# no shutdown

B. SW1(config)# interface fastethernet 0/1 SW1(config-if)# switchport mode accessSW1(config-if)# switchport access vlan 10

C. SW1(config)# interface fastethernet 0/1 SW1(config-if)# switchport mode access

D. SW1(config)# vlan 10SW1(config-vlan)# state active

E. SW1(config)# interface fastethernet 0/1 SW1(config-if)# no shut

Correct Answer: ESection: VLANExplanation

Page 143: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Explanation/Reference:

QUESTION 4Refer to the exhibit. On the basis of the output generated by the show commands, which two statements aretrue? (Choose two)

A. Interface gigabitethernet 0/1 has been configured as Layer 3 ports.B. Interface gigabitethernet 0/1 does not appear in the show vlan output because switchport is enabled.C. Interface gigabitethernet 0/1 does not appear in the show vlan output because it is configured as a trunk

interface.

Page 144: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

D. VLAN2 has been configured as the native VLAN for the 802.1q trunk on interface gigabitethernet 0/1.E. Traffic on VLAN 1 that is sent out gigabitethernet 0/1 will have an 802.1q header applied.F. Traffic on VLAN 2 that is sent out gigabitethernet 0/1 will have an 802.1q header applied.

Correct Answer: CFSection: VLANExplanation

Explanation/Reference:From the output of show interface gigabitethernet 0/1 switchport command we can see this port is currentlyconfigured as trunked port (Operational Mode: trunk) and uses 802.1q encapsulation. So surely the “show vlan”command will not list this port -> C is correct.

Also from the first output we learned the native VLAN is VLAN 1 (Trunking Native Mode VLAN:1) so only trafficfrom this VLAN is sent untagged -> traffic sent from VLAN 2 out this port will have an 802.1q header applied ->F is correct.

QUESTION 5When you issue a command show port 3/1 on an Ethernet port, you observe the ‘Giants’ column has a non-zero entry. What could cause of this?

A. IEEE 802.1QB. IEEE 802.10C. Misconfigured NIC D. User configurationE. All of the above

Correct Answer: ASection: VLANExplanation

Explanation/Reference:Generally, frames that are greater than 1522 bytes are categorized as giant frames (notice that a normalEthernet frame has a size that ranges from 64 bytes to 1518 bytes). Giant frames often are the result of someprotocol-tagging mechanisms, for example 802.1Q frames (1522 bytes), MPLS (1518 + 4 * n, where n is thenumber of stacked labels), ISL frames (1548 bytes).

There are nothing wrong with giant frames, just make sure you configure both end devices to support theseframes.

Note: In fact, frames that are created by 802.1Q are often known as baby giants (frames that are slightly largerthan 1518 bytes).

QUESTION 6You want to configure a switched internetwork with multiple VLANs as shown above. Which of the followingcommands should you issue on SwitchA for the port connected to SwitchB?

Page 145: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. switchport mode trunkB. switchport access vlan 5C. switchport mode access vlan 5D. switchport trunk native vlan 5

Correct Answer: ASection: VLANExplanation

Explanation/Reference:To support interVLAN routing, the links between two switches must be configured as trunk link.

QUESTION 7Refer to the exhibit. VLAN 1 and VLAN 2 are configured on the trunked links between Switch A and Switch B.Port Fa 0/2 on Switch B is currently in a blocking state for both VLANs. What should be done to load balanceVLAN traffic between Switch A and Switch B?

A. Lower the port priority for VLAN 1 on port 0/1 for Switch A.B. Lower the port priority for VLAN 1 on port 0/2 for Switch A.C. Make the bridge ID of Switch B lower than the ID of Switch A.D. Enable HSRP on the access ports.

Correct Answer: BSection: VLANExplanation

Explanation/Reference:

QUESTION 8

Page 146: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

What is the effect of applying the “switchport trunk encapsulation dot1q” command to a port on a Cisco Catalystswitch?

A. By default, native VLAN packets going out this port will be tagged.B. Without an encapsulation command, 802.1Q will be the default encapsulation if DTP fails to negotiate a

trunking protocol.C. The interface will support the reception of tagged and untagged traffic.D. If the device connected to this port is not 802.1Q-enabled, it will not be able to handle 802.1Q packets.

Correct Answer: CSection: VLAN TrunkingExplanation

Explanation/Reference:The “switchport trunk encapsulation dot1q” command configures trunk encapsulation as 802.1q, whichsupports the reception of tagged and untagged traffic -> C is correct.

Note: If your switch does not accept this command, try to enter “switchport” command first to configure theinterface as a Layer 2 port.

QUESTION 9Two Company switches are connected via a trunk link. In this network, the original frame is encapsulated andan additional header is added before the frame is carried over a trunk link. At the receiving end, the header isremoved and the frame is forwarded to the assigned VLAN. This describes which technology?

A. DISLB. ISLC. DTPD. IEEE 802.1QE. MPLS

Correct Answer: BSection: VLAN TrunkingExplanation

Explanation/Reference:Unlike 8021.q, ISL keeps the original frame unchanged. It only adds another header to that frame beforesending out over a trunk link.

