PrepAway - Latest Free Exam Questions & Answers

What could you do to help a network with many multicasts and broadcasts?

The Company LAN is becoming saturated with broadcasts and multicast traffic. What could
you do to help a network with many multicasts and broadcasts?

PrepAway - Latest Free Exam Questions & Answers

A.
Creating smaller broadcast domains by implementing VLANs.

B.
Separate nodes into different hubs.

C.
Creating larger broadcast domains by implementing VLANs.

D.
Separate nodes into different switches.

E.
All of the above.

Explanation:
Controlling broadcast propagation throughout the network is important to reduce the amount
of overhead associated with these frames. Routers, which operate at Layer 3 of the OSI
model, provide broadcast domain segmentation for each interface. Switches can also
provide broadcast domain segmentation using virtual LANs (VLANs). A VLAN is a group of
switch ports, within a single or multiple switches, that is defined by the switch hardware
and/or software as a single broadcast domain. A VLANs goal is to group devices connected
to a switch into logical broadcast domains to control the effect that broadcasts have on other
connected devices. A VLAN can be characterized as a logical network.
Building Cisco Multilayer Switched Networks (Cisco Press) page 8

3 Comments on “What could you do to help a network with many multicasts and broadcasts?

  1. janam says:

    If StormControl is enabled on a port and the traffic reaches the configured level, which two action can be configured to occur? (Choose two)

    A. trap
    B. notify admin
    C. redirect traffic
    D. log
    E. shut down

    Answer: A E

    Question 10

    To provide security, a service provider various private VLANs in its backbone network infrastructure to prevent certain VLANs communicating to each other. Which version of VTP supports the use of private VLANs?

    A. version 1
    B. version 3
    C. VTP does not support private VLANs
    D. version 2

    Answer: B

    Question 11

    Refer to the exhibit. Which two commands about SW1 are true? (Choose two)

    show_interface_trunk.jpg

    A. Interface Gi5/1 is using a Cisco proprietary trunking protocol
    B. On interface Gi5/1, all untagged traffic is tagged with VLAN 113
    C. The device is configured with the default MST region
    D. Interface Gi5/1 is using an industry standard trunking protocol
    E. Interface Gi6/2 is the root port for VLAN 36
    F. On interface Gi6/2, all untagged traffic is tagged with VLAN 600

    Answer: C D

    Note: Answer F is not correct because VLAN 600 is the native VLAN on Gi6/2 does not mean untagged traffic is tagged with this VLAN. It only means “all untagged traffic belongs to VLAN 600”.

    Question 12

    Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20? (Choose two)

    show_spanning_tree_mst.jpg

    A. spanning-tree mstp 1 priority 0
    B. spanning-tree mst 1 root primary
    C. spanning-tree mst vlan 10,20 priority root
    D. spanning-tree mst 1 priority 4096
    E. spanning-tree mst 1 priority 1
    F. spanning-tree mstp vlan 10,20 root primary

    Answer: B D

    Explanation

    From the second command output (show spanning-tree mst) we learn that MST1 includes VLANs 10 & 20. Therefore if we want DSW1 to become root bridge for these VLANs we need to set the MST 1 region to root -> The command “spanning-tree mst 1 root primary” can do the trick. In fact, this command runs a macro and sets the priority lower than the current root.

    Also we can see the current root bridge for these VLANs has the priority of 32769 (default value + sysid) so we can set the priority of DSW1 to a specific lower value. But notice that the priority must be a multiple of 4096. Therefore D is a correct answer.

    Two other new questions (reported by our candidates but not completed):

    Question 13

    In a switch stack where is the the SDM template stored?

    A. All switches in stack
    B. Master switch
    C. Flash memory

    Answer: B

    Question 14

    Refer to exhibit, which two statements correctly indicate when an SNMP trap is set to the switch? (Choose two)

    Switch(config)# snamp-server enable traps mac-notifcation
    Switch(config)# mac address-table notification threshold
    Switch(config)# mac address-table notification threshold limit 60
    Switch(config)# mac address-table notification mac-move
    A. When a new workstation connects to port F0/1
    B. When 61 MAC address are in the switch
    C. When 61 percent of the Address table capacity is used
    D. When the switch loses power and reboots
    E. When the phone previously on Fa0/2 is connected/Moved to Fa0/5

    Answer: C E

    Question 15

    Which statement is true about RSTP topology changes?

    A. Only nonedge ports moving to the blocking state generate a TC BPDU.
    B. Any loss of connectivity generates a TC BPDU.
    C. Any change in the state of the port generates a TC BPDU.
    D. Only nonedge ports moving to the forwarding state generate a TC BPDU.
    E. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.

