CCNP Switch 300-115 Exam Questions and Answers PDF

By | December 12, 2019

The authentic Cisco 300-115 dumps of DumpsSchool provide candidates updated knowledge about the topics of planning, configuring, and verifying the implementation of complex enterprise switching solutions.

Try it Latest DumpsSchool 300-115 Exam dumps. Buy Full File here: https://www.dumpsschool.com/300-115-exam-dumps.html (598 As Dumps)

Download the DumpsSchool 300-115 braindumps from Google Drive: https://drive.google.com/file/d/1uXOJ4P6dTD5Y0yHTh4idgOX6UhoLLQIA/view (FREE VERSION!!!)

Question No. 1

DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?

Answer: D

Question No. 2

A physical switch port is part of an EtherChannel group. What happens while the same port is configured as a SPAN destination?

Answer: A

Question No. 3

Refer to the exhibit.

f1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport f1/1 as a primary port?

Answer: C

Question No. 4

To provide security, a service provider configures various private VLANs in its backbone network infrastructure to prevent certain VLAN communication to each other. Which version of VTP supports the use of private VLANs?

Answer: B

Question No. 5

Which two commands displays IP Source Guard bindings? (Choose two)

Answer: B, E

Question No. 6

In which circumstances does a port security violation occur? (Choose two.)

Answer: A, E

Question No. 7

Which of two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)

Answer: D, E

Question No. 8

A network engineer is setting up a new switched network. The network is expected to grow and add many new VLANs in the future. Which Spanning Tree Protocol should be used to reduce switch resources and managerial burdens that are associated with multiple spanning-tree instances?

Answer: C

Question No. 9

Which two functions of DHCP snooping are true? (Choose two.)

Answer: B, C

Question No. 10

Refer to the exhibit.

The users in an engineering department that connect to the same access switch cannot access the network. The network engineer found that the engineering VLAN is missing from the database. Which action resolves this problem?

Answer: C

Question No. 11

What is the maximum number of virtual MAC addresses that GLBP allows per group?

Answer: B

Question No. 12

Your company wants to connect an internal switch to the uplink provider switch.

What method / feature / functions you need to enable to prevent initial / potential

broadcast of internal information/topology?

Answer: A

Question No. 13

Which option is the maximum frame size for an 802.1Q frame?

Answer: D

Question No. 14

A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?

Answer: A

Question No. 15

The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.)

Answer: A, E

Question No. 16

Which two statements are true of root guard? (Choose two)

Answer: C, D

300-115 Dumps Google Drive: (Limited Version!!!)
https://drive.google.com/file/d/1uXOJ4P6dTD5Y0yHTh4idgOX6UhoLLQIA/view

Related Certification: Cisco dumps