Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 300-115 Exam - Cheat-Test.com

Free 300-115 Sample Questions:

Q: 1
What three tasks will a network administrator perform to successfully configure Hot Standby Routing Protocol (HSRP)? (Choose three.)
A. Define the encapsulation type
B. Define the standby router
C. Define the standby IP address
D. Enable the standby mode
E. Enable HSRP
Answer: B,C,E

Q: 2
What is one method that can be used to prevent VLAN hopping?
A. Configure ACLs.
B. Enforce username and password combinations.
C. Configure all frames with two 802.1Q headers.
D. Explicitly turn off DTP on all unused ports.
E. Configure VACLs.
Answer: D

Q: 3
By default, which statement is correct when an IEEE 802.1Q trunk port receives an untagged frame?
A. The frame is considered in the native VLAN and forwarded to the ports associated with that VLAN.
B. The frame is encapsulated and tagged as in the native VLAN.
C. The frame is broadcast on all ports regardless of VLAN association.
D. The frame is dropped.
Answer: A

Q: 4
When you create a network implementation for a VLAN solution, what is one procedure that you should include in your plan?
A. Perform an incremental implementation of components.
B. Implement the entire solution and then test end-to-end to make sure that it is performing as designed.
C. Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.
D. Test the solution on the production network in off hours.
Answer: A

Q: 5
Which three statements about STP timers are true? (Choose three.)
A. STP timers values (hello, forward delay, max age) are included in each BPDU.
B. A switch is not concerned about its local configuration of the STP timers values. It will only consider the value of the STP timers contained in the BPDU it is receiving.
C. To successfully exchange BPDUs between two switches, their STP timers value (hello, forward delay, max age) must be the same.
D. If any STP timer value (hello, forward delay, max age) needs to be changed, it should at least be changed on the root bridge and backup root bridge.
E. On a switched network with a small network diameter, the STP hello timer can be tuned to a lower value to decrease the load on the switch CPU.
F. The root bridge passes the timer information in BPDUs to all routers in the Layer 3 configuration.
Answer: A,B,D

Q: 6
Which two statements are true about BPDU port-guard and BPDU filtering? (Choose two.)
A. BPDU port-guard can be enabled globally, whereas BPDU filtering must be enabled on a per-interface basis.
B. When globally enabled, BPDU port-guard and BPDU filtering apply only to PortFast enabled ports.
C. When globally enabled, BPDU port-guard and BPDU filtering apply only to trunking-enabled ports.
D. When a BPDU is received on a BPDU port-guard enabled port, the interface goes into the err-disabled state.
E. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the err-disabled state.
F. When a BPDU is received on a BPDU filtering enabled port, the interface goes into the STP blocking state.
Answer: B,D

Q: 7
Which of the following is not information provided from an IP phone to a Catalyst switch using CDP? (Select the best answer.)
A. device PoE requirements
B. device IP address
C. device voice VLAN ID
D. device platform
Answer: C

Q: 8
You are the administrator of a switch and currently all host-connected ports are configured with the portfast command. You have received a new directive from your manager that states that, in the future, any host-connected port that receives a BPDU should automatically disable PortFast and begin transmitting BPDUs. Which of the following commands will support this new requirement?
A. Switch(config)#spanning-tree portfast bpduguard default
B. Switch(config-if)#spanning-tree bpduguard enable
C. Switch(config-if)#spanning-tree bpdufilter enable
D. Switch(config)#spanning-tree portfast bpdufilter default
Answer: D

Q: 9
A campus infrastructure supports wireless clients via Cisco Aironet AG Series 1230, 1240, and 1250 access points. With DNS and DHCP configured, the 1230 and 1240 access points appear to boot and operate normally; however, the 1250 access points do not seem to operate correctly.
What is the most likely issue causing this problem?
A. DHCP with option 150
B. DHCP with option 43
C. PoE
D. DNS
E. switch port does not support gigabit speeds
Answer: C

Q: 10
Wireless has been operating correctly in the campus infrastructure. After the wireless controllers are upgraded from LWAPP to CAPWAP, access points no longer boot and operate normally. What is the most likely issue causing this problem?
A. VLAN assignments
B. DHCP option 43
C. PoE
D. ACL
E. QoS
Answer: D

