ccnp

14
Take Assessment CCNP BCMSN Final 3 (Version 5.0) Note: Module not for cheating. This is use to practice for your course 1 1. In a bridged environment, which protocol provides subsecond reconvergence of blocked bridging loops after the failure of one of the uplinks? IEEE 802.1Q (CST) IEEE 802.1w (RSTP) Cisco PVST+ IEEE 802.1D (STP) 2. What are three benefits of end-to-end VLANs? (Choose three.) Traffic from a given VLAN can be assigned a higher or lower priority throughout a Campus. Layer-2 failures are isolated to a small subset of users. VLAN membership remains the same as the user moves throughout a Campus. Problem isolation and resolution are expedited within the switch block. Traffic can traverse multiple switches without being routed. High availability results from a deterministic traffic flow and a finite failure domain. 3. Refer to the exhibit. Which statement is true, given the output generated by the show interfaces fastethernet 0/1 switchport command? Interface Fa0/1 is configured for ISL trunking. Interface Fa0/1 is configured as an access port. Interface Fa0/1 is configured as an SVI. Interface Fa0/1 is configured for 802.1Q trunking. 4. A network administrator wants to prevent users from adding additional devices to the switchport they are currently connected to. Which Cisco Catalyst feature will accomplish this? MAC filtering port security MAC access lists port-based authentication port-based access lists 5. Which three statements are benefits of local VLANs in the Enterprise Composite Model? (Choose three.) deterministic traffic flow expediting problem isolation and resolution within the switch block ease of management since local VLANs are typically confined to the Building Access submodule high availability since redundant paths exist at all infrastructure levels broad expansion domain since the number of devices on each VLAN can easily be added to IP address conservation since address blocks can be allocated to VLANs wide coverage since a VLAN can be geographically dispersed throughout the network

Upload: manuel-valdes-alegria

Post on 18-Nov-2014

42 views

Category:

Documents


3 download

DESCRIPTION

ccnp

TRANSCRIPT

Page 1: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 1

1. In a bridged environment, which protocol provides subsecond reconvergence of blocked bridging loops

after the failure of one of the uplinks? IEEE 802.1Q (CST) IEEE 802.1w (RSTP) Cisco PVST+ IEEE 802.1D (STP)

2. What are three benefits of end-to-end VLANs? (Choose three.)

Traffic from a given VLAN can be assigned a higher or lower priority throughout a Campus. Layer-2 failures are isolated to a small subset of users. VLAN membership remains the same as the user moves throughout a Campus. Problem isolation and resolution are expedited within the switch block. Traffic can traverse multiple switches without being routed. High availability results from a deterministic traffic flow and a finite failure domain.

3. Refer to the exhibit. Which statement is true, given the output generated by the show interfaces fastethernet

0/1 switchport command? Interface Fa0/1 is configured for ISL trunking. Interface Fa0/1 is configured as an access port. Interface Fa0/1 is configured as an SVI. Interface Fa0/1 is configured for 802.1Q trunking.

4. A network administrator wants to prevent users from adding additional devices to the switchport they

are currently connected to. Which Cisco Catalyst feature will accomplish this? MAC filtering port security MAC access lists port-based authentication port-based access lists

5. Which three statements are benefits of local VLANs in the Enterprise Composite Model? (Choose three.)

deterministic traffic flow expediting problem isolation and resolution within the switch block ease of management since local VLANs are typically confined to the Building Access submodule high availability since redundant paths exist at all infrastructure levels broad expansion domain since the number of devices on each VLAN can easily be added to IP address conservation since address blocks can be allocated to VLANs wide coverage since a VLAN can be geographically dispersed throughout the network

Page 2: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 2

6. Which two statements describe Cisco best practices for VLAN design? (Choose two.) Local VLANs should extend no further than the local core router. Local VLANs should extend no further than the local distribution-layer switch. Local VLANs eliminate the need for redundant access to distribution-layer links. Local VLANs provide a simpler design that is easier to troubleshoot.

7. Which three statements regarding RSTP are true? (Choose three.)

An RSTP BPDU carries information about port roles and is sent to neighbor switches only. RSTP elects a root bridge in exactly the same way as 802.1D. RSTP is capable of reverting back to 802.1D while still maintaining the benefits of 802.1w. RSTP is recognized as the IEEE 802.1w standard. There are only three RSTP port states: discarding, listening, and forwarding. UplinkFast and BackboneFast are compatible with RSTP.

