[Free] 2019(Nov) EnsurePass Cisco 300-115 Dumps with VCE and PDF 61-70

Get Full Version of the Exam

Question No.61

Interface FastEthernet0/1 is configured as a trunk interface that allows all VLANs. This command is configured globally:

monitor session 2 filter vlan 1 – 8, 39, 52

What is the result of the implemented command?

  1. All VLAN traffic is sent to the SPAN destination interface.

  2. Traffic from VLAN 4 is not sent to the SPAN destination interface.

  3. Filtering a trunked SPAN port effectively disables SPAN operations for all VLANs.

  4. The trunk#39;s native VLAN must be changed to something other than VLAN 1.

  5. Traffic from VLANs 1 to 8, 39, and 52 is replicated to the SPAN destination port.

Correct Answer: E


The quot;monitor session filterquot; command is used to specify which VLANS are to be port mirrored using SPAN. This example shows how to monitor VLANs 1 through 5 and VLAN 9 when the SPAN source is a trunk interface:

Switch(config)# monitor session 2 filter vlan 1 – 5 , 9

Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12- 2/25ew/configuration/guide/conf/span.html/index.html#wp1066836

Question No.62

Which statement about the use of SDM templates in a Cisco switch is true?

  1. SDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network.

  2. SDM templates are used to create Layer 3 interfaces (switch virtual interfaces) to permit hosts in one VLAN to communicate with hosts in another VLAN.

  3. SDM templates are used to configure ACLs that protect networks and specific hosts from unnecessary or unwanted traffic.

  4. SDM templates are used to configure a set of ACLs that allows the users to manage the flow of traffic handled by the route processor.

  5. SDM templates are configured by accessing the switch using the web interface.

Correct Answer: A


You can use SDM templates to configure system resources in the switch to optimize support for

specific features, depending on how the switch is used in the network. You can select a template to provide maximum system usage for some functions; for example, use the default template to balance resources, and use access template to obtain maximum ACL usage. To allocate hardware resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features.

Reference:http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/ 12.2_55_se/configuration/guide/swsdm.pdf

Question No.63

Which statement about LLDP-MED is true?

  1. LLDP-MED is an extension to LLDP that operates between endpoint devices and network devices.

  2. LLDP-MED is an extension to LLDP that operates only between network devices.

  3. LLDP-MED is an extension to LLDP that operates only between endpoint devices.

  4. LLDP-MED is an extension to LLDP that operates between routers that run BGP.

Correct Answer: A


LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint devices such as IP phones and network devices such as switches. It specifically provides support for voice over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power over Ethernet, and inventory management.

Reference:http://www.cisco.com/en/US/docs/switches/metro/me3400/software/release/12.2_58_s e/configuration/guide/swlldp.pdf

Question No.64

When two MST instances (MST 1 and MST 2) are created on a switch, what is the total number of spanning-tree instances running on the switch?









Correct Answer: C


Unlike other spanning tree protocols, in which all the spanning tree instances are independent, MST establishes and maintains IST, CIST, and CST spanning trees:

http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gifAn IST is the spanning tree that runs in an MST region.

Within each MST region, MST maintains multiple spanning tree instances. Instance 0 is a special instance for a region, known as the IST. All other MST instances are numbered from 1 to 4094.In the case for this question, there will be the 2 defined MST instances, and the special 0 instance, for a total of 3 instances.

The IST is the only spanning tree instance that sends and receives BPDUs. All of the other spanning tree instance information is contained in MSTP records (M-records), which are encapsulated within MST BPDUs. Because the MST BPDU carries information for all instances, the number of BPDUs that need to be processed to support multiple spanning tree instances is significantly reduced.

All MST instances within the same region share the same protocol timers, but each MST instance has its own topology parameters, such as root bridge ID, root path cost, and so forth. By default, all VLANs are assigned to the IST.

An MST instance is local to the region; for example, MST instance 1 in region A is independent of MST instance 1 in region B, even if regions A and B are interconnected.

A CIST is a collection of the ISTs in each MST region.

The CST interconnects the MST regions and single spanning trees.

Reference:http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/spantree.html

Question No.65

Which SDM template is the most appropriate for a Layer 2 switch that provides connectivity to a large number of clients?

  1. VLAN

  2. default

  3. access

  4. routing

Correct Answer: A


To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features. You can select SDM templates to optimize these features:

AccessThe access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.