    Answer: D

    Explanation

    When a Switch (Bridge) discovers topology change, it generates a TCN (Topology Change Notification) BPDU (Bridge Protocol Data Unit) and sends the TCN BPDU on its root port. The upstream Switch (Bridge) responds back the sender with TCA (Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit) and TCA (Topology Change Acknowledgment) BPDU (Bridge Protocol Data Unit)
    The upstream Switch (Bridge) (bridge which received the TCN BPDU) generates another TCN BPDU and sends out via its Root Port. The process continues until the Root Switch (Bridge) receives the TCN BPDU.
    When the Root Switch (Bridge) is aware that there is a topology change in the network, it starts to send out its Configuration BPDUs with the topology change (TC) bit set. Configuration BPDUs are received by every Switch (Bridge) in the network and all bridges become aware of the network topology change.

    The switch never generates a TCN when a port configured for PortFast goes up or down -> it means no TC will be created for PortFast (or Edge Port) -> D is correct.

    (Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094797.shtml)

    Question 16

    Refer to the exhibit. Based on the debug output shown in the exhibit, which three statements about HSRP are true? (Choose three.)

    *Mar 1 00 16:43.095: %LINK-3-UPDOWN: Interface Vlan11, changed state to up
    *Mar 1 00 16:43.099: SB: Vl11 Interface up
    *Mar 1 00 16:43.099: SB11: Vl11 Init: a/HSRP enabled
    *Mar 1 00 16:43.099: SB11: Vl11 Init -> Listen
    *Mar 1 00 16:43.295: SB11: Vl11 Hello in 172.16.11.112 Active pri 50 ip 172.16.11.115
    *Mar 1 00 16:43.295: SB11: Vl11 Active router is 172.16.11.112
    *Mar 1 00 16:43.295: SB11: Vl11 Listen: h/Hello rcvd from lower pri Active router (50/172.16.11.112)
    *Mar 1 o o 16:43.295: SB11: Vl11 Active router is local, was 172.16.11.112
    *Mar 1 00 16:43.299: %STANDBY-6-STATECHANGE: Vlan11 Group 11 state Listen -> Active
    *Mar 1 00 16:43.299: SB11: Vl11 Hello out 172.16.11.111 Active pri 100 ip 172.16.11.115
    *Mar 1 00 16:43.303: SB11: Vl11 Hello in 172.16.11.112 Speak pri 50 ip 172.16.11.115
    *Mar 1 00 16:46.207: SB11: Vl11 Hello out 172.16.11.111 Active pri 100 ip 172.16.11.115
    *Mar 1 00 16:49.095: SB11: Vl11 Hello in 172.16.11.112 Speak pri 50 ip 172.16.11.115
    A. The router with IP address 172.16.11.111 has preempt configured.
    B. The final active router is the router with IP address 172.16.11.111.
    C. The router with IP address 172.16.11.112 has nonpreempt configured.
    D. The priority of the router with IP address 172.16.11.112 is preferred over the router with IP address 172.16.11.111.
    E. The router with IP address 172.16.11.112 is using default HSRP priority.
    F. The IP address 172.16.11.115 is the virtual HSRP IP address.

    Answer: A B F

    Question 17

    What action should a network administrator take to enable VTP pruning on an entire management domain?

    A. Enable VTP pruning on any switch in the management domain.
    B. Enable VTP pruning on any client switch in the management domain.
    C. Enable VTP pruning on a VTP server in the management domain.
    D. Enable VTP pruning on every switch in the management domain.
    E. Disable VTP pruning on a VTP server in the management domain.

    Answer: C

    Explanation

    VTP pruning should only be enabled on VTP servers, all the clients in the VTP domain will automatically enable VTP pruning -> C is correct.

    Question 18

    Which two statements are true about best practices in VLAN design? (Choose two.)

    A. Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
    B. Routing may be performed at all layers but is most commonly done at the core and distribution layers.
    C. Routing should not be performed between VLANs located on separate switches.
    D. VLANs should be local to a switch.
    E. VLANs should be localized to a single switch unless voice VLANs are being utilized.

    Answer: B D

    Explanation

    First let’s review main characteristics of three layers in a campus network:

    * Access layer:

    + Low cost per switch port
    + High port density
    + Scalable uplinks to higher layers
    + User access functions such as VLAN membership, traffic and protocol filtering, and quality of service (QoS)
    + Resiliency through multiple uplinks

    * Distribution Layer:

    + Aggregation of multiple access-layer devices
    + High Layer 3 throughput for packet handling
    + Security and policy-based connectivity functions through access lists or packet filters
    + QoS features
    + Scalable and resilient high-speed links to the core and access layers

    * Core layer:

    + Very high throughput at Layer 3
    + No costly or unnecessary packet manipulations (access lists, packet filtering)
    + Redundancy and resilience for high availability
    + Advanced QoS functions

    We can see at Distribution and Core layers, Layer 3 throughput (routing) is very high -> B is correct.

