IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CCNP 300-115 (Implementing Cisco IP Switched Networks (SWITCH))공부문제

성공을 위해 길을 찾고 실패를 위해 구실을 찾지 않는다는 말이 있습니다. CCNP 300-115 (Implementing Cisco IP Switched Networks (SWITCH))시험이 영어로 출제되어 시험패스가 너무 어렵다 혹은 회사다니느라 공부할 시간이 없다는 등등은 모두 공부하기싫은 구실에 불과합니다. Pass4Test의 CCNP 300-115 (Implementing Cisco IP Switched Networks (SWITCH))덤프만 마련하면 실패를 성공으로 바꿀수 있는 기적을 체험할수 있습니다.








NO.1 What is the maximum number of 10 Gigabit Ethernet connections that can be
utilized in an

EtherChannel for the virtual switch link?

A. 4

B.
6

C. 8

D. 12

Answer: C



NO.2
Which VTP mode is needed to configure an extended VLAN, when a switch is
configured to use

VTP versions 1 or 2?

A. transparent

B. client

C.
server

D. Extended VLANs are only supported in version 3 and not in versions
1 or 2.

Answer: D

Explanation:

VTP version 1 and version 2 support
VLANs 1 to 1000 only. Extended-range VLANs are supported only

in VTP version
3.

If converting from VTP version 3 to VTP version 2, VLANs in the range 1006
to 4094 are removed from

VTP
control.





NO.3
Which private VLAN access port belongs to the primary VLAN and can communicate
with all

interfaces, including the community and isolated host ports?

A.
promiscuous port

B. isolated port

C. community port

D. trunk
port

Answer: A



NO.4
Which AAA Authorization type includes PPP, SLIP, and ARAP connections?

A.
network

B. IP mobile

C. EXEC

D. auth-proxy

Answer:
A



NO.5
A network engineer configures port security and 802.1x on the same interface.
Which option

describes what this configuration allows?

A. It allows port
security to secure the MAC address that 802.1x authenticates.

B. It allows
port security tosecure the IP address that 802.1x authenticates.

C. It allows
802.1x to secure the MAC address that port security authenticates.

D. It
allows 802.1x to secure the IP address that port security
authenticates.

Answer: A



NO.6
Which technique automatically limits VLAN traffic to only the switches that
require it?

A. access lists

B. DTP in nonegotiate

C. VTP pruning

D.
PBR

Answer: C



NO.7
Refer to the exhibit.

When a network administrator is attempting an SSH
connection to the device, in which order does

the device check the login
credentials?

A. RADIUS server, local username, line password

B. RADIUS
server, line password, local username

C. Line password, local username,
RADIUS server

D. Line password, RADIUS server, local username

Answer:
A



NO.8 Refer to the exhibit.

A network engineer investigates a
recent network failure and notices that one of the interfaces on

the switch
is still down. What is causing the line protocol on this interface to be shown
as down?

A. There is a layer 1 physical issue.

B. There is a speed
mismatch on the interface.

C. The interface is configured as the target of
the SPAN session.

D. The interface is configured as the source of the SPAN
session.

E. There is a duplex mismatch on the interface.

Answer:
C



Posted 2015/3/16 9:48:09  |  Category: cisco  |  Tag: 300-115 공부문제