QUESTION 10Which of the following trunking modes are unable to request their ports to convert their links into trunk links?(Choose two)

A. NegotiateB. DesignateC. NonegotiateD. AutoE. ManualF. Off

Correct Answer: CD

Page 147: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Section: VLAN TrunkingExplanation

Explanation/Reference:he mode auto (dynamic auto) causes the device not to send DTP Request but wait for DTP Request fromneighboring device.

By using and switchport mode trunk and switchport nonegotiate commands, we can enable trunking to a devicethat does not support DTP. But notice that the switchport nonegotiate command causes the device not to sendDTP Request frames.

Therefore both “auto” and “nonegotiate” modes makes the switch not to send request (which is “unable toconvert their links into trunk links”) -> C and D are correct.

QUESTION 11

You administer the network shown above. You issue the show interfaces trunk command on SwitchA andreceive the following output:

Which of the following statements is true regarding VLAN 32?

A. VLAN 32 is not allowed on the trunk port.B. VLAN 32 is not active on the switch.C. Traffic from VLAN 32 is not being sent over the trunk port.D. Traffic from VLAN 32 is not restricted to only the trunk ports that require it.

Correct Answer: CSection: VLAN TrunkingExplanation

Explanation/Reference:In the “Vlans in spanning tree forwarding state and not pruned” VLAN 32 is not listed so we can conclude thattraffic from vlan 32 can't be forwarded.

QUESTION 12

Page 148: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Which statement is true regarding the configuration of ISL trunks?

A. A Catalyst switch cannot have ISL and IEEE 802.1q trunks enabled.B. All Catalyst switches support ISL trunking.C. A Catalyst switch will report giants if one side is configured for ISL while the other side is not.D. ISL trunking requires that native VLANs match.

Correct Answer: CSection: VLAN TrunkingExplanation

Explanation/Reference:First you should know “giant” frames are frames that exceed the maximum IEEE 802.3 frame size (usuallygreater then 1518 bytes). As you know, ISL does not modify the original Ethernet frame it received but it addsanother outer header. In particular, it uses a 26 byte header and 4 byte FCS (30 bytes in total).

But a normal Ethernet frame itself can have a maximum size of 1518 bytes. Therefore an Ethernet frame canbe up to 1518 + 30 = 1548 bytes, which creates a “giant”.

That is why both ends must be configured as ISL trunks because only ISL-aware devices are able to read it.

QUESTION 13While logged into a Company switch you issue the following command:

CompanySwitch(config-mst)#instance 10 vlan 11-12

What does this command accomplish?

A. It enables a PVST+ instance of 10 for vlan 11 and vlan 12B. It enables vlan 11 and vlan 12 to be part of the MST region 10C. It maps vlan 11 and vlan 12 to the MST instance of 10.D. It creates an Internal Spanning Tree (1ST) instance of 10 for vlan 11 and vlan 12E. It create a Common Spanning Tree (CST) instance of 10 for vlan 11 and vlan 12F. It starts two instances of MST, one instance for vlan 11 and another instance for vlan 12.

Correct Answer: CSection: STPExplanation

Explanation/Reference:MST maps multiple VLANs that have the same traffic flow requirements into the same spanning-tree instance.The main enhancement introduced by MST raises the problem, however, of determining what VLAN is to beassociated with what instance. More precisely, based on received BPDUs, devices need to identify theseinstances and the VLANs that are mapped to the instance.

An example of configuring MST on a switch is shown below:

Page 149: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Note: To be part of a common MST region, a group of switches must share the same configuration attributes.In particular, the configuration name (or region name – 32 bits), revision number (16 bits), and VLANmapping (associate VLANs with spanning-tree instanc es) need to be the same for all the switches withinthe same region.

QUESTION 14By default, all VLANs will belong to which MST instance when using Multiple STP?

A. MST00B. MST01C. the last MST instance configuredD. none

Correct Answer: ASection: STPExplanation

Explanation/Reference:By default, all VLANs are assigned to MST instance 0. Instance 0 is known as the Internal Spanning-Tree (IST),which is reserved for interacting with other Spanning-Tree Protocols (STPs) and other MST regions.

QUESTION 15What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive aBPDU from its neighbor for three consecutive hello time intervals?

A. RSTP information is automatically aged out.B. The port sends a TCN to the root bridge.C. The port moves to listening state,D. The port becomes a normal spanning tree port.

Correct Answer: ASection: STPExplanation

Explanation/Reference:In STP 802.1D, a non-root bridge only generates BPDUs when it receives one on the root port. But in RSTP

Page 150: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

802.1w, a bridge sends a BPDU with its current information every hello-time seconds (2 by default), even if itdoes not receive any from the root bridge. Also, on a given port, if hellos are not received three consecutivetimes, protocol information can be immediately aged out (or if max_age expires). Because of the previouslymentioned protocol modification, BPDUs are now used as a keep-alive mechanism between bridges. A bridgeconsiders that it loses connectivity to its direct neighbor root or designated bridge if it misses three BPDUs in arow. This fast aging of the information allows quick failure detection. If a bridge fails to receive BPDUs from aneighbor, it is certain that the connection to that neighbor is lost. This is opposed to 802.1D where the problemmight have been anywhere on the path to the root.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml)

QUESTION 16A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that thisport does not erroneously transition to the forwarding state, which command should be configured to satisfy therequirement?