Q: 11
You need to design router redundancy on the Company network. Which three protocols could be chosen for IP routing redundancy to protect against first-hop router failure? (Choose three)
A. GLBP
B. ICMP
C. MSTP
D. HSRP
E. VRRP
F. NHRP
Answer: A,D,E

Q: 12
Company uses GLBP to provide for router redundancy in the network. Which describes the default load balancing scheme used by the Gateway Load Balancing Protocol (GLBP)?
A. Per host basis using a strict priority scheme
B. Per session using a round-robin scheme
C. Per session using a strict priority scheme
D. Per GLBP group using a strict priority scheme
E. Per host basis using a round-robin scheme
F. Per GLBP group using a round-robin scheme
Answer: E

Q: 13
The Cisco AutoQoS feature is being used throughout the Company VOiP network. Which three statements about this feature are true? (Select three)
A. The "mls qos" global configuration command must be entered before configuring AutoQoS.
B. CEF must be enabled.
C. The "no auto qos voip" command is used to disable Cisco AutoQos and revoke all configurations generated by Cisco AutoQos.
D. CDP must be enabled.
E. SNMP must be enabled.
Answer: B,C,D

Q: 14
You need to configure a new Company Catalyst 3560 switch for a VOiP-enabled office. Which three statements are true about the voice VLAN feature on this switch? (select three)
A. The default Cos value for incoming traffic is set up to 0.
B. The Cos value is trusted for 802.1p or 802.1q tagged traffic.
C. PortFast is automatically disabled when a voice VLAN is configured.
D. The voice VLAN feature is disabled by default.
E. The iP phone accepts the priority of all tagged and untagged traffic and sets the Cos value to 4.
F. When the voice VLAN feature is enabled, all untagged traffic is sent according to the default Cos priority of the port
Answer: A,D,F

Q: 15
Which three QoS mechanisms can be configured to improve VoIP quality on a converged network? Select three.
A. The use of a queuing method that will give VoIP traffic strict priority over other traffic
B. The use of RTP header compression for the VoIP traffic.
C. The proper classification and marking of the traffic as close to the source as possible
D. The use of 802.1QinQ trunking for VoIP traffic
E. The use of WRED for the VoIP traffic
Answer: A,C,E

Q: 16
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.
Which two statements correctly describe features of this protocol? (Choose two)
A. Control traffic between an access point and a controller is encrypted within LWAPP.
B. Data traffic between an access point and a controller is encrypted within LWAPP.
C. Layer 3 mode packets are transmitted in TCP frames.
D. Data traffic between an access point and a controller is encapsulated within LWAPP.
E. VLAN tagging and QoS markings are applied at the access point.
Answer: A,D

Q: 17
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.
Which statement is true about this protocol?
A. Real-time frame exchange is accomplished within the access point.
B. The control traffic between the client and the access point is encapsulated with the LWAPP.
C. Authentication, security, and mobility are handled by the access point.
D. Data traffic between the client and the access point is encapsulated with LWAPP.
E. None of the other alternatives apply
Answer: A

Q: 18
A new Aironet 1200 series AP has been installed in the Company WLAN. What happens when this device is connected to the LAN, with a default configuration?
A. The access point will attempt to download an encryption key from the nearest wireless server.
B. The access point makes several attempts to get an IP address from the DHCP server. If the access point does not receive an address, it assigns itself the IP address 10.0.0.1 for 5 minutes.
C. The access point will attempt to connect to the nearest wireless server using LEAP authentication.
D. The access point requests an IP address from the DHCP server. If the access point does not receive an address, it continues to send requests indefinitely.
E. None of the other alternatives apply
Answer: D

Q: 19
lnter-VLAN routing has been implemented in the Company network. ln VLAN routing, what are some of the disadvantages of designing a router-on-stick configuration? (Select three)
A. lnterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for lnterVLAN accounting.
Answer: B,D,E

Q: 20
An attacker is launching a Dos attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack?
A. Configure only trusted interfaces with root guard.
B. Implement private VLANs (PVLANs) to carry only user traffic.
C. Implement private VLANs (PVLANs) to carry only DHCP traffic.
D. Configure only untrusted interfaces with root guard.
E. Configure DHCP spoofing on all ports that connect untrusted clients.
F. Configure DHCP snooping only on ports that connect trusted DHCP servers.
G. None of the other alternatives apply
Answer: F


© 2014 Cheat-Test.com, All Rights Reserved