DefaultThe default template gives balance to all functions.

RoutingThe routing template maximizes system resources for IPv4 unicast routing, typically required for a router or aggregator in the center of a network.

VLANsThe VLAN template disables routing and supports the maximum number of unicast MAC addresses (clients). It would typically be selected for a Layer 2 switch.



Question No.66

Which option describes a limitation of LLDP?

  1. LLDP cannot provide information about VTP.

  2. LLDP does not support TLVs.

  3. LLDP can discover only Windows servers.

  4. LLDP can discover up to two devices per port.

Correct Answer: A


LLDP Versus Cisco Discovery Protocol TLV Comparison Function Description


Cisco Discovery Protocol TLV

IP network prefix support-Used to send the network prefix and used for ODR No

IP Network Prefix TLV

Hello piggybacking-Can be used to piggy back hello messages from other protocols No

Protocol Hello TLV

Maximum-transmission-unit (MTU) support-Specifies the size of the MTU



External port support-Used to identify the card terminating the fiber in the case of wavelength- division multiplexing (WDM)


External Port-ID TLV

VTP management support No

VTP Management Domain TLV

Port unidirectional mode-Used in fiber, where the connection may be unidirectional No

Port UniDirectional Mode TLV Management address Management Address TLV Management-AddressTLV

Allows for organizational unique TLVs Yes


Reference:http://www.cisco.com/en/US/technologies/tk652/tk701/technologies_white_paper0900 aecd804cd46d.html

Question No.67

Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?

  1. portfast

  2. port-security

  3. spanning tree

  4. storm control

Correct Answer: A


Voice VLAN Configuration Guidelines

You should configure voice VLAN on switch access ports.

The voice VLAN should be present and active on the switch for the IP phone to correctly communicate on the voice VLAN. Use the show vlan privileged EXEC command to see if the VLAN is present (listed in the display).

The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice VLAN, the Port Fast feature is not automatically disabled.



Question No.68

Refer to the exhibit. A network engineer investigates a recent network failure and notices that one of the interfaces on the switch is still down. What is causing the line protocol on this interface to be shown as down?


  1. There is a layer 1 physical issue.

  2. There is a speed mismatch on the interface.

  3. The interface is configured as the target of the SPAN session.

  4. The interface is configured as the source of the SPAN session.

  5. There is a duplex mismatch on the interface.

Correct Answer: C


With the SAPN destination port, the state of the destination port is up/down by design. The interface shows the port in this state in order to make it evident that the port is currently not usable as a production port. This is the normal operational state for SPAN destinations.

Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a00801 5c612.shtml

Question No.69

After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem?

  1. The VTP server must be reloaded.

  2. The VTP version number must be set to version 3.

  3. After each update to the VTP server, it takes up to 4 hours propagate.

  4. VTP must be stopped and restarted on the server.

  5. Another switch in the domain has a higher revision number than the server.

Correct Answer: B


VTP version 3 supports these features that are not supported in version 1 or version 2:

Enhanced authenticationYou can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key.

Support for extended range VLAN (VLANs 1006 to 4094) database propagation. VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.



Question No.70

While working in the core network building, a technician accidently bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did not recover. What solution allows the network switch to automatically recover from such an issue?

  1. macros

  2. errdisable autorecovery

  3. IP Event Dampening

  4. command aliases

  5. Bidirectional Forwarding Detection

Correct Answer: B


There are a number of events which can disable a link on a Catalyst switch, such as the detection of a loopback, UDLD failure, or a broadcast storm. By default, manual intervention by an administrator is necessary to restore the interface to working order; this can be done by issuing shutdown followed by no shutdown on the interface. The idea behind requiring administrative action is so that a human engineer can intercede, assess, and (ideally) correct the issue.

However, some configurations may be prone to accidental violations, and a steady recurrence of these can amount to a huge time sink for the administrative staff.

This is where errdisable autorecovery can be of great assistance. We can configure the switch to automatically re-enable any error-disabled interfaces after a specified timeout period. This gives the offending issue a chance to be cleared by the user (for example, by removing an unapproved device) without the need for administrative intervention.

Reference: http://packetlife.net/blog/2009/sep/14/errdisable-autorecovery/

Get Full Version of the Exam
300-115 Dumps
300-115 VCE and PDF

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com