8. Which statement is true about the Spanning-Tree Protocol (STP)?

Each switch determines a designated port that provides the best path to the root switch. The designated port will be on the switch with the best path to the root switch. With each network change, the STP algorithm is run on all switches that have a root port. A topology change will cause the switch where the change occurred to send messages throughout the

tree regarding the topology change. 9. Which statement is true about UDLD?

It is automatically enabled. It allows devices to transmit traffic one way. It allows a switch to detect a unidirectional link and shut down the affected interface. It will disable an EtherChannel bundle if one link has failed.

10. What is a best practice when implementing failover strategies at the access and distribution layers?

Align failover timers between STP and HSRP. Enable ICMP redirects with the ip redirects command on interfaces that are involved with HSRP. Disable RSTP on all access and distribution switches. Span VLANs across all switches or switch stacks for fault redundancy.

11. Refer to the exhibit. What statement is true concerning the output of the show standby command?

The current priority of this router is 120. The router is currently forwarding packets. This router is tracking two properly operating interfaces. This router is in the HSRP down state because its tracked interfaces are down.

Page 3: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 3

12. Refer to the exhibit. What action does the command standby 1 track Serial0 on router R1 perform?

It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.31.1 on interface Serial 0.

It links the default gateway virtual address 192.168.21.10 to the IP address 192.168.42.2 on interface Serial 0.

It links the HSRP process to multi-homed BGP on R1 and R2. It tracks the state of the Serial 0 interface and brings down the priority of standby group 1 if the

interface goes down. In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2,

appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-A to R1 path. In the event of an outage on interface Serial 0, this command triggers route-map HSRP on router R2,

appending AS 100 to the BGP updates sent to AS 400, to make it a backup for the ISP-B to R2 path. 13. Which of the following is true regarding the 3550 switch command shown below? CAT3550(config-if)# ip route-cache cef

globally enables CEF switching enables CEF to be enabled by default on the switch disables process switching on the interface required if CEF has been previously disabled on an interface

Page 4: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 4

14. Refer to the exhibit. Which command can be used to identify the nine adjacencies referred to in the

exhibit? show ip cef * show adjacency detail show mls entry cef ip show arp

15. What are two benefits of implementing VLANs on a switched network? (Choose two.)

VLANs enable all users on the network to communicate with each other without restriction. VLANs create a single broadcast domain for all the users of a switched network. VLANs break up broadcast domains within an organization. Communication between VLANs requires use of Layer 2 devices. VLANs do not require additional management to control the traffic over the network. VLANs separate the systems with sensitive data from the rest of the network to provide security.

16. Refer to the exhibit. A network administrator is reviewing a customer trouble ticket containing the output displayed in the exhibit. What command would generate this output?

show arp | include port security show mac-address-table | include port security show privilege | include port security show dot1x interface show port-security interface show class-map | include security

Page 5: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 5

17. Refer to the exhibit. Switch2 is not receiving updated VLAN information from Switch1. What is the

problem? The VTP domains are different. The VTP modes are different. The VTP passwords are different. Switch2 is in server mode. Switch2 is in client mode. Switch2 is in transparent mode.

18. Refer to the exhibit. Switch Sw_F recently joined the network. What will happen once STP has finished its convergence?

Switch Sw_F will take over the root bridge role from switch Sw_C. Switch Sw_F will take over the root bridge role from switch Sw_D. Switch Sw_C will remain the root bridge. Switch Sw_D will remain the root bridge. Switch Sw_F will become the backup root bridge. Switch Sw_C will become the backup root bridge.

19. A network administrator is tasked with protecting a server farm by implementing Private VLANs. A server

is only allowed to communicate with its default gateway and other related servers. Which type of PVLAN should be configured on the switch ports connecting the servers?

isolated promiscuous ISL community 802.1Q

Page 6: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 6

20. Refer to the exhibit. Switch A is the root switch. The port on Switch A that connects to Switch B is half duplex. The port on Switch B that connects to Switch A is full duplex. What are three problems that this scenario could create? (Choose three.)