A. Switch(config)#spanning-tree loopguard defaultB. Switch(config-if)#spanning-tree bpdufilterC. Switch(config)#udld aggressive D. Switch(config-if)#spanning-tree bpduguard

Correct Answer: ASection: STPExplanation

Explanation/Reference:Loop guard prevents alternate or root ports from becoming the designated port due to a failure that could leadto a unidirectional link. An example is shown below:

Suppose S1 is the root bridge. S3′s port connected with S2 is currently blocked. Because of unidirectional linkfailure on the link between S2 and S3, S3 is not receiving BPDUs from S2.

Without loop guard, the blocking port on S3 will transition to listening (upon max age timer expiration) ->learning -> forwarding state which create a loop.n

With loop guard enabled, the blocking port on S3 will transition into the STP loop-inconsistent state uponexpiration of the max age timer. Because a port in the STP loop-inconsistent state will not pass user traffic, noloop is created. The loop-inconsistent state is effectively equal to the blocking state.

Page 151: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

To enable loop guard globally use the command spanning-tree loopguard default.

QUESTION 17You are the administrator of a switch and currently all host-connected ports are configured with the portfastcommand. You have received a new directive from your manager that states that, in the future, any host-connected port that receives a BPDU should automatically disable PortFast and begin transmitting BPDUs.Which of the following commands will support this new requirement?

A. Switch(config)# spanning-tree portfast bpduguard defaultB. Switch(config-if)# spanning-tree bpduguard enableC. Switch(config-if)# spanning-tree bpdufilter enableD. Switch(config)# spanning-tree portfast bpdufilter default

Correct Answer: DSection: STPExplanation

Explanation/Reference:The bpdufilter option feature is used to globally enable BPDU filtering on all Port Fast-enabled interfaces andthis prevent the switch interfaces connected to end stations from sending or receiving BPDUs.

Note: The spanning-tree portfast bpdufilter default global configuration command can be overridden by thespanning-tree bdpufilter enable command in interface mode.

QUESTION 18Which two statements correctly describe characteristics of the PortFast feature? (Choose two)

A. STP will be disabled on the portB. PortFast can also be configured on trunk ports.C. PortFast is required to enable port-based BPDU guard.D. PortFast is used for both STP and RSTP host ports.E. PortFast is used for STP-only host ports.

Correct Answer: BDSection: STPExplanation

Explanation/Reference:You can use PortFast on switch or trunk ports connected to a single workstation, switch, or server to allowthose devices to connect to the network immediately, instead of waiting for the port to transition from thelistening and learning states to the forwarding state -> B is correct.

Also, PortFast can be used for both STP and RSTP -> D is correct.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst4000/7.4/configuration/guide/stp_enha.html)

Answer C is not correct because BPDU guard can be enabled without PortFast. But what will happen if thePortFast and BPDU guard features are configured on the same port?

Well, at the reception of BPDUs, the BPDU guard operation disables the port that has PortFast configured. TheBPDU guard transitions the port into errdisable state, and a message appears on the console

Page 152: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

(Reference and good resource: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a008009482f.shtml )

QUESTION 19Which of the following commands can be issued without interfering with the operation of loop guard?

A. Switch(config-if)#spanning-tree guard rootB. Switch(config-if)#spanning-tree portfastC. Switch(config-if)#switchport mode trunkD. Switch(config-if)#switchport mode access

Correct Answer: CSection: STPExplanation

Explanation/Reference:PortFast & Root guard should be placed on ports configured as access ports while loop guard should be placedon trunk ports -> we can use the “switchport mode trunk” without interfering with the operation of loop guard.

QUESTION 20Which statement correctly describes enabling BPDU guard on an access port that is also enabled for PortFast?

A. Upon startup, the port transmits 10 BPDUs. If the port receives a BPDU, PortFast and BPDU guard aredisabled on that port and it assumes normal STP operation.

B. The access port ignores any received BPDU.C. If the port receives a BPDU, it is placed into the error-disable state.D. BPDU guard is only configured globally and the BPDU filter is required for port-level configuration.

Correct Answer: CSection: STPExplanation

Explanation/Reference:If any BPDU is received on a port where BPDU guard is enabled, that port is put into the err-disable stateimmediately. The port is shut down in an error condition and must be either manually re-enabled orautomatically recovered through the errdisable timeout function.

Note: A port that has PortFast enabled also has BPDU guard automatically enabled. By combining PortFast &BPDU guard we have a port that can quickly enter the Forwarding state from Blocking state and automaticallyshut down when receiving BPDUs.

QUESTION 21Why is BPDU guard an effective way to prevent an unauthorized rogue switch from altering the spanning-treetopology of a network?

A. BPDU guard can guarantee proper selection of the root bridge.

Page 153: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.C. BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root

bridge election. D. BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.

