Cisco® 300-115 Exam Practice Questions (P. 4)
- Full Access (992 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
Refer to the exhibit.

A network engineer investigates a recent network failure and notices that one of the interfaces on the switch is still down. What is causing the line protocol on this interface to be shown as down?

A network engineer investigates a recent network failure and notices that one of the interfaces on the switch is still down. What is causing the line protocol on this interface to be shown as down?
- AThere is a layer 1 physical issue.
- BThere is a speed mismatch on the interface.
- CThe interface is configured as the target of the SPAN session.
- DThe interface is configured as the source of the SPAN session.
- EThere is a duplex mismatch on the interface.
Correct Answer:
C
With the SAPN destination port, the state of the destination port is up/down by design. The interface shows the port in this state in order to make it evident that the port is currently not usable as a production port. This is the normal operational state for SPAN destinations.
Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml
C
With the SAPN destination port, the state of the destination port is up/down by design. The interface shows the port in this state in order to make it evident that the port is currently not usable as a production port. This is the normal operational state for SPAN destinations.
Reference: http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml
send
light_mode
delete
Question #32
While doing network discovery using Cisco Discovery Protocol, it is found that rapid error tracking is not currently enabled. Which option must be enabled to allow for enhanced reporting mechanisms using Cisco Discovery Protocol?
- ACisco Discovery Protocol version 2
- BCisco IOS Embedded Event Manager
- Clogging buffered
- DCisco Discovery Protocol source interface
- ECisco Discovery Protocol logging options
Correct Answer:
A
✑ CDP Version 1 This is the first version of CDP which was used for the discovery of Cisco devices in the network. This version is mainly used for backward compatibility.
✑ CDP Version 2 This is the most recent version of CDP which has enhanced features such as rapid reporting mechanism, which is used to track down errors and minimize costly downtime. It allows you to track instances even if the native VLAN ID or port duplex states do not match between connecting devices. This is the default version on all switches.
Reference: http://sbkb.cisco.com/CiscoSB/GetArticle.aspx?
docid=0ed03cbac49b446ab390a657917d817c_Cisco_Discovery_Protocol_CDP__Properties_Settings_on_Sx500_S.xml&pid=2&converted=0
A
✑ CDP Version 1 This is the first version of CDP which was used for the discovery of Cisco devices in the network. This version is mainly used for backward compatibility.
✑ CDP Version 2 This is the most recent version of CDP which has enhanced features such as rapid reporting mechanism, which is used to track down errors and minimize costly downtime. It allows you to track instances even if the native VLAN ID or port duplex states do not match between connecting devices. This is the default version on all switches.
Reference: http://sbkb.cisco.com/CiscoSB/GetArticle.aspx?
docid=0ed03cbac49b446ab390a657917d817c_Cisco_Discovery_Protocol_CDP__Properties_Settings_on_Sx500_S.xml&pid=2&converted=0
send
light_mode
delete
Question #33
Which technique allows specific VLANs to be strictly permitted by the administrator?
- AVTP pruning
- Btransparent bridging
- Ctrunk allowed VLANs
- DVLAN access-list
- EL2P tunneling
Correct Answer:
C
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the "switchport trunk allowed vlan remove vlan-list" interface configuration command to remove specific VLANs from the allowed list.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_13_ea1/configuration/guide/swvlan.html
C
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the "switchport trunk allowed vlan remove vlan-list" interface configuration command to remove specific VLANs from the allowed list.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_13_ea1/configuration/guide/swvlan.html
send
light_mode
delete
Question #34
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
- AConfigure trunk and access interfaces manually.
- BDisable DTP on a per interface basis.
- CApply BPDU guard and BPDU filter.
- DEnable switchport block on access ports.
Correct Answer:
AB
The Dynamic Trunking Protocol (DTP) is used to negotiate forming a trunk between two Cisco devices. DTP causes increased traffic, and is enabled by default, but may be disabled. To disable DTP, configure "switchport nonegotiate." This prevents the interface from generating DTP frames. You can use this command only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link, otherwise the link will be a non-trunking link.
Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=8
AB
The Dynamic Trunking Protocol (DTP) is used to negotiate forming a trunk between two Cisco devices. DTP causes increased traffic, and is enabled by default, but may be disabled. To disable DTP, configure "switchport nonegotiate." This prevents the interface from generating DTP frames. You can use this command only when the interface switchport mode is access or trunk. You must manually configure the neighboring interface as a trunk interface to establish a trunk link, otherwise the link will be a non-trunking link.
Reference: http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=8
send
light_mode
delete
Question #35
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)
- APPP
- BDTP
- CISL
- DHDLC
- EDLCI
- FDOT1Q
Correct Answer:
CF
Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.
Reference: https://learningnetwork.cisco.com/servlet/JiveServlet/previewBody/14792-102-1-57313/Dynamic%20Trunking%20Protocol.PDF
CF
Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q | isl | negotiate] interface command must be used prior to the switchport mode trunk command.