Switch A is performing carrier sense and collision detection, while Switch B is not. Autonegotiation results in both Switch A and Switch B failing to perform carrier sense. Switch B will become the root switch. BPDUs may not successfully negotiate the link between Switch A and Switch B. Switch B may unblock its port to Switch C, thereby creating a loop. Spanning-tree will keep re-calculating, consuming all the CPU normally used for traffic.

21. Which two statements are true about the RSTP negotiations between switches? (Choose two.)

UplinkFast must be configured on all designated switches. BackboneFast must be configured on all root switches. Switches must be connected by a point-to-point link. All ports that are directly connected to end stations must be enabled as designated ports. All ports connected to end stations must be configured as edge ports.

22. Which wireless data technology is used for WLANs?

spread spectrum narrowband personal communication system (PCS) 3G microwave cellular

23. Which of the following agencies tests and certifies the interoperability of wireless equipment with the IEEE 802.11a, 802.11b, and 802.11g standards?

FCC ANSI WiFi IEEE ETSI ISO

24. What is used to separate WLANs logically and is also used as a name for a wireless cell?

BSS IBSS SSID VLAN VLAN ID WVLAN ID

Page 7: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 7

25. Which IP address, username, and password must be used when initially configuring a Cisco 4400 Series WLAN controller using a Web browser?

192.168.1.1/24, Username: admin, Password: (none) 192.168.1.1/24, Username: admin, Password: admin (esta es la respuesta correcta) 192.168.1.1/24, Username: Cisco, Password: cisco (esta es la respuesta que aparece en cisco como

correcta.) 192.168.2.1/24, Username: admin, Password: (none) 192.168.2.1/24, Username: admin, Password: admin 192.168.2.1/24, Username: Cisco, Password: cisco

26. What are two responsibilities of the standby router in an HSRP group? (Choose two.)

to quickly assume packet-forwarding responsibility if the active router becomes inoperable. to respond to traffic for the virtual router. to reply with the virtual router MAC address in the event an SRP request is received. to monitor the operational status of the HSRP group.

27. Refer to the exhibit. Switch DSw1 is the Active Virtual Gateway (AVG) and DSw2 is an Active Virtual

Forwarder (AVF). Based on this information, which two GLBP statements are true? (Choose two.) GLBP is a Cisco proprietary protocol and is supported on all Cisco Catalyst and Cisco router platforms. None of the switches have had their priority configured. Switch DSw1 assigns the virtual IP addresses to switch DSw2. Switch DSw2 has been configured with the glbp 1 priority 95 command. Two more multilayer switches could join this group. When Host A sends an ARP message for the gateway IP address, switch DSw1 returns the physical MAC

address of switch DSw2. 28. Which statement is true about the configuration of voice VLANs?

Static secure MAC addresses can be configured in conjunction with voice VLANs. PortFast is automatically enabled when voice VLANs are configured. PortFast must be manually configured when voice VLANs are configured. Voice VLANs are typically configured on uplink ports.

Page 8: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 8

29. Refer to the exhibit. Based on the outputs displayed, what will happen when Switch2 joins the VTP

domain? Switch2 will negotiate to become the VTP server. Switch1 will learn all VLAN information from Switch2 because Switch2 is the VTP client. Switch2 will learn all VLAN information from Switch1 because Switch1 is the VTP server. Switch1 will overwrite the Switch2 VLAN database. Switch2 will overwrite the Switch1 VLAN database.

30. A switch is configured as a VTP client and then connected to the rest of the network. The instant the trunk link is brought up to the rest of the network, the whole network goes down. What could have happened?

The switch was inserted into the network using an incorrect VTP domain name. The switch should have been placed into VTP Transparent Mode prior to being inserted into the network. The switch should have been placed into VTP Server Mode in order to correctly propagate the new VLAN

information. The configuration revision number of the inserted switch was higher than the configuration revision

of the VTP domain. The configuration revision number of the inserted switch was lower than the configuration revision of

the VTP domain. 31. Which two statements about designing an STP topology are true? (Choose two.)

The physical topology can be misleading. Therefore, the traceroute command should be used to reveal the Layer 2 topology.

Assuming that all switches have the same default priority value, the STP root will be the switch with the highest MAC address.

Assuming that all switches have the same default priority value, the STP root will be the switch with the lowest MAC address.

Switches that provide access ports for server farms or the Internet gateway should be configured with the lowest bridge priority numerical value.

Switches that provide access ports for server farms or the Internet gateway should be configured with the highest bridge priority numerical value.