Correct Answer: BSection: STPExplanation

Explanation/Reference:

QUESTION 22Which three statements about STP timers are true? (Choose three)

A. STP timers values (hello, forward delay, max age) are included in each BPDU.B. A switch is not concerned about its local configuration of the STP timers values. It will only consider the

value of the STP timers contained in the BPDU it is receiving.C. To successfully exchange BPDUs between two switches, their STP timers value (hello, forward delay, max

age) must be the same.D. If any STP timer value (hello, forward delay, max age) needs to be changed, it should at least be changed

on the root bridge and backup root bridge.E. On a switched network with a small network diameter, the STP hello timer can be tuned to a lower value to

decrease the load on the switch CPU.F. The root bridge passes the timer information in BPDUs to all routers in the Layer 3 configuration.

Correct Answer: ABDSection: STPExplanation

Explanation/Reference:Each BPDU includes the hello, forward delay, and max age STP timers. An IEEE bridge is not concerned aboutthe local configuration of the timers value. The IEEE bridge considers the value of the timers in the BPDU thatthe bridge receives. Effectively, only a timer that is configured on the root bridge of the STP is important. If youlose the root, the new root starts to impose its local timer value on the entire network. So, even if you do notneed to configure the same timer value in the entire network, you must at least configure any timer changes onthe root bridge and on the backup root bridge.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094954.shtml)

QUESTION 23Refer to the exhibit. VTP has been enabled on the trunk links between all switches within the Certpreparedomain. An administrator has recently enabled VTP pruning. Port 1 on Switch 1 and port 2 on Switch 4 are assigned to VLAN 2. A broadcast is sent from the host connectedto Switch 1. Where will the broadcast propagate?

Page 154: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Every switch in the network receives the broadcast and will forward it out all ports.B. Every switch in the network receives the broadcast, but only Switch 4 will forward it out port 2.C. Switches 1, 2, and 4 will receive the broadcast, but only Switch 4 will forward it out port 2.D. Only Switch 4 will receive the broadcast and will forward it out port 2.

Correct Answer: CSection: VTPExplanation

Explanation/Reference:With VTP pruning enabled network-wide, switch 2 and switch 4 automatically use VTP to learn that none of theswitches in the lower-left part of the figure have any ports assigned to VLAN 10. As a result, switch 2 and switch4 prune VLAN 2 from the trunks connected to these switches. The pruning causes switch 2 and switch 4 to notsend frames in VLAN 2 out these trunks -> Switches 3, 5 and 6 will not receive the broadcast while Switch 4 willreceive it and forward out to port 2 -> C is correct.

QUESTION 24Switch R1 is part of the Company VTP domain. What’s true of VTP Pruning within this domain?

A. It does not prune traffic from VLANs that are pruning-ineligibleB. VLAN 1 is always pruning-eligibleC. It will prune traffic from VLANs that are pruning-ineligibleD. VLAN 2 is always pruning-ineligible

Correct Answer: ASection: VTPExplanation

Explanation/Reference:VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot be pruned.Extended-range VLANs (VLAN IDs greater than 1005) are also pruning-ineligible -> A is correct.

QUESTION 25Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic

Page 155: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Trunking Protocol (DTP) desirable mode?

A. The interface actively attempts to convert the link to a trunk linkB. The interface is put into permanent trunking mode but prevented from generating DTP frames.C. The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.D. The interface is put into a passive mode, waiting to convert the link to a trunk link.

Correct Answer: ASection: VTPExplanation

Explanation/Reference:Note: If an interface is set to switchport mode dynamic desirable, it will actively attempt to convert the link intotrunking mode. If the peer port is configured as switchport mode trunk, dynamic desirable, or dynamic automode, trunking is negotiated successfully.

QUESTION 26Refer to the exhibit. What happens when the switch SW2 is connected to the rest of the network in the VTPdomain Lab_Network?

A. The recently introduced switch SW2 adds one more VLAN to the VLAN database in the VTP domain.B. The recently introduced switch SW2 creates a STP loop in the VTP domain.C. The recently introduced switch SW2 removes all configured VLANs throughout the VTP domain.D. The recently introduced switch SW2 switches over to VTP transparent mode in order to be included into the

VTP domain.E. A trunk should be configured between the two switches in order to integrate SW2 into the VTP domain.

Correct Answer: CSection: VTPExplanation

Explanation/Reference:The Configuration Revision number of SW2 is higher than that of SW1 (147 > 47) and SW2 is operating inClient mode so it can send update to other switches. The result is SW1 and other switches in that VTP domainwill remove their current VLAN information and copy VLAN information from SW2.

Page 156: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 27When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker able to gatherinformation?

A. The attacking station uses DTP to negotiate trunking with a switch port and captures all traffic that isallowed on the trunk.

B. The attacking station tags itself with all usable VLANs to capture data that is passed through the switch,regardless of the VLAN to which the data belongs.

C. The attacking station will generate frames with two 802.1Q headers to cause the switch to forward theframes to a VLAN that would be inaccessible to the attacker through legitimate means.

D. The attacking station uses VTP to collect VLAN information that is sent out and then tags itself with thedomain information in order to capture the data.

Correct Answer: CSection: VLAN HoppingExplanation

Explanation/Reference:

QUESTION 28An attacker is launching a DoS attack with a public domain hacking tool that is used to exhaust the IP addressspace available from the DHCP servers for a period of time. Which procedure would best defend against thistype of attack?

