QUESTION: 16
A network engineer tries to configure storm control on an EtherChannel bundle. What is the result of the configuration?
A. The storm control settings will appear on the EtherChannel, but not on the associated physical ports.
B. The configuration will be rejected because storm control is not supported for EtherChannel.
C. The storm control configuration will be accepted, but will only be present on the physical interfaces.
D. The settings will be applied to the EtherChannel bundle and all associated physical interfaces.
Answer: D
Explanation:
After you configure an EtherChannel, any configuration that you apply to the port-channel interface affects the EtherChannel; any configuration that you apply to the physical interfaces affects only the interface where you apply the configuration. Storm Control is an exception to this rule. For example, you cannot configure Storm Control on some of the members of an EtherChannel; Storm Control must be configured on all or none of the ports. If you configure Storm Control on only some of the ports, those ports will be dropped from the EtherChannel interface (put in suspended state). Therefore, you should configure Storm Control at the EtherChannel Interface level, and not at the physical interface level.
Monday, 23 January 2017
Wednesday, 28 December 2016
300-115 Sample Question: 15
QUESTION: 15
Pilot testing of the new switching infrastructure finds that when the root port is lost, STP immediately replaces the root port with an alternative root port. Which spanning-tree technology is used to accomplish backup root port selection?
A. PVST+
B. PortFast
C. BackboneFast
D. UplinkFast
E. Loop Guard
F. UDLD
Answer: D
Pilot testing of the new switching infrastructure finds that when the root port is lost, STP immediately replaces the root port with an alternative root port. Which spanning-tree technology is used to accomplish backup root port selection?
A. PVST+
B. PortFast
C. BackboneFast
D. UplinkFast
E. Loop Guard
F. UDLD
Answer: D
Wednesday, 14 December 2016
New Cisco FindIT Network Management Platform
Friends:
The team is excited, especially our FindIT Product Manager, David Harper for the announcement of its monitoring network and management platform.
But why?
The market offers companies a wide range of networking options. There are more than a handful of ways to provide the backbone of your business with a robust routing, switching and wireless solution. Begins with a router base with switch integrated and wireless access point: given an all-in-one-solution that we have probably owned at one time. And from there, the sky is the limit.
Visibility:
Once, you or your network administrator configuration IS the network and few waited until something happened. Sometimes it goes well for a time, even years. But not always. Time to diagnosis, solving problems, maybe even a RIP and replace.
If all goes well, rinse and repeat started. But if the "fix" moved to something more... If only you can take a view of what was going on.
Clarity:
Cisco FindIT is a platform for network monitoring and management (NMM) for our series of Cisco access wireless WAP, RV 100-500 Points, 200 series and switching series of routers. Networking FindIT is a network based on the subscription of the solution of services consisting in two applications: sensor and Manager.
The FindIT probe resides on a local network in the premises. The Manager of FindIT is able to reside in a place whose sensors can communicate with it in the cloud. Cisco FindIT platform allows the monitoring of the network and management.
You can remotely configure, configure, and deploy our products by pushing the configuration files remotely.
Access our products as if they were sitting, connected to the product physically, but literally anywhere. Yes, you can create a VLAN, VPN tunnels, configure the wireless settings, adjust the QoS configuration, office either, but from his chair.
With an intuitive dashboard, reports of capacity, maintenance and life-cycle management, firmware management and a range of features, remote network monitoring and management a reality.
Which?
If you are an in-house team or a managed services provider or whatever between, it's an interesting tool for any professional to help you simplify the creation, deployment, configuration and network management. Long we heard say that this visibility and clarity to improve our products. An improved user experience.
One thing we know, managed services can and will be extended provides an opportunity to increase revenue through higher ALS, saving time and expenses.
Please take look at a short Video for Cisco FindIT.
Tuesday, 9 August 2016
300-115 Sample Question: 14
QUESTION: 14
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state?
A. Normal UDLD operations that prevent traffic loops.
B. UDLD port is configured in aggressive mode.
C. UDLD is enabled globally.
D. UDLD timers are inconsistent.
Answer: B
Explanation:
With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After eight failed retries, the port is disabled.
After UDLD is implemented, a Network Administrator noticed that one port stops receiving UDLD packets. This port continues to reestablish until after eight failed retries. The port then transitions into the errdisable state. Which option describes what causes the port to go into the errdisable state?
A. Normal UDLD operations that prevent traffic loops.
B. UDLD port is configured in aggressive mode.
C. UDLD is enabled globally.
D. UDLD timers are inconsistent.
Answer: B
Explanation:
With UDLD aggressive mode enabled, when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD packets, UDLD tries to reestablish the connection with the neighbor. After eight failed retries, the port is disabled.
Monday, 25 July 2016
300-115 Sample Question: 13
QUESTION: 13
Which technique automatically limits VLAN traffic to only the switches that require it?
A. access lists
B. DTP in nonegotiate
C. VTP pruning
D. PBR
Answer : C
Which technique automatically limits VLAN traffic to only the switches that require it?
A. access lists
B. DTP in nonegotiate
C. VTP pruning
D. PBR
Answer : C
Friday, 1 July 2016
300-115 Sample Question: 12
QUESTION: 12
What is the function of NSF?
A. forward traffic simultaneously using both supervisors
B. forward traffic based on Cisco Express Forwarding
C. provide automatic failover to back up supervisor in VSS mode
D. provide nonstop forwarding in the event of failure of one of the member supervisors
Answer : D
What is the function of NSF?
A. forward traffic simultaneously using both supervisors
B. forward traffic based on Cisco Express Forwarding
C. provide automatic failover to back up supervisor in VSS mode
D. provide nonstop forwarding in the event of failure of one of the member supervisors
Answer : D
Wednesday, 15 June 2016
300-115 Sample Question: 11
QUESTION: 11
A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose two.)
A. port-priority
B. cost
C. forward-timers
D. link type
E. root guard
Answer: A,B
A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose two.)
A. port-priority
B. cost
C. forward-timers
D. link type
E. root guard
Answer: A,B
Subscribe to:
Posts (Atom)