Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
CCNP Switch Ch 3

CCNP Switch Ch 3

Ratings: (0)|Views: 3,147 |Likes:
Published by sheni7

More info:

Published by: sheni7 on Dec 06, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Chapter 3 Q&A
1) Which protocol should an administrator recommend to manage bridged links when the customerrequires a fully redundant network that can utilize load balancing technologies and reconverge on linkfailures in less than a second?
 IEEE 802.1Q (CST)>IEEE 802.1s (MST) Cisco PVST+IEEE 802.1D(STP)  
2) Refer to the exhibit. What implementation of spanning tree best describes the spanning-treeoperational mode of the switch?
 >IEEE 802.1D IEEE 802.wIEEE 802.1sPVRST+ 
3) Which interfaces should loop guard be enabled on?
 root portsdesignated ports
>root port and alternate ports ports configured with PortFastroot port and ports configured with PortFast  
4) Refer to the exhibit. What two conclusions does the output show to be true? (Choose two.)
 >DLS1 is running IEEE 802.1s on instance 1. DLS1 is running IEEE 802.1D on instance 1.>DLS1 is the root bridge for instance 1. Interface Fa0/12 will move into the errdisable state if a BPDU is received.Interfaces Fa0/1 through Fa0/6 are trunk ports. 
5) Which three statements about RSTP are true? (Choose three.)
 >An RSTP BPDU carries information about port roles and is sent to neighbor switches only. >RSTP elects a root bridge in exactly the same way as 802.1D. RSTP is capable of reverting back to 802.1D but still maintains the benefits of 802.1w.>RSTP is recognized as the IEEE 802.1w standard. There are only three RSTP port states: discarding, listening, and forwarding.UplinkFast and BackboneFast are compatible with RSTP. 
6) Users complain that they lost connectivity to all resources in the network. A network administratorsuspects the presence of a bridging loop as a root cause of the problem. Which two actions willdetermine the existence of the bridging loop? (Choose two.)
Confirm MAC port security is enabled on all access switches.>Check the port utilization on devices and look for abnormal values. Verify that the management VLAN is properly configured on all root bridges.>Capture the traffic on the saturated link and verify if duplicate packets are seen. Ensure that the root guard and loop guard are properly configured on all distribution links.  
7) Refer to the exhibit. Switch SW1 is receiving traffic from SW2. However, SW2 is not receiving trafficfrom SW1. Which STP feature should be implemented to prevent inadvertent loops in the network?
 >UDLD PortFastBPDU guardBPDU filtering 
8) Which three parameters should match all switches within an MST region? (Choose three.)
 port costs on trunk ports>configuration name >revision number trunk encapsulation methodbridge priority>VLAN-to-instance mappings  
9) Which STP timer defines the length of time spent in the listening and learning states?
 hello timeforward aging>forward delay max agemax delay 

Activity (25)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
drazenmd liked this
Petter Jakobsson liked this
Darhijav Darhia liked this
Washirekho Jorem liked this
Grant Davis liked this
El Patron 1 liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->