Question 1
Question
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping
database. What is the solution to avoid the snooping database from being rebuilt after every
device reboot?
Answer
-
A DHCP snooping database agent should be configured.
-
Enable DHCP snooping for all VLANs that are associated with the switch.
-
Disable Option 82 for DHCP data insertion.
-
Use IP Source Guard to protect the DHCP binding table entries from being lost upon rebooting.
-
Apply ip dhcp snooping trust on all interfaces with dynamic addresses.
Question 2
Question
Which portion of AAA looks at what a user has access to?
Answer
-
authorization
-
authentication
-
accounting
-
auditing
Question 3
Question
Which command creates a login authentication method named “login” that will primarily use
RADIUS and fail over to the local user database?
Answer
-
(config)# aaa authentication login default radius local
-
(config)# aaa authentication login login radius local
-
(config)# aaa authentication login default local radius
-
(config)# aaa authentication login radius local
Question 4
Question
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP
snooping. For more protection against malicious attacks, the network team is considering enabling
dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server
maintains network reachability in the future?
Answer
-
Disable DHCP snooping information option.
-
Configure a static DHCP snooping binding entry on the switch.
-
Trust the interface that is connected to the server with the ip dhcp snooping trust command.
-
Verify the source MAC address of all untrusted interfaces with ip dhcp snooping verify macaddress
command.
Question 5
Question
A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN.
Which configuration must be made before the private VLAN is configured?
Answer
-
Disable VTP and manually assign VLANs.
-
Ensure all switches are configured as VTP server mode.
-
Configure VTP Transparent Mode.
-
Enable VTP version 3.
Question 6
Question
DHCP snooping and IP Source Guard have been configured on a switch that connects to several
client workstations. The IP address of one of the workstations does not match any entries found in
the DHCP binding database. Which statement describes the outcome of this scenario?
Answer
-
Packets from the workstation will be rate limited according to the default values set on the switch.
-
The interface that is connected to the workstation in question will be put into the errdisabled state.
-
Traffic will pass accordingly after the new IP address is populated into the binding database.
-
The packets originating from the workstation are assumed to be spoofed and will be discarded.
Question 7
Question
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP
snooping. IP Source Guard with the ip verify source port-security command is configured under
the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an
IP address via the DHCP server. Which option is the cause of this issue?
Answer
-
The DHCP server does not support information option 82.
-
The DHCP client interfaces have storm control configured.
-
Static DHCP bindings are not configured on the switch.
-
DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address
allocation.
Question 8
Question
A switch is added into the production network to increase port capacity. A network engineer is
configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip
verify source under several of the interfaces. Which option is the cause of the problem?
Answer
-
The local DHCP server is disabled prior to enabling IP Source Guard.
-
The interfaces are configured as Layer 3 using the no switchport command.
-
No VLANs exist on the switch and/or the switch is configured in VTP transparent mode
-
The switch is configured for sdm prefer routing as the switched database management template.
-
The configured SVIs on the switch have been removed for the associated interfaces.
Question 9
Question
The command storm-control broadcast level 75 65 is configured under the switch port
connected to the corporate mail server. In which three ways does this command impact the traffic?
(Choose three.)
Answer
-
SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level threshold.
-
The switchport is disabled when unicast traffic reaches 75% of the total interface bandwidth.
-
The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
-
Only broadcast traffic is limited by this particular storm control configuration.
-
Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total interface
bandwidth
-
The switch drops broadcasts when they reach 75% of bandwidth.
Question 10
Question
After port security is deployed throughout an enterprise campus, the network team has been
overwhelmed with port reset requests. They decide to configure the network to automate the
process of re-enabling user ports. Which command accomplishes this task?
Answer
-
switch(config)# errdisable recovery interval 180
-
switch(config)# errdisable recovery cause psecure-violation
-
switch(config)# switchport port-security protect
-
switch(config)# switchport port-security aging type inactivity
-
switch(config)# errdisable recovery cause security-violation
Question 11
Question
The network monitoring application alerts a network engineer of a client PC that is acting as a
rogue DHCP server. Which two commands help trace this PC when the MAC address is known?