    Nowadays, end-to-end VLANs are not recommended in an enterprise network, unless there is a good reason. In an end-to-end VLAN, broadcast traffic is carried over from one end of the network to the other, creating the possibility for a broadcast storm or Layer 2 bridging
    loop to spread across the whole extent of a VLAN. This can exhaust the bandwidth of distribution and core-layer links, as well as switch CPU resources. Now the storm or loop has disrupted users on the end-to-end VLAN, in addition to users on other VLANs that might
    be crossing the core.

    When such a problem occurs, troubleshooting becomes more difficult. In other words, the risks of end-to-end VLANs outweigh the convenience and benefits.

    From that we can infer VLAN traffic should be local to the switch -> D is correct.

    (Reference: CCNP SWITCH 642-813 Official Certification Guide)

    Question 19

    What is the effect of configuring the following command on a switch?

    Switch(config)# spanning-tree portfast bpdufilter default
    A. If BPDUs are received by a port configured for PortFast, then PortFast is disabled and the BPDUs are processed normally.
    B. If BPDUs are received by a port configured for PortFast, they are ignored and none are sent.
    C. If BPDUs are received by a port configured for PortFast, the port will transition to forwarding state.
    D. The command will enable BPDU filtering on all ports regardless of whether they are configured for BPDU filtering at the interface level.

    Answer: A

    Explanation

    The concept of edge port basically corresponds to the PortFast feature. An edge port directly transitions to the forwarding state, and skips the listening and learning stages. An edge port that receives a BPDU immediately loses edge port status and becomes a normal spanning tree port.

    (Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml#edge)

    Question 20

    An engineer is configuring an Etherchannel between two switches, he notices the error message on Switch 2 (error message channel misconfiguring error), based on the output what is the problem?

    (Exhibit missing)

    A. the etherchannel on the switch 1 using incorrect member port
    B. the etherchannel interface of switch 1 is not configured
    C. the etherchannel protocol on switch 1 is not correct
    D. the etherchannel interface of switch 2 is not configured

    Answer: C

    Explanation

    For this question please remember this:

    The table below lists if an EtherChannel will be formed or not for LACP:

    LACP Active Passive
    Active Yes Yes
    Passive Yes No
    The table below lists if an EtherChannel will be formed or not for PAgP:

    PAgP Desirable Auto
    Desirable Yes Yes
    Auto Yes No
    To form an Etherchannel both sides must use the same Etherchannel protocol (LACP or PAgP). According the two tables above we can see only “desirable” and “auto” (of PAgP) can form an Etherchannel bundle.

    Note: If we want to use “on” mode, both ends must be configured in this “on” mode to create an Etherchannel bundle.

    Question 21

    What condition must match during Etherchannel configuration?

    A. Spanning tree port priority
    B. Spanning tree cost
    C. Interface Description
    D. Trunk mode
    E. Trunk allow vlan

    Answer: D E

    ===============12 New Additional Questions (from Question 22 to 33)===============

    Question 22

    Drag the items on the left to the proper locations on the right.

    PortFast_BPDU_Guard_BPDU_Filter.jpg

    Answer:

    PortFast
    + configured for access users
    + makes immediately transition to forwarding from blocking state

    BPDU Guard
    + change the interface to error-disable
    + prevent from receiving BPDU

    BPDU Filter
    + prevent from sending and receiving BPDU
    + stop spanning tree in the interface

    Question 23

    Drag the items on the left to the proper locations on the right.

    PVST_RPVST_MST.jpg

    Answer:

    PVST
    + 802.1d standard
    + default STP

    RapidPVST
    + 802.1w standard
    + has Discarding port state

    MST
    + 802.1s standard
    + group vlan int instance

    Question 24

    What is the default port security violation?

    A. log
    B. shutdown
    C. no change
    D. error-disable

    Answer: B

    Explanation

    There are three port security violation modes:
    + protect – Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value.
    + restrict – Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and causes the SecurityViolation counter to increment.
    + shutdown – Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.

    The default behavior for a security violation is to shut down that port permanently.

    (Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port_sec.html)

    Question 25

    What is the command for configuring root guard?

    A. (config)#spanning-tree guard root
    B. (config-if)#spanning-tree guard root
    C. (config-if)#spanning-tree root guard
    D. (config-if)spanning tree guard root
    E. (config)#spanning-tree root guard

    Answer: B

    Question 26

    A network engineer wants to use UDLD, what he needs to consider?

    A. UDLD is a non-propriety
    B. UDLD is working with non cisco devices
    C. UDLD is layer 1
    D. UDLD can aggressively disabled the port after eight failed retries

    Answer: D

    Explanation

    The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between devices and ports that support UDLD. UDLD detects the existence of unidirectional links. When a unidirectional link is detected, UDLD puts the affected port into the errdisabled state and alerts the user. UDLD can operate in either normal or aggressive mode.

