Q1. The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this command impact the traffic? (Choose three.)

A. SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level threshold.

B. The switchport is disabled when unicast traffic reaches 75% of the total interface bandwidth.

C. The switch resumes forwarding broadcasts when they are below 65% of bandwidth.

D. Only broadcast traffic is limited by this particular storm control configuration.

E. Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total interface bandwidth.

F. The switch drops broadcasts when they reach 75% of bandwidth.

Answer: CDF

Q2. A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?

A. A DHCP snooping database agent should be configured.

B. Enable DHCP snooping for all VLANs that are associated with the switch.

C. Disable Option 82 for DHCP data insertion.

D. Use IP Source Guard to protect the DHCP binding table entries from being lost upon rebooting.

E. Apply ip dhcp snooping trust on all interfaces with dynamic addresses.

Answer: A

Q3. Which command would a network engineer apply to error-disable a switchport when a packet-storm is detected?

A. router(config-if)#storm-control action shutdown

B. router(config-if)#storm-control action trap

C. router(config-if)#storm-control action error

D. router(config-if)#storm-control action enable

Answer: A

Q4. Which option is a benefit of using VSS?

A. reduces cost

B. simplifies configuration

C. provides two independent supervisors with two different control planes

D. removes the need for a First Hop Redundancy Protocol

Answer: D

Q5. Which type of information does the DHCP snooping binding database contain?

A. untrusted hosts with leased IP addresses

B. trusted hosts with leased IP addresses

C. untrusted hosts with available IP addresses

D. trusted hosts with available IP addresses

Answer: A

Q6. Refer to the exhibit.

The network switches for two companies have been connected and manually configured for the required VLANs, but users in company A are not able to access network resources in company B when DTP is enabled. Which action resolves this problem?

A. Delete vlan.dat and ensure that the switch with lowest MAC address is the VTP server.

B. Disable DTP and document the VTP domain mismatch.

C. Manually force trunking with switchport mode trunk on both switches.

D. Enable the company B switch with the vtp mode server command.

Answer: C

Q7. Which statement describes what happens when a port configured with root guard receives a superior BPDU?

A. The port goes into errdisabled state and stops forwarding traffic.

B. The port goes into BPDU-inconsistent state and stops forwarding traffic.

C. The port goes into loop-inconsistent state and stops forwarding traffic.

D. The port goes into root-inconsistent state and stops forwarding traffic.

Answer: D

Q8. When you configure private VLANs on a switch, which port type connects the switch to the gateway router?

A. promiscuous

B. community

C. isolated

D. trunked

Answer: A

Q9. What is the default HSRP priority?

A. 50

B. 100

C. 120

D. 1024

Answer: B

Q10. Which authentication service is needed to configure 802.1x?

A. RADIUS with EAP Extension


C. RADIUS with CoA


Answer: A