A. Configure only trusted interfaces with root guard.B. Implement private VLANs (PVLANs) to carry only user traffic.C. Implement private VLANs (PVLANs) to carry only DHCP traffic.D. Configure only untrusted interfaces with root guard.E. Configure DHCP spoofing on all ports that connect untrusted clients.F. Configure DHCP snooping only on ports that connect trusted DHCP servers.

Correct Answer: FSection: DHCP SnoopingExplanation

Explanation/Reference:To defend DHCP spoofing attack, we only need to configure DHCP snooping on trusted interfaces becauseother ports are classified as untrusted ports by default.

QUESTION 29Which three statements are true about DAI? (Choose three)

A. DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindingsstored in the DHCP Snooping database.

B. DAI forwards all ARP packets received on a trusted interface without any checks.C. DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings

stored in the CAM table.D. DAI forwards all ARP packets received on a trusted interface after verifying and inspecting the packet

against the DAI table.E. DAI intercepts all ARP packets on untrusted ports

Page 157: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

F. DAI is used to prevent against a DHCP Snooping attack.

Correct Answer: ABESection: Dynamic ARP Inspection DAIExplanation

Explanation/Reference:

QUESTION 30You need to configure port security on switch R1. Which two statements are true about this technology?(Choose two)

A. Port security can be configured for ports supporting VoIP.B. With port security configured, four MAC addresses are allowed by default.C. The network administrator must manually enter the MAC address for each device in order for the switch to

allow connectivity.D. With port security configured, only one MAC addresses is allowed by default.E. Port security cannot be configured for ports supporting VoIP.

Correct Answer: ADSection: Port SecurityExplanation

Explanation/Reference:Port security can be set on ports supporting VoIP. This example shows how to designate a maximum of oneMAC address for a voice VLAN (for a Cisco IP Phone) and one MAC address for the data VLAN (for a PC) onFast Ethernet interface 5/1 and to verify the configuration:Switch(config)# interface fa5/1Switch(config-if)# switchport mode accessSwitch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickySwitch(config-if)# switchport port-security maximum 1 vlan voiceSwitch(config-if)# switchport port-security maximum 1 vlan access

-> A is correct.

By default, only one MAC addresses is allowed but we can use the “switchport port-security maximum number”command to set the maximum number of MAC allowed -> D is correct.

(Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/31sg/configuration/guide/port_sec.html)

QUESTION 31Refer to the exhibit. Which of these is true based upon the output shown in the command?

Page 158: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. If the number of devices attempting to access the port exceeds 11, the port will shut down for 20 minutes,as configured.

B. The port has security enabled and has shut down due to a security violationC. The port is operational and has reached its configured maximum allowed number of MAC addresses.D. The port will allow access for 11 MAC addresses in addition to the 3 configured MAC addresses.

Correct Answer: CSection: Port SecurityExplanation

Explanation/Reference:Notice that the “Violation mode: Shutdown” line only describes what the switch will do if a violation occurs; it isnot the current status of that port. The last line “Security Violation count: 0″ tells us no violation has occurred ->the port is operational. Also “the Maximum MAC” and “Total MAC Addresses” are both 11 -> the maximumMAC addresses have ben reached.

From the “Configured MAC Addresses: 3″ we also learn that there are 3 MAC addresses are manually learnedand 8 MAC addresses are dynamically learned.

QUESTION 32Refer to the exhibit. Based on the running configuration that is shown for interface FastEthemet0/2, what twoconclusions can be deduced? (Choose two)

A. Connecting a host with MAC address 0000.0000.4147 will move interface FastEthemet0/2 into errordisabled state.

Page 159: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. The host with address 0000.0000.4141 is removed from the secure address list after 5 seconds of inactivity.C. The sticky secure MAC addresses are treated as static secure MAC addresses after the running

configuration is saved to the startup configuration and the switch is restarted.D. Interface FastEthemet0/2 is a voice VLAN port.E. The host with address 0000.0000.000b is removed from the secure address list after 300 seconds.

Correct Answer: CESection: Port SecurityExplanation

Explanation/Reference:In this case the “switchport port-security aging time 5″ sets aging time to 5 minutes and the “switchport port-security aging static” tells the switch to age out for statically configured MAC addresses -> the MAC0000.0000.000b will be aged out after 5 minutes (300 seconds).

Note: Cisco switch does not support port security aging of sticky secure MAC addresses -> the sticky secureMAC addresses are not aged out.

QUESTION 33Refer to the exhibit. What can be concluded about VLANs 200 and 202?

A. VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in thesame VLAN. VLAN 200 carries traffic between community ports and to promiscuous ports.

B. VLAN 202 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in thesame VLAN. VLAN 200 carries traffic from isolated ports to a promiscuous port.

C. VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports inthe same VLAN. VLAN 202 carries traffic between community ports and to promiscuous ports.

D. VLAN 200 carries traffic from promiscuous ports to isolated, community, and other promiscuous ports in thesame VLAN. VLAN 202 carries traffic from isolated ports to a promiscuous port.