    UDLD is a Layer 2 protocol that works with the Layer 1 protocols to determine the physical status of a link. At Layer 1, autonegotiation takes care of physical signaling and fault detection. UDLD performs tasks that autonegotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected LAN ports. When you enable both autonegotiation and UDLD, Layer 1 and Layer 2 detections work together to prevent physical and logical unidirectional connections and the malfunctioning of other protocols.

    UDLD aggressive mode is disabled by default. Configure UDLD aggressive mode only on point-to-point links between network devices that support UDLD aggressive mode. With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After eight failed retries, the port is disabled -> D is correct.

    Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/udld.html

    Question 27

    What happens if an interface within channel group is configured as SPAN destination?

    A. portchannel will forward traffic to source span
    B. will not be operational
    C. the link will be in error-disable
    D. The interface will be removed from the channel group

    Answer: D

    Explanation

    A physical port that belongs to an EtherChannel group can be configured as a SPAN source port and still be a part of the EtherChannel. In this case, data from the physical port is monitored as it participates in the EtherChannel. However, if a physical port that belongs to an EtherChannel group is configured as a SPAN destination, it is removed from the group.

    Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swspan.html

    Question 28

    What is Cisco recommendation for RSPAN best practice?

    A. For RSPAN Configuartion you can distribute the source port and the destination ports across multiple switches in your network
    B. Access ports on the RSPAN vlan are put in the inactive state
    C. Configure RSPAN VLAN before you configure an RSPAN source or a destination session
    D. First create a new VLAN to be the RSPAN VLAN for the RSPAN Session

    Answer: D

    Explanation

    Remote SPAN (RSPAN) is used when source ports are not located on the same switch as the Destination port. RSPAN is an advanced feature that requires a special VLAN to carry the monitored traffic and is not supported by all switches.

    The best practice for RSPAN is to configure a dedicated VLAN for RSPAN first.

    Question 29

    What is needed for Virtual Switching System “VSS”?

    A. portchannel
    B. trunk
    C. Virtual Switching Link “or VSL”
    D. Virtual trunk

    Answer: C

    Explanation

    mLACP_VSS.jpg

    Notice that the two chassis of this VSS is connected via a Virtual Switch Link (VSL). VSL is a special link that carries control and data traffic between the two chassis of a VSS. In this case the VSL is implemented as an EtherChannel with two links.

    Question 30

    Which will identify the master switch in stack wise?

    A. lower priority
    B. higher priority
    C. lower ID
    D. higher ID

    Answer: B

    Explanation

    A higher priority value for a stack member increases its likelihood to be elected stack master and to retain its stack member number. The priority value can be 1 to 15. The default priority value is 1.

    Reference: http://www.cisco.com/c/en/us/support/docs/switches/catalyst-3750-series-switches/71925-cat3750-create-switch-stks.html

    Question 31

    An engineer is configuring an EtherChannel between two switches using PAgP. If the EtherChannel mode on switch 1 is configured to auto, which modes on switch 2 establish an operational EtherChannel?

    A. active
    B. auto
    C. desirable
    D. on
    E. passive

    Answer: C

    Explanation

    The table below lists if an EtherChannel will be formed or not for PAgP:

    PAgP Desirable Auto
    Desirable Yes Yes
    Auto Yes No
    Therefore we can see if one end is in “auto”, the other end must be in “desirable” mode to form an Etherchannel.

    Question 32

    Refer to the output.

    R1# show standby
    FastEthernet0/0 – Group 1
    state is active
    2 state changes,last state change 00:20:53
    virtual IP address is 192.168.1.1
    active virtual MAC address is 0000.0c07.ac01
    local virtual MAC address is 0000.0c07.ac01 (v1 default)
    Hello time is 3 sec,hold time is 10 sec
    active router is local
    standby router is 192.168.1.3,priority 80(expires in 9.280
    Track interface Fa0/0 state up decrement 10
    R1#
    A. The link will take over when …..
    B. 192.168.1.3 is active because it has higher IP address
    C. When Fa0/0 is down priority will be 80
    D. It is using default hello and hold values

    Answer: C D

    Question 33

    question about trunk configuration
    int faX/X
    switchport trunk allowed vlan x,x,x,x
    switchport mode trunk
    exit
    show vlan
    VLAN Name Status Ports
    —- ——————————– ——— ——————————-
    1 default active Fa0/1, Fa0/3, Fa0/3, FaX/X
    show interface trunk
    (no output)

    A. link is shutdown
    B. interface needs no shutdown
    C. other side is configured as access port
    D. missing switchport command




    0



    0

Leave a Reply