Switches that provide access ports for server farms or the Internet gateway should be configured with a bridge priority numerical value of 32768.

Page 9: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 9

32. In the figure above, users connected to Switch D have reported symptoms of high latency and poor throughput when connecting to Server A. The network administrator's Layer 2 mapping tool reveals that traffic from Switch D to Server A uses a suboptimal path through Switch C. What may be causing this suboptimal path to be chosen?

Switch B is configured as the STP root. Switch C is configured as the STP root. Switch D is configured as the STP root. UDLD on Switch D has detected a unidirectional link to Switch A. UDLD on Switch D has detected a unidirectional link to Switch C.

33. On a switch that has STP enabled, which command can be used to detect a unidirectional link before a forwarding loop is created?

spanning-tree portfast on both sides of the link spanning-tree rootguard on both sides of the link udld enable on both sides of the link port protected on both sides of the link

34. Refer to the exhibit. The network administrator noticed this console message coming from switch SW_C: UDLD-3-DISABLE: Unidirectional link detected on port 3/8. Port disabled What could cause this message?

The UDLD protocol placed port 3/8 on SW_C in a listening state. The UDLD protocol shut down port 3/8 on SW_C to prevent a forwarding loop. STP placed port 3/8 on SW_C in a blocking state. STP shut down port 3/8 on SW_C to prevent a forwarding loop.

Page 10: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 10

35. Refer to the exhibit. Switch SW_A is the root switch. Switch SW_B is the designated switch for the SW_B to SW_C link. Because of unidirectional link failure on the link between SW_B and SW_C, SW_C is not receiving BPDUs from SW_B. What symptoms would be associated with the failure of the link?

The connectivity will be reestablished through the redundant link. A console message will report MAC address learning activity on the blocking port. The STP blocking port on SW_C will be automatically placed into an ErrDisable state. The STP blocking port on SW_C will transition to the forwarding state. The STP blocking port on SW_C will remain in blocking state.

36. Refer to the exhibit. Router RTA has been configured as the active HSRP router. Router RTB is to be the standby HSRP router. However, once the indicated configuration was applied to router RTB, the console began to display the message %HSRP-4-DIFFVIP1. What is the cause of the message?

The command standby preempt should only be configured on the active router. The subnet mask is missing from the standby 50 ip 10.1.1.10 command. The group number is not the same as the active router. The virtual IP address is not the same as the active router. The ports on the switch must be configured with the spanning-tree PortFast feature.

Page 11: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 11

37. Refer to the exhibit. The indicated configuration was established on the HSRP standby router RTB. However, the console message %IP-4-DUPADDR started appearing almost immediately on the RTB router. Given the output of the show standby brief command on RTA, what is the cause of the problem?

The command standby preempt should only be configured on the active router. The subnet mask is missing from the standby ip 10.1.1.1 command. The group number 50 is missing in the Router RTB configuration commands. The priority number 150 is missing in the Router RTB configuration commands. The virtual IP address should be the same as the active router. The ports on the switch must be configured with the spanning-tree PortFast feature.

38. Which two requirements should be considered when implementing VLANs in the large campus environment?(Choose two.)

STP implementation Layer 3 device placement flat network topology design single broadcast domain design

39. Which two items are recommended when mapping VLANs in an Enterprise Composite Model? (Choose

two.) Associate a VLAN to each building. Associate a VLAN to each department. Associate a VLAN to each subnet. Configure routing between VLANs at the access layer. Configure routing between VLANs at the distribution layer. Configure routing between VLANs at the core layer.

40. Which protocol should an administrator recommend to manage bridged links when the customer requires

a fully redundant network that can utilize load balancing technologies and reconverge on link failures in less than a second?

IEEE 802.1Q (CST) IEEE 802.1s (MST) Cisco PVST+ IEEE 802.1D(STP)

41. Which protocol is a Cisco-proprietary STP mode that allows CST and PVST to exist on the same network?

IEEE 802.1w (RSTP)

Page 12: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 12

IEEE 802.1Q (CST) Cisco PVST+ IEEE 802.1D (STP)

42. Which statement is true about Multiple Spanning Tree (MST) implementations?

MST provides one instance of spanning tree per VLAN. MST provides one instance of spanning tree for all VLANs. MST provides a single instance of spanning tree per multiple VLANs. MST provides a single MST region for switches with different MST configurations.

