QUESTION 1
Refer to the exhibit. Which Catalyst switch configuration would protect a customer network from
possible disruption in the case in which an unauthorized switch is added to the network?
A. Switch0#show running-configuration
!
hostname Switch0
!
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1
switchport protected
!
B. Switch0#show running-configuration
!
hostname Switch0
!
spanning-tree portfast bpduguard default
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1
spanning-tree guard root
!
C. Switch0#show running-configuration
!
hostname Switch0
!
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1 switchport mode access
!
D. Switch0#show running-configuration
!
hostname Switch0
!
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet0/1
switchport port-security violation restrict
i
Answer: B
QUESTION 2
While troubleshooting a network outage, you discover that an employee brought a switch from
home into the office to connect additional equipment to the network. In order to increase his
speed, he connected this switch to both network ports in his office, resulting in a bridge loop.
Which of these can you implement to prevent future occurrences of this issue?
A. RSTP
B. root guard
C. BPDU guard
D. GLBP
Answer: C
QUESTION 3
Refer to the exhibit. For the given configuration, on packets leaving the router on interface
FastEthernet0/0 that matches the high traffic class, what will the MPLS experimental bit be set to?
A. 0
B. 1
C. 2
D. 3
E. 4
F- 5
Answer: D
QUESTION 4
Which tool allows a LAN client to determine which router should be the first hop to a particular
remote destination, allowing simplified client configuration and processing without creating a single
point of failure?
A. ProxyARP
B. Dynamic Routing Protocol
C. IRDP
D. VRRP
Answer: D
QUESTION 5
When implementing MPLS VPNs between CE and PE routers, which of these statements is
correct?
A. If using IS-IS as the PE-CE routing protocol, no redistribution is required.
B. If using static routes between the CE and PE routers, no redistribution of other VPN routes is
required.
C. If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required
D. If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is
required, but any other protocol will require redistribution.
E. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any
other protocol or static route will require redistribution.
Answer: C
QUESTION 6
You would like to log messages up to the severity level “Notification.” Which three of these
commands will you need to issue in order to enable syslog messages to be sent to the syslog
server at the IP address 10.1.5.5? (Choose three.)
A. logging on
B. logging host 10.1.5.5
C. logging trap notifications
D. loggingsyslog notifications
E. logging monitor notifications
F- logging console notifications
Answer: A,B,C
Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com