Correct Answer: BSection: Private VLANExplanation

Explanation/Reference:In fact the exhibit above is wrong, that output should be from the command “show vlan private-vlan”. The “showvlan private-vlan type” should give output like this:

With this output we can see VLAN 202 is configured as the primary VLAN while VLAN 200 is configured as

Page 160: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

secondary (isolated) VLAN -> B is correct.

QUESTION 34Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set toconfigure LACP on Switch2?

A. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode auto

B. Switch2# configure terminalSwitch2(config)# interface range gigabitethemet3/1 -2 Switch2(config-if)# channel-group 5 mode passive

C. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode desirable

D. Switch2# configure terminalSwitch2(config)# interface range gigabitethernet3/1 -2 Switch2(config-if)# channel-group 5 mode on

Correct Answer: BSection: EtherChannelExplanation

Explanation/Reference:LACP trunking supports four modes of operation, as follows:* On: The link aggregation is forced to be formed without any LACP negotiation. In other words, the switch willneither send the LACP packet nor process any incoming LACP packet. This is similar to the on state for PAgP.* Off: The link aggregation will not be formed. We do not send or understand the LACP packet. This is similar tothe off state for PAgP.* Passive: The switch does not initiate the channel, but does understand incoming LACP packets. The peer (inactive state) initiates negotiation (by sending out an LACP packet) which we receive and reply to, eventuallyforming the aggregation channel with the peer. This is similar to the auto mode in PAgP.* Active: We are willing to form an aggregate link, and initiate the negotiation. The link aggregate will be formedif the other end is running in LACP active or passive mode. This is similar to the desirable mode of PAgP.

LACP does not have “auto” & “desirable” modes so A & C are not correct.

Also there are only three valid combinations to run the LACP link aggregate, as follows:

Page 161: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Therefore if Switch1 is set “active” mode, we cannot set “on” mode on Switch2 -> D is not correct.

Only answer B is suitable in this case.

(Reference: http://www.cisco.com/en/US/tech/tk389/tk213/technologies_configuration_example09186a0080094470.shtml)

An example of configuring Layer 2 EtherChannel using LACP (applied these commands to both switches):

QUESTION 35Which statement is true regarding the Port Aggregation Protocol?

A. Configuration changes made on the port-channel interface apply to all physical ports assigned to theportchannel interface.

B. Configuration changes made on a physical port that is a member of a port-channel interface apply to theport-channel interface.

C. Configuration changes are not permitted with Port Aggregation Protocol; instead, the standardized LinkAggregation Control Protocol should be used if configuration changes are required.

D. The physical port must first be disassociated from the port-channel interface before any configurationchanges can be made.

Correct Answer: ASection: EtherChannelExplanation

Explanation/Reference:The port-channel interface represents for the whole bundle and all the configurations on this interface areapplied to all physical ports that are assigned to this logical interface.

Note: We must manually create port-channel logical interface when configuring Layer 3 EtherChannels. Theport-channel logical interface is automatically created when configuring Layer 2 EtherChannels (you can’t putLayer 2 ports into a manually created port channel interface).

An example of configuring Layer 3 EtherChannels with port-channel interfaces:

Page 162: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

QUESTION 36Based on the following exhibit, which problem is preventing users on VLAN 100 from pinging addresses onVLAN 200?

Page 163: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Native VLAN mismatch.B. Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.C. Trunking needs to be enabled.D. The ip routing command is missing on DLS1.

Correct Answer: DSection: InterVLAN RoutingExplanation

Explanation/Reference:To allow communication between two VLANs, we need to enables Layer 3 routing on the switch with the “iprouting” command. Some flatforms are enabled by default but some are not.

QUESTION 37You work as a network technician, study the exhibit carefully. What is the effect on the trust boundary ofconfiguring the command mls qos trust cos on the switch port that is connected to the IP phone?

A. Effectively the trust boundary has been moved to the IP phone.B. The host is now establishing the CoS value and has effectively become the trust boundary.C. The switch SW is rewriting packets it receives from the IP phone and determining the CoS value.D. The switch SW will no longer tag incoming voice packets and will trust the distribution layer switch to set the

CoS.

Correct Answer: ASection: Voice SupportExplanation

Explanation/Reference:The “mls qos trust cos” command is used to configure the port trust state (by default, the port is not trusted). Byusing this command, you can configure the switch port to which the telephone is connected to trust the CoSlabels of all traffic received on that port.

(Note: All current Cisco IP Phones include an internal three-port Layer 2 switch therefore you can think an IPPhone as a switch and network administrators generally accept a Cisco IP Phone as a trusted device.)

QUESTION 38Which two statements about the HSRP priority are true? (Choose two)

A. To assign the HSRP router priority in a standby group, the standby group-number priority priority-valueglobal configuration command must be used.

B. The default priority of a router is zero (0).C. The no standby priority command assigns a priority of 100 to the router.

Page 164: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

D. Assuming that preempting has also been configured, the router with the lowest priority in an HSRP groupwould become the active router.

E. When two routers in an HSRP standby group are configured with identical priorities, the router with thehighest configured IP address will become the active router.

Correct Answer: CESection: HSRPExplanation

Explanation/Reference:The “no standby priority” command will reset the priority to the default value (100) -> C is correct.