43. Which two statements are true regarding the operation of RSTP? (Choose two.)

An alternate port assumes a forwarding state in a stable, active topology. An alternate port is a switch port that offers another path toward the root bridge. An edge port only connects to another RSTP switch. A switch port participating in the RSTP topology can be defined as a root port, designated port, alternate

port, backup port, or disabled port. A switch port participating in the RSTP topology can be in the blocking, listening, learning, or forwarding

state. 44. What three fields are included in a BPDU? (Choose three.)

bridge ID STP ID port ID VLAN ID cost of path

45. An EtherChannel is configured between SW_A and SW_B. The network administrator received a console

message reporting that the ports on SW_B are rapidly learning MAC addresses. What could be the problem?

There is underlying network problems such as STP loop and route flapping. There is unusually high backplane utilization because of the large number of forwarded frames. The EtherChannel on SW_A should be configured in a separate VLAN to stop the broadcast traffic. The ports on the EtherChannel on SW_A are not bundled together. The EtherChannel on SW_A has encountered a duplex mismatch problem.

46. Which two STP features will protect the network against forwarding loops? (Choose two.)

PortFast UplinkFast BackboneFast Loop Guard Unidirectional Link Detection (UDLD)

47. Which protocol defines a single instance of spanning tree for all VLANs and transmits BPDUs over VLAN 1?

IEEE 802.1w (RSTP) IEEE 802.1Q (CST) Cisco PVST+ IEEE 802.1D (STP)

48.

Page 13: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 13

Refer to the exhibit. Traffic sourced from a device on Switch1 leaves on VLAN 10, and the return traffic arrives on VLAN 20. What is this an example of?

an external router using a single trunk for interVLAN routing an external router using multiple trunks for interVLAN routing an external router using multiple physical interfaces for interVLAN routing an external router using multiple physical interfaces for interVLAN switching a multilayer switch using multiple trunks for interVLAN routing a multilayer switch using multiple trunks for interVLAN switching

49. Refer to the exhibit and the partial configuration taken on router RTA. Users on VLAN 5 cannot communicate with the users on VLAN 10. What should be done to fix the problem?

Dynamic routing protocol should be configured on the router. Two static routes should be configured on the router pointing to each subnet. The subinterfaces of both routers should be configured with ISL encapsulation. The subinterfaces of both routers should be configured with 802.1Q encapsulation. Fa0/0 interface should be configured with a primary IP address of 10.10.5.1/24 and a secondary IP address

of 10.10.10.1/24. 50. Which two statements are true regarding switched virtual interfaces (SVI) on a multilayer switch? (Choose

two.) An SVI behaves like a regular router interface but does not support VLAN subinterfaces. An SVI is a physical switchport with Layer 3 capability. By default, an SVI is created for the default VLAN (VLAN1) Only one SVI can be associated with a VLAN. To create an SVI requires removal of Layer 2 port functionality with the no switchport interface

configuration command. 51. Which three statements regarding a routed switch interface are true? (Choose three.)

A routed switchport is a physical device that is associated with several VLANs. A routed switchport is created by configuring a Layer 2 port with the no switchport interface

configuration command and assigning an IP address. A routed switchport is created by entering VLAN interface configuration mode and assigning an IP

address. A routed switchport is a virtual Layer 3 interface that can be configured for any VLAN that exists on a

Layer 3 switch. A routed switchport provides an interface that serves as the default gateway to a router. A routed switchport serves as a default gateway for devices out that switch port.

52. Which two statements are true about flooding in a switch? (Choose two.)

Page 14: ccnp

Take Assessment CCNP BCMSN Final 3 (Version 5.0)

Note: Module not for cheating. This is use to practice for your course 14

The show mac-address-table can be used to display the flooding statistics. Flooding indicates that the content addressable memory (CAM) of the switch is corrupt. Flooding may cause STP Topology Change Notification (TCN). Flooding may be caused by asymmetric routing.

53. Refer to the exhibit. A network administrator attempts to ping the IP address 172.16.20.1 from RouterA.

What will the router output be? Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

!!!!! Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

..... Sending 5, 100-byte ICMP Echos to 172.16.20.1, timeout is 2 seconds:

U.U.U %network or host unreachable, TTL exceeded %Unrecognized host or address, or protocol not running %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed state to down