P.S. Verified 300-115 study guides are available on Google Drive, GET MORE: https://drive.google.com/open?id=18vBmk6S7TFCKhZwKBGhuuThdM-QUxSR-
Q10. Refer to the exhibit.
How many bytes are added to each frame as a result of the configuration?
A. 4-bytes except the native VLAN
B. 8-bytes except the native VLAN
C. 4-bytes including native VLAN
D. 8-bytes including native VLAN
Answer: A
Q11. After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
A. switch(config)# errdisable recovery interval 180
B. switch(config)# errdisable recovery cause psecure-violation
C. switch(config)# switchport port-security protect
D. switch(config)# switchport port-security aging type inactivity
E. switch(config)# errdisable recovery cause security-violation
Answer: B
Q12. An engineer is configuring an EtherChannel between two switches using LACP. If the EtherChannel mode on switch 1 is configured to active, which two modes on switch 2 establish an operational EtherChannel? (Choose two.)
A. active
B. auto
C. desirable
D. on
E. passive
Answer: A,E
Q13. Which option is a Cisco recommended RSPAN configuration practice?
A. Define an RSPAN VLAN before configuring an RSPAN source or destination session.
B. Use a different RSPAN VLAN for each session if configuring RSPAN on multiple switches.
C. Assign access ports to an RSPAN VLAN like any other campus VLAN.
D. Use only one destination port for each RSPAN session.
Answer: A
Q14. Your customer has asked you to come in and verify the operation of routers R1 and R2 which are configured to use HSRP. They have questions about how these two devices will perform in the event of a device failure.
What is the virtual mac-address of HSRP group 1?
A. 0000.0c07.ac02
B. 4000.0000.0010
C. 0000.0c07.ac01
D. 4000.0000.ac01
E. 4000.0000.ac02
F. 0000.0c07.0010
Answer: B
Q15. Which option is valid for EtherChannel load balancing?
A. source MAC address and source IP address
B. destination MAC address and destination IP address
C. source MAC address and destination IP address
D. source MAC address and destination MAC address
Answer: D
Q16. A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?
A. The local DHCP server is disabled prior to enabling IP Source Guard.
B. The interfaces are configured as Layer 3 using the no switchport command.
C. No VLANs exist on the switch and/or the switch is configured in VTP transparent mode.
D. The switch is configured for sdm prefer routing as the switched database management template.
E. The configured SVIs on the switch have been removed for the associated interfaces.
Answer: B
Topic 3, Exam Set C
170.What happens spoofed packet or something like untrusted packet is detected? (Choose three)
A. log
B. deletes
C. intercepts
D. accepts
E. discad
Q17. Refer to the exhibit.
Which option describes the reason for this message in a GLBP configuration?
A. Unavailable GLBP active forwarder
B. Incorrect GLBP IP address
C. HSRP configured on same interface as GLBP
D. Layer 2 loop
Answer: D
Q18. You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.
Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to the SW4 switch. Which of the following configuration steps will allow creating private VLANs?
A. Disable VTP pruning on SW1 only
B. Disable VTP pruning on SW2 only
C. Disable VTP pruning on SW4 only
D. Disable VTP pruning on SW2, SW4 and New_Switch
E. Disable VTP pruning on New_Switch and SW4 only.
Answer: C
Explanation:
To create private VLANs, you will need to only disable pruning on the switch that contains the private VLANs. In this case, only SW4 will connect to servers in a private VLAN.
Q19. A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU of the switch to spike during peak working hours. What is the root cause of this issue?
A. The VLAN receives additional frames from neighboring switches.
B. The SDM VLAN template causes the MAC address-table to overflow.
C. The VLAN template disables routing in hardware.
D. The switch needs to be rebooted before the SDM template takes effect.
Answer: C
Q20. Refer to the exhibit.
DSW1 should share the same MST region with switch DSW2. Which statement is true?
A. Configure DSW1 with the same version number, and VLAN-to-instance mapping as shown on DSW2.
B. DSW2 uses the VTP server mode to automatically propagate the MST configuration to DSW1.
C. DSW1 automatically inherits MST configuration from DSW2 because they have the same domain name.
D. Configure DSW1 with the same region name, revision number, and VLAN-to-instance mapping as shown on DSW2.
E. DSW1 is in VTP client mode with a lower configuration revision number, therefore, it automatically inherits MST configuration from DW2.
Answer: D
Recommend!! Get the Verified 300-115 dumps in VCE and PDF From Certifytools, Welcome to download: https://www.certifytools.com/300-115-exam.html (New 416 Q&As Version)