Tuesday, 9 August 2016

300-115 Sample Question: 14

QUESTION: 14

After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state?

A. Normal UDLD operations that prevent traffic loops.
B. UDLD port is configured in aggressive mode.
C. UDLD is enabled globally.
D. UDLD timers are inconsistent.

Answer: B

Explanation:
With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After eight failed retries, the port is disabled.

Monday, 25 July 2016

300-115 Sample Question: 13

QUESTION: 13

Which technique automatically limits VLAN traffic to only the switches that require it?

A. access lists
B. DTP in nonegotiate
C. VTP pruning
D. PBR

Answer : C

Friday, 1 July 2016

300-115 Sample Question: 12

QUESTION: 12

What is the function of NSF?

A. forward traffic simultaneously using both supervisors
B. forward traffic based on Cisco Express Forwarding
C. provide automatic failover to back up supervisor in VSS mode
D. provide nonstop forwarding in the event of failure of one of the member supervisors

Answer : D

Wednesday, 15 June 2016

300-115 Sample Question: 11

QUESTION: 11

A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose two.)

A. port-priority
B. cost
C. forward-timers
D. link type
E. root guard

Answer: A,B

Tuesday, 3 May 2016

Cisco Systems, Inc. (NASDAQ:CSCO): Check on Earnings

Wall Street pays special attention when Cisco Systems, Inc. today released its next quarterly report should go in or around for the period ending.

The last quarter of the street expected $ 0.44 per share, according to the consensus of Zack with the actual result reported as $ 0.53.
The difference in estimated and actual played a surprise of 20.45% or a difference of $ 0.09 factor.

A big surprise factor may signal significant changes in the share price immediately after a tax return, or in the days following the report. As the date approaches earnings report, analysts can update their models based on the feeling of Wall Street and the ad business.

These can be key indicators that point to whether the earnings results meet or exceed consensus expectations.

Mixing trends of earnings, future earnings expectations and issued by the company and the projected direction, many analysts covering also predict the future number of target populations that followed the price. These reports are sent to institutions to help assist in making investment decisions.

These issues are also available for retail investors across multiple platforms. At the time of writing, the goal of consensus courses on shares of Cisco Systems, Inc. (NASDAQ: CSCO) is $ 29,136. This is with 22 analysts sales by Zacks Research. The analyst sees more favorable outlook for equities to $ 37 target, while the more conservative analyst provided a target of $ 22 on the stock.

Registration of recommendations, 15 analysts have marked the high population Buy 1 offered a recommendation to buy, 8 0 Wait and sales. All these recommendations can be translated into a numerical scale of 1 to 5 to create a corridor of average rating.

A small number (1-2) indicates a consensus Buy, an average number (2.5-3.5) indicates an expectation and any number of more than 4 indicate a degree of consensus sale. At the time of writing of Cisco Systems, Inc. shares are traded 1.84 consensus.

Thursday, 7 April 2016

300-115 Sample Question: 10

Question: 10

After configuring new data VLANs 1020 through 1030 on the VTP server, a network engineer notices that none of the VTP clients are receiving the updates. What is
the problem?

A. The VTP server must be reloaded.
B. The VTP version number must be set to version 3.
C. After each update to the VTP server, it takes up to 4 hours propagate.
D. VTP must be stopped and restarted on the server.
E. Another switch in the domain has a higher revision number than the server.

Correct Answer: B
Explanation: 
VTP version 3 supports these features that are not supported in version 1 or version 2:
Enhanced authentication--You can configure the authentication as hidden or secret. When hidden, the secret key from the password string is saved in the VLAN database file, but it does not appear in plain text in the configuration. Instead, the key associated with the password is saved in hexadecimal format in the running configuration. You must reenter the password if you enter a takeover command in the domain. When you enter the secret keyword, you can directly configure the password secret key.
Support for extended range VLAN (VLANs 1006 to 4094) database propagation. VTP versions 1 and 2 propagate only VLANs 1 to 1005. If extended VLANs are configured, you cannot convert from VTP version 3 to version 1 or 2.

Thursday, 31 March 2016

300-115 Sample Question: 9

Question: 9

A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery Protocol, but it has several routing neighbor relationships. What would cause the output to show only the single neighbor?

A. The routers are connected via a Layer 2 switch.
B. IP routing is disabled on neighboring devices.
C. Cisco Express Forwarding is enabled locally.
D. Cisco Discovery Protocol advertisements are inconsistent between the local and remote devices.

Correct Answer: A
Explanation:
If all of the routers are connected to each other using a layer 2 switch, then each router will only have the single switch port that it connects to as its neighbor. Even though multiple routing neighbors can be formed over a layer 2 network, only the physical port that it connects to will be seen as a CDP neighbor. CDP can be used to determine the physical topology, but not necessarily the logical topology.