Answers to the “Do I Know This Already?” Quizzes - Appendixes - CCNP Routing and Switching SWITCH 300-115 Official Cert Guide (2015)

CCNP Routing and Switching SWITCH 300-115 Official Cert Guide (2015)

Part IX. Appendixes

Appendix A. Answers to the “Do I Know This Already?” Quizzes

Chapter 1

1. A

2. C

3. B

4. C

5. C

6. C

7. C

8. D

9. C

10. C

11. A, B

12. A, C, E

13. D

14. A, C

15. C, D, E

16. B

17. B, C

Chapter 2

1. B

2. B

3. B

4. C

5. C

6. B

7. C

8. D

9. B

10. C

11. D

12. B

Chapter 3

1. C

2. B. All forms of Ethernet share a common operation at the data link layer.

3. A. All forms of Ethernet are different at the physical layer.

4. B

5. B

6. B

7. C

8. C

9. D. Even though you will probably want to disable and reenable the port to get it back in operation, you should begin by figuring out what caused the port to become errdisabled in the first place. Otherwise, if you reenable the port, the same error condition may cause it to fail again.

10. E

11. D

12. B

13. B

14. D

Chapter 4

1. C

2. B

3. B

4. B

5. B

6. C

7. D

8. C

9. B

10. A

11. C

12. A

13. B, C. Interface Gig1/0/33 is not listed as a member of VLAN 10, so it could be configured for a different VLAN. The interface could also be configured as a trunk carrying one or more VLANs. In that case, it would not be listed as a member of VLAN 10 only.

14. C. Because the interfaces begin with their default configurations, each one uses native VLAN 1. Even though the interfaces are not configured with a consistent list of allowed VLANs, that will not prevent the trunk link from being negotiated. The real reason the trunk is not working is that both switches are configured with dynamic auto mode, causing neither switch to actively negotiate a trunk. Instead, each switch is waiting for the other one to ask for a trunk link.

15. A

16. D

17. E

18. A

Chapter 5

1. C

2. A

3. C

4. B

5. B

6. B, C

7. A

8. C

9. B

10. C

11. B

12. D

Chapter 6

1. C

2. C

3. B

4. B

5. C

6. A

7. B

8. D

9. B

10. B

11. C

Chapter 7

1. C

2. C

3. C

4. D

5. C

6. C

7. C

8. B

9. D

10. C

11. A

12. A

13. D

14. C

Chapter 8

1. B

2. C

3. C

4. B

5. B

6. A

7. B

8. B

9. C

10. C

11. C

12. B

13. B

Chapter 9

1. A

2. C

3. A

4. C

5. A

6. B

7. C

8. D

9. C

10. D

11. B

12. C

Chapter 10

1. E

2. C

3. C

4. D

5. C

6. C

7. A

8. D

9. B

10. C

11. C

12. C

13. C

Chapter 11

1. D

2. A

3. A

4. B

5. C

6. C

7. C

8. D

9. C

10. C

11. C

Chapter 12

1. B

2. C

3. A

4. A

5. C

6. D

7. B

8. D

Chapter 13

1. E

2. D

3. C

4. A

5. B

6. B

7. C

8. B

Chapter 14

1. A

2. C

3. D

4. C

5. B

6. D

7. C

8. E

Chapter 15

1. B. The IP SLA feature may be configured on Cisco switches from the CLI. A third-party platform is not necessary, but may be used to ease the configuration and analysis if you need to set up many IP SLA tests.

2. A, C

3. D

4. B

5. B

6. D

Chapter 16

1. C

2. A, B, D, E

3. C

4. D

5. A

6. B

7. B, C

8. B, D

Chapter 17

1. C

2. D

3. A

4. C

5. B

6. B

7. B

Chapter 18

1. D

2. D

3. C

4. B

5. B

6. B

7. C

8. C

9. C

10. B

Chapter 19

1. C

2. D

3. B

4. B. The trick is in the maximum 3 keywords. This sets the maximum number of addresses that can be learned on a port. If only one static address is configured, two more addresses can be learned dynamically.

5. C

6. A

7. B

8. C

9. C. Because of the variety of user host platforms, port-based authentication (802.1X) cannot be used. The problem also states that the goal is to restrict access to physical switch ports, so AAA is of no benefit. Port security can do the job by restricting access according to the end users’ MAC addresses.

10. B, C, D

11. C

12. B, D

13. C

Chapter 20

1. C

2. D

3. D

4. A

5. B

6. A

7. C

8. A

9. D

10. A

11. A

12. C

Chapter 21

1. B

2. B

3. C, D

4. C

5. B

6. C

Chapter 22

1. B, C, E

2. B

3. C, E

4. D

5. C

6. A

7. B

8. B

9. A, C. The aaa authorization command separates the switch command and configuration command functions so that each can have its own method list. The respective keywords are aaa authorization commands and aaa authorization config-commands.

10. B