QUESTION 39HSRP has been configured between two Company devices. Which of the following describe reasons fordeploying HSRP? (Choose three)

A. HSRP provides redundancy and fault toleranceB. HSRP allows one router to automatically assume the function of the second router if the second router fails C. HSRP allows one router to automatically assume the function of the second router if the second router

starts D. HSRP provides redundancy and load balancing

Correct Answer: ABDSection: HSRPExplanation

Explanation/Reference:Answer A and B are correct because they are the functions of HSRP. I just want to mention about answer D. Infact answer D is not totally correct, in SWITCH only GLBP has the load-balancing feature. HSRP can only load-sharing by configuring some different HSRP groups. But answer D is the only choice left in this question so wehave to choose it.

QUESTION 40Regarding high availability, with the MAC address 0000.0c07.ac03, what does the “03″ represent?

A. The GLBP group numberB. The type of encapsulationC. The HSRP router numberD. The VRRP group numberE. The HSRP group numberF. The active router number

Correct Answer: ESection: HSRPExplanation

Explanation/Reference:The last two-digit hex value in the MAC address presents the HSRP group number.

QUESTION 41Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing

Page 165: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

some show commands, debug output, and the syslog, you discover the following information:

What conclusion can you infer from this information?

A. VRRP is initializing and operating correctly.B. HSRP is initializing and operating correctly.C. GLBP is initializing and operating correctly.D. VRRP is not properly exchanging three hello messages.E. HSRP is not properly exchanging three hello messages.F. GLBP is not properly exchanging three hello messages.

Correct Answer: ESection: HSRPExplanation

Explanation/Reference:These error messages describe a situation in which a standby HSRP router did not receive three successiveHSRP hello packets from its HSRP peer (by default, hello messages are sent every 3 seconds while theholdtime is 10 seconds). The output shows that the standby router moves from the standby state to the activestate. Shortly thereafter, the router returns to the standby state. Unless this error message occurs during theinitial installation, an HSRP issue probably does not cause the error message. The error messages signify theloss of HSRP hellos between the peers. When you troubleshoot this issue, you must verify the communicationbetween the HSRP peers. A random, momentary loss of data communication between the peers is the mostcommon problem that results in these messages. HSRP state changes are often due to High CPU Utilization. Ifthe error message is due to high CPU utilization, put a sniffer on the network and the trace the system thatcauses the high CPU utilization.

(Reference and good resource: http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094afd.shtml)

QUESTION 42You administer a network that uses two routers, R1 and R2, configured as an HSRP group to provideredundancy for the gateway. Router R1 is the active router and has been configured as follows:

Page 166: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Which of the following describes the effect the “standby preempt delay minimum 50” command will have onrouter R1?

A. The HSRP priority for router R1 will increase to 200.B. Router R1 will become the standby router if the priority drops below 50.C. The HSRP priority for router R1 will decrease to 50 points when FaO/2 goes down.D. Router R1 will wait 50 seconds before attempting to preempt the active router.

Correct Answer: DSection: HSRPExplanation

Explanation/Reference:If R1, for some reason, loses its active state, the “standby preempt delay minimum 50″ command will cause R1to wait 50 seconds before it tries to get the active state again -> D is correct.

QUESTION 43Refer to the exhibit. HSRP has been configured and Link A is the primary route to router R4. When Link A fails,router R2 (Link B) becomes the active router. Which router will assume the active role when Link A becomesoperational again?

Page 167: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The primary router R1 will reassume the active role when it comes back online.B. The standby router R2 will remain active and will forward the active role to router R1 only in the event of its

own failure.C. The standby router R2 will remain active and will forward the active role to router R1 only in the event of

Link B failure.D. The third member of the HSRP group, router R3, will take over the active role only in event of router R2

failure.

Correct Answer: ASection: HSRPExplanation

Explanation/Reference:When R1 fails, the “standby 1 preempt” command on R2 will cause R2 to take over the active state of R1. Butwhen R1 comes up again, the “standby 1 preempt” command on R1 will help R1 take over the active stateagain. Without the “preempt” command configured on R2, R2 only takes over the active state only if it receivesinformation indicating that there is no router currently in active state (by default it does not receive 3 hellomessages from the active router). Without the “preempt” command on R2, it will not become active router even

Page 168: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

if its priority is higher than all other routers.

QUESTION 44Which first-hop redundancy solution listed would supply clients with MAC address 0000.0C07.AC0A for group10 in response to an ARP request for a default gateway?

A. IRDPB. Proxy ARPC. GLBPD. HSRPE. VRRPF. IP Redirects

Correct Answer: DSection: HSRPExplanation

Explanation/Reference:The last two-digit hex value in the MAC address presents the HSRP group number. In this case 0A in hexaequals 10 in decimal so this router belongs to group 10 and it is running HSRP.

QUESTION 45Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), whichis being used in the Company network to provide redundancy?

A. A VRRP group has one active and one or more standby virtual routers.B. A VRRP group has one master and one or more backup virtual routers.C. A VRRP group has one master and one redundant virtual router.

Correct Answer: BSection: VRRPExplanation

Explanation/Reference:Unilike HSRP (which has one active router, one standby router and many listening routers), a VRRP group hasone master router and one or more backup routers. All backup routers are in backup state.

