Cisco® 300-115 Exam Practice Questions (P. 5)
- Full Access (992 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
What does the command vlan dot1q tag native accomplish when configured under global configuration?
- AAll frames within the native VLAN are tagged, except when the native VLAN is set to 1.
- BIt allows control traffic to pass using the non-default VLAN.
- CIt removes the 4-byte dot1q tag from every frame that traverses the trunk interface(s).
- DControl traffic is tagged.
Correct Answer:
D
The "vlan dot1q tag native" will tag all untagged frames, including control traffic, with the defined native VLAN.
D
The "vlan dot1q tag native" will tag all untagged frames, including control traffic, with the defined native VLAN.
send
light_mode
delete
Question #42
A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported, so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?
- AIRDP
- BLLDP
- CNDP
- DLLTD
Correct Answer:
B
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol (CDP).
Reference: http://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol
B
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol (CDP).
Reference: http://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol
send
light_mode
delete
Question #43
A manager tells the network engineer to permit only certain VLANs across a specific trunk interface. Which option can be configured to accomplish this?
- Aallowed VLAN list
- BVTP pruning
- CVACL
- DL2P tunneling
Correct Answer:
A
When a trunk link is established, all of the configured VLANs are allowed to send and receive traffic across the link. VLANs 1 through 1005 are allowed on each trunk by default. However, VLAN traffic can be removed from the allowed list. This keeps traffic from the VLANs from passing over the trunk link.
Note: The allowed VLAN list on both the ends of the trunk link should be the same.
For Integrated Cisco IOS Software based switches, perform these steps:
1. To restrict the traffic that a trInk carries, issue the switchport trunk vlan-Iist interface configuration command.
This removes specific VLANs from the allowed list.
Reference: https://supportforums.cisco.com/document/11836/how-define-vlans-allowed-trunk-link
A
When a trunk link is established, all of the configured VLANs are allowed to send and receive traffic across the link. VLANs 1 through 1005 are allowed on each trunk by default. However, VLAN traffic can be removed from the allowed list. This keeps traffic from the VLANs from passing over the trunk link.
Note: The allowed VLAN list on both the ends of the trunk link should be the same.
For Integrated Cisco IOS Software based switches, perform these steps:
1. To restrict the traffic that a trInk carries, issue the switchport trunk vlan-Iist interface configuration command.
This removes specific VLANs from the allowed list.
Reference: https://supportforums.cisco.com/document/11836/how-define-vlans-allowed-trunk-link
send
light_mode
delete
Question #44
For client server failover purposes, the application server team has indicated that they must not have the standard 30 second delay before their switchport enters a forwarding state. For their disaster recovery feature to operate successfully, they require the switchport to enter a forwarding state immediately. Which spanning- tree feature satisfies this requirement?
- ARapid Spanning-Tree
- BSpanning-Tree Timers
- CSpanning-Tree FastPort
- DSpanning-Tree PortFast
- ESpanning-Tree Fast Forward
Correct Answer:
D
In order to allow immediate transition of the port into forwarding state, enable the STP PortFast feature. PortFast immediately transitions the port into STP forwarding mode upon linkup. The port still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mode.
Example configuration:
Switch-C# configure terminal -
Switch-C(config)# interface range fa0/3 - 24
Switch-C(config-if-range)# spnning-tree portfast
Reference: http://www.informit.com/library/content.aspx?b=CCNP_Studies_Switching&seqNum=36
D
In order to allow immediate transition of the port into forwarding state, enable the STP PortFast feature. PortFast immediately transitions the port into STP forwarding mode upon linkup. The port still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mode.
Example configuration:
Switch-C# configure terminal -
Switch-C(config)# interface range fa0/3 - 24
Switch-C(config-if-range)# spnning-tree portfast
Reference: http://www.informit.com/library/content.aspx?b=CCNP_Studies_Switching&seqNum=36
send
light_mode
delete
Question #45
Which command does a network engineer use to verify the spanning-tree status for VLAN 10?