(Choose two.)
Answer
-
switch# show mac address-table
-
switch# show port-security
-
switch# show ip verify source
-
switch# show ip arp inspection
-
switch# show mac address-table address <mac address>
Question 12
Question
While troubleshooting a network outage, a network engineer discovered an unusually high level of
broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of
bandwidth used by broadcast traffic?
Question 13
Question
Which command globally enables AAA on a device?
Answer
-
aaa new-model
-
aaa authentication
-
aaa authorization
-
aaa accounting
Question 14
Question
Which AAA Authorization type includes PPP, SLIP, and ARAP connections?
Answer
-
network
-
IP mobile
-
EXEC
-
auth-proxy
Question 15
Question
Which authentication service is needed to configure 802.1x?
Question 16
Question
Refer to the exhibit.
Which login credentials are required when connecting to the console port in this output?
Answer
-
none required
-
username cisco with password cisco
-
no username with password linepass
-
login authentication default
Question 17
Question
Refer to the exhibit.
When a network administrator is attempting an SSH connection to the device, in which order does
the device check the login credentials?
Answer
-
RADIUS server, local username, line password
-
RADIUS server, line password, local username
-
Line password, local username, RADIUS server
-
Line password, RADIUS server, local username
Question 18
Question
Which type of information does the DHCP snooping binding database contain?
Answer
-
untrusted hosts with leased IP addresses
-
trusted hosts with leased IP addresses
-
untrusted hosts with available IP addresses
-
trusted hosts with available IP addresses
Question 19
Question
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a
trusted database?
Answer
-
Dynamic ARP Inspection
-
storm control
-
VTP pruning
-
DHCP snooping
Question 20
Question
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP
server?
Question 21
Question
Which private VLAN access port belongs to the primary VLAN and can communicate with all
interfaces, including the community and isolated host ports?
Answer
-
promiscuous port
-
isolated port
-
community port
-
trunk port
Question 22
Question
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional
traffic upstream from the hosts toward the promiscuous ports and the gateway?
Answer
-
isolated VLAN
-
primary VLAN
-
community VLAN
-
promiscuous VLAN
Question 23
Question
Which database is used to determine the validity of an ARP packet based on a valid IP-to-MAC
address binding?
Answer
-
DHCP snooping database
-
dynamic ARP database
-
dynamic routing database
-
static ARP database
Question 24
Question
When IP Source Guard with source IP filtering is enabled on an interface, which feature must be
enabled on the access VLAN for that interface?
Answer
-
DHCP snooping
-
storm control
-
spanning-tree portfast
-
private VLAN
Question 25
Question
Which switch feature prevents traffic on a LAN from being overwhelmed by continuous multicast or
broadcast traffic?
Answer
-
storm control
-
port security
-
VTP pruning
-
VLAN trunking
Question 26
Question
Which command would a network engineer apply to error-disable a switchport when a packet-storm is detected?
Answer
-
router(config-if)#storm-control action shutdown
-
router(config-if)#storm-control action trap
-
router(config-if)#storm-control action error
-
router(config-if)#storm-control action enable
Question 27
Question
A network engineer configures port security and 802.1x on the same interface. Which option
describes what this configuration allows?
Answer
-
It allows port security to secure the MAC address that 802.1x authenticates.
-
It allows port security to secure the IP address that 802.1x authenticates.
-
It allows 802.1x to secure the MAC address that port security authenticates.
-
It allows 802.1x to secure the IP address that port security authenticates.
Question 28
Question
Which feature describes MAC addresses that are dynamically learned or manually configured,
stored in the address table, and added to the running configuration?
Answer
-
sticky
-
dynamic
-
static
-
secure
Question 29
Question
On which interface can port security be configured?
Question 30
Question
When you configure private VLANs on a switch, which port type connects the switch to the
gateway router?
Answer
-
promiscuous
-
community
-
isolated
-
trunked
Question 31
Question
When you configure a private VLAN, which type of port must you configure the gateway router port
as?
Answer
-
promiscuous port
-
isolated port
-
community port
-
access port