QUESTION 46Refer to the exhibit. The Gateway Load Balancing Protocol has been configured on routers R1 and R2, andhosts A and B have been configured as shown. Which statement can be derived from the exhibit?

Page 169: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. The host A default gateway has been configured as 10.88.1.10/24.B. The GLBP weighted load balancing mode has been configured.C. The GLBP round-robin, load-balancing mode has been configured.D. The GLBP host-dependent, load-balancing mode has been configured.E. The host A default gateway has been configured as 10.88.1.1/24.F. The host A default gateway has been configured as 10.88.1.4/24.

Correct Answer: ASection: GLBPExplanation

Explanation/Reference:

QUESTION 47Refer to the exhibit. What is the result of setting GLBP weighting at 105 with lower threshold 90 and upperthreshold 100 on this router?

Page 170: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Only if both tracked objects are up will this router will be available as an AVF for group 1.B. Only if the state of both tracked objects goes down will this router release its status as an AVF for group 1.C. If both tracked objects go down and then one comes up, but the other remains down, this router will be

available as an AVF for group 1.D. This configuration is incorrect and will not have any effect on GLBP operation.E. If the state of one tracked object goes down then this router will release its status as an AVF for group 1.

Correct Answer: BSection: GLBPExplanation

Explanation/Reference:Each tracked object goes down will decrease the weighting of this router by 10, that makes the weighting = 105– 10 = 95. This value is still higher than the lower threshold (90) so this router is not lost its status as an AVF.Only if both tracked objects go down, the weighting will fall below the lower threshold (105 – 10 – 10 = 85 < 90)and this router will release its status as an AVF for group 1 -> B is correct.

QUESTION 48HSRP is a Cisco-proprietary protocol developed to allow several routers (or multilayer switches) to appear as asingle gateway address. Which two statements are true about the Hot Standby Router Protocol (HSRP)?(Choose two)

A. Load sharing with HSRP is achieved by creating multiple subinterfaces on the HSRP routers.

Page 171: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

B. Routers configured for HSRP can belong to multiple groups and multiple VLANs.C. All routers configured for HSRP load balancing must be configured with the same priority.D. Load sharing with HSRP is achieved by creating HSRP groups on the HSRP routers.

Correct Answer: BDSection: Gateway RedundancyExplanation

Explanation/Reference:

QUESTION 49If you are a network technician, study the exhibit carefully. Which Virtual Router Redundancy Protocol (VRRP)statement is true about the roles of the master virtual router and the backup virtual router?

Page 172: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

A. Router RA is the master virtual router, and Router RB is the backup virtual router. When Router RA fails,Router RB will become the master virtual router. When Router RA recovers, Router RB will maintain the role of master virtual router.

B. Router RA is the master virtual router, and Router RB is the backup virtual router. When Router RA fails,Router RB will become the master virtual router. When Router RA recovers, it will regain the master virtual router role.

C. Router RB is the master virtual router, and Router RA is the backup virtual router. When Router RB fails,Router RA will become the master virtual router. When Router RB recovers, RouterRA will maintain the role of master.

D. Router RB is the master virtual router, and Router RA is the backup virtual router. When Router RB fails,Router RA will become the master virtual router. When Router RB recovers, it will regain the master virtual router role.

Correct Answer: BSection: Gateway RedundancyExplanation

Explanation/Reference:Router RA is the master virtual router because of its higher priority (110). By default, the pre-empting function isenabled so Router RB will become the master virtual router when RA fails; and when RA recovers, it will takethe master role again.

QUESTION 50Which set of statements describes the correct order and process of a wireless client associating with a wirelessaccess point?

A. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Access point adds client MAC address to association table.

B. 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates association.4. Client accepts association.5. Access point adds client MAC address to association table.

C. 1. Access point sends probe request .2. Client sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.

D. 1. Client sends probe request.2. Access point sends probe response.3. Client initiates association.4. Access point accepts association.5. Client adds access point MAC address to association table.

Correct Answer: ASection: WirelessExplanation

Explanation/Reference:

QUESTION 51

Page 173: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

You are a network technician, study the exhibit carefully. What should be taken into consideration when usingthe Cisco Aironet Desktop Utility (ADU) to configure the static WEP keys on the wireless client adapter?

A. Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points,servers, etc.) must be properly configured for LEAP authentication.

B. The client adapter WEP key should be generated by the AP and forwarded to the client adapter before theclient adapter can establish communication with the wireless network.

C. In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In adhoc mode all client WEP keys within the wireless network must match each other.

D. The client adapter WEP key should be generated by the authentication server and forwarded to the clientadapter before the client adapter can establish communication with the wireless network.

Correct Answer: CSection: WirelessExplanation

Explanation/Reference:

http://www.gratisexam.com/

Page 174: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

Drag and Drop

Page 175: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

HotSpot

Page 176: CCNP-SWITCH - GRATIS EXAM · CCNP-SWITCH Number : 642-813 Passing Score : 790 Time Limit : 150 min File Version : 1.0  Sections 1. VLAN VTP STP 2. VLAN

LabSim