- Aswitch# show spanning-tree vlan 10
- Bswitch# show spanning-tree bridge
- Cswitch# show spanning-tree brief
- Dswitch# show spanning-tree summary
- Eswitch# show spanning-tree vlan 10 brief
Correct Answer:
A

Example output:
SW2#show spanning-tree vlan 10 -
VLAN0010 -
Spanning tree enabled protocol rstp
Root ID Priority 24586 -
Address 0014.f2d2.4180 -
Cost 9 -
Port 216 (Port-channel21)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32778 (priority 32768 sys-id-ext 10)
Address 001c.57d8.9000 -
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec -
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- ---------------------------
Po21 Root FWD 9 128.216 P2p
Po23 Altn BLK 9 128.232 P2p
Reference: http://www.cisco.com/en/US/docs/ios/lanswitch/command/reference/lsw_s2.html
A

Example output:
SW2#show spanning-tree vlan 10 -
VLAN0010 -
Spanning tree enabled protocol rstp
Root ID Priority 24586 -
Address 0014.f2d2.4180 -
Cost 9 -
Port 216 (Port-channel21)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32778 (priority 32768 sys-id-ext 10)
Address 001c.57d8.9000 -
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec -
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- ---------------------------
Po21 Root FWD 9 128.216 P2p
Po23 Altn BLK 9 128.232 P2p
Reference: http://www.cisco.com/en/US/docs/ios/lanswitch/command/reference/lsw_s2.html
send
light_mode
delete
Question #46
A new network that consists of several switches has been connected together via trunking interfaces. If all switches currently have the default VTP domain name
"null", which statement describes what happens when"a do"ain name is configured on one of the switches?
"null", which statement describes what happens when"a do"ain name is configured on one of the switches?
- AThe switch with the non-default domain name restores back to "null" upon reboot.
- BSwitches with higher revisio" num"ers does not accept the new domain name.
- CVTP summary advertisements are sent out of all ports with the new domain name.
- DAll other switches with the default domain name become VTP clients.
Correct Answer:
C
By default, a switch will have a domain name of NULL and no password. If the switch hears a VTP advertisement it will automatically learn the VTP domain name,
VLANs, and the configuration revision number.
Summary advertisements sent out every 300 seconds and every time a change occurs on the VLAN database. Contained in a summary advertisement:
✑ VTP version
✑ Domain name
✑ Configuration revision number
✑ Time stamp
✑ MD5 encryption hash code
Reference: https://rowell.dionicio.net/configuring-cisco-vtp/
C
By default, a switch will have a domain name of NULL and no password. If the switch hears a VTP advertisement it will automatically learn the VTP domain name,
VLANs, and the configuration revision number.
Summary advertisements sent out every 300 seconds and every time a change occurs on the VLAN database. Contained in a summary advertisement:
✑ VTP version
✑ Domain name
✑ Configuration revision number
✑ Time stamp
✑ MD5 encryption hash code
Reference: https://rowell.dionicio.net/configuring-cisco-vtp/
send
light_mode
delete
Question #47
A network engineer is setting up a new switched network. The network is expected to grow and add many new VLANs in the future. Which Spanning Tree Protocol should be used to reduce switch resources and managerial burdens that are associated with multiple spanning-tree instances?
- ARSTP
- BPVST
- CMST
- DPVST+
- ERPVST+
Correct Answer:
C
Multiple Spanning Tree (MST) extends the IEEE 802.1w RST algorithm to multiple spanning trees. The main purpose of MST is to reduce the total number of spanning-tree instances to match the physical topology of the network and thus reduce the CPU cycles of a switch. PVRST+ runs STP instances for each VLAN and does not take into consideration the physical topology that might not require many different STP topologies. MST, on the other hand, uses a minimum number of STP instances to match the number of physical topologies present.
Figure 3-15 shows a common network design, featuring an access Switch A, connected to two Building Distribution submodule Switches D1 and D2. In this setup, there are 1000 VLANs, and the network administrator typically seeks to achieve load balancing on the access switch uplinks based on even or odd VLANsor any other scheme deemed appropriate.

Figure 3-15: VLAN Load Balancing
Figure 3-15 illustrates two links and 1000 VLANs. The 1000 VLANs map to two MST instances. Rather than maintaining 1000 spanning trees, each switch needs to maintain only two spanning trees, reducing the need for switch resources.
Reference: http://ciscodocuments.blogspot.com/2011/05/chapter-03-implementing-spanning-tree_19.html
C
Multiple Spanning Tree (MST) extends the IEEE 802.1w RST algorithm to multiple spanning trees. The main purpose of MST is to reduce the total number of spanning-tree instances to match the physical topology of the network and thus reduce the CPU cycles of a switch. PVRST+ runs STP instances for each VLAN and does not take into consideration the physical topology that might not require many different STP topologies. MST, on the other hand, uses a minimum number of STP instances to match the number of physical topologies present.