Reference: https://learningnetwork.cisco.com/servlet/JiveServlet/previewBody/14792-102-1-57313/Dynamic%20Trunking%20Protocol.PDF
send
light_mode
delete
Question #36
A network is running VTPv2. After verifying all VTP settings, the network engineer notices that the new switch is not receiving the list of VLANs from the server.
Which action resolves this problem?
Which action resolves this problem?
- AReload the new switch.
- BRestart the VTP process on the new switch.
- CReload the VTP server.
- DVerify connected trunk ports.
Correct Answer:
D
VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work. The first thing that should be done is to verify that the trunk ports are connected and up.
D
VTP should never need to have the switch reloaded or the VTP process to restart in order for it to work. The first thing that should be done is to verify that the trunk ports are connected and up.
send
light_mode
delete
Question #37
After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is the problem?
- AThe VTP server must be reloaded.
- BThe VTP version number must be set to version 3.
- CAfter each update to the VTP server, it takes up to 4 hours propagate.
- DVTP must be stopped and restarted on the server.
- EAnother switch in the domain has a higher revision number than the server.
Correct Answer:
B
VTP version 3 supports these features that are not supported in version 1 or version 2:
✑ Enhanced authenticationYou can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the
VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key.
✑ Support for extended range VLAN (VLANs 1006 to 4094) database propagation. VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended
VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_52_se/configuration/guide/swvtp.html#wp1316856
B
VTP version 3 supports these features that are not supported in version 1 or version 2:
✑ Enhanced authenticationYou can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the
VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key.
✑ Support for extended range VLAN (VLANs 1006 to 4094) database propagation. VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended
VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_52_se/configuration/guide/swvtp.html#wp1316856
send
light_mode
delete
Question #38
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
- AModify the spanning-tree priorities to dictate the traffic flow.
- BCreate a Layer 3 transit VLAN to segment the traffic between the sites.
- CUse VTP pruning on the trunk interfaces.
- DConfigure manual trunk pruning between the two locations.
Correct Answer:
C
Pruning unnecessary VLANs from the trunk can be performed with one of two methods:
✑ Manual pruning of the unnecessary VLAN on the trunkThis is the best method, and it avoids the use of the spanning tree. Instead, the method runs the pruned VLAN on trunks.
✑ VTP pruningAvoid this method if the goal is to reduce the number of STP instances. VTP-pruned VLANs on a trunk are still part of the spanning tree.
Therefore, VTP-pruned VLANs do not reduce the number of spanning tree port instances.
Since the question asked for the choice that is an enhancement to the STP design, VTP pruning is the best choice.
Reference: http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml
C
Pruning unnecessary VLANs from the trunk can be performed with one of two methods:
✑ Manual pruning of the unnecessary VLAN on the trunkThis is the best method, and it avoids the use of the spanning tree. Instead, the method runs the pruned VLAN on trunks.
✑ VTP pruningAvoid this method if the goal is to reduce the number of STP instances. VTP-pruned VLANs on a trunk are still part of the spanning tree.
Therefore, VTP-pruned VLANs do not reduce the number of spanning tree port instances.
Since the question asked for the choice that is an enhancement to the STP design, VTP pruning is the best choice.
Reference: http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml
send
light_mode
delete
Question #39
The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the problem?
- AThe command effectively removed all other working VLANs and replaced them with the new VLANs.
- BVTP pruning removed all unused VLANs.
- CISL was unable to encapsulate more than the already permitted VLANs across the trunk.
- DAllowing additional VLANs across the trunk introduced a loop in the network.
Correct Answer:
A
The "switchport trunk allowed vlan" command will only allow the specified VLANs, and overwrite any others that were previously defined. You would also need to explicitly allow the other working VLANs to this configuration command, or use the "issue the switchport trunk allowed vlan add vlan-list" command instead to add these 3 VLANS to the other defined allowed VLANs.
Reference: https://supportforums.cisco.com/document/11836/how-define-vlans-allowed-trunk-link
A
The "switchport trunk allowed vlan" command will only allow the specified VLANs, and overwrite any others that were previously defined. You would also need to explicitly allow the other working VLANs to this configuration command, or use the "issue the switchport trunk allowed vlan add vlan-list" command instead to add these 3 VLANS to the other defined allowed VLANs.
Reference: https://supportforums.cisco.com/document/11836/how-define-vlans-allowed-trunk-link
send
light_mode
delete
Question #40
When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?
- A1000
- B1001
- C1024
- D2048
- E4095
- F4096
Correct Answer:
B
VTP versions 1 and 2 Supports normal VLAN numbers (1-1001). Only VTP version 3 supports extended VLANs (1-4095).
Reference: http://cciememo.blogspot.com/2012/11/difference-between-vtp-versions.html
B
VTP versions 1 and 2 Supports normal VLAN numbers (1-1001). Only VTP version 3 supports extended VLANs (1-4095).
Reference: http://cciememo.blogspot.com/2012/11/difference-between-vtp-versions.html
send
light_mode
delete
All Pages