Figure 3-15 shows a common network design, featuring an access Switch A, connected to two Building Distribution submodule Switches D1 and D2. In this setup, there are 1000 VLANs, and the network administrator typically seeks to achieve load balancing on the access switch uplinks based on even or odd VLANsor any other scheme deemed appropriate.

Figure 3-15: VLAN Load Balancing
Figure 3-15 illustrates two links and 1000 VLANs. The 1000 VLANs map to two MST instances. Rather than maintaining 1000 spanning trees, each switch needs to maintain only two spanning trees, reducing the need for switch resources.
Reference: http://ciscodocuments.blogspot.com/2011/05/chapter-03-implementing-spanning-tree_19.html
send
light_mode
delete
Question #48
Which statement about the use of SDM templates in a Cisco switch is true?
- ASDM templates are used to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network.
- BSDM templates are used to create Layer 3 interfaces (switch virtual interfaces) to permit hosts in one VLAN to communicate with hosts in another VLAN.
- CSDM templates are used to configure ACLs that protect networks and specific hosts from unnecessary or unwanted traffic.
- DSDM templates are used to configure a set of ACLs that allows the users to manage the flow of traffic handled by the route processor.
- ESDM templates are configured by accessing the switch using the web interface.
Correct Answer:
A
You can use SDM templates to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network. You can select a template to provide maximum system usage for some functions; for example, use the default template to balance resources, and use access template to obtain maximum ACL usage. To allocate hardware resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_55_se/configuration/guide/swsdm.pdf
A
You can use SDM templates to configure system resources in the switch to optimize support for specific features, depending on how the switch is used in the network. You can select a template to provide maximum system usage for some functions; for example, use the default template to balance resources, and use access template to obtain maximum ACL usage. To allocate hardware resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_55_se/configuration/guide/swsdm.pdf
send
light_mode
delete
Question #49
Which SDM template disables routing and supports the maximum number of unicast MAC addresses?
- AVLAN
- Baccess
- Cdefault
- Drouting
Correct Answer:
A
To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features. You can select SDM templates to optimize these features:
✑ Access The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
✑ Default The default template gives balance to all functions.
✑ Routing The routing template maximizes system resources for Ipv4 unicast routing, typically required for a router or aggregator in the center of a network.
✑ VLANs The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a
Layer 2 switch.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/swsdm.pdf
A
To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features. You can select SDM templates to optimize these features:
✑ Access The access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
✑ Default The default template gives balance to all functions.
✑ Routing The routing template maximizes system resources for Ipv4 unicast routing, typically required for a router or aggregator in the center of a network.
✑ VLANs The VLAN template disables routing and supports the maximum number of unicast MAC addresses. It would typically be selected for a
Layer 2 switch.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/swsdm.pdf
send
light_mode
delete
Question #50
Which SDM template is the most appropriate for a Layer 2 switch that provides connectivity to a large number of clients?
- AVLAN
- Bdefault
- Caccess
- Drouting
Correct Answer:
A
To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features. You can select SDM templates to optimize these features:
✑ AccessThe access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
✑ DefaultThe default template gives balance to all functions.
✑ RoutingThe routing template maximizes system resources for Ipv4 unicast routing, typically required for a router or aggregator in the center of a network.
✑ VLANsThe VLAN template disables routing and supports the maximum number of unicast MAC addresses (clients). It would typically be selected for a Layer 2 switch.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/swsdm.pdf
A
To allocate ternary content addressable memory (TCAM) resources for different usages, the switch SDM templates prioritize system resources to optimize support for certain features. You can select SDM templates to optimize these features:
✑ AccessThe access template maximizes system resources for access control lists (ACLs) to accommodate a large number of ACLs.
✑ DefaultThe default template gives balance to all functions.
✑ RoutingThe routing template maximizes system resources for Ipv4 unicast routing, typically required for a router or aggregator in the center of a network.
✑ VLANsThe VLAN template disables routing and supports the maximum number of unicast MAC addresses (clients). It would typically be selected for a Layer 2 switch.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_55_se/configuration/guide/swsdm.pdf
send
light_mode
delete
All Pages