Home > Drag and Drop

Drag and Drop

November 14th, 2019 in SWITCH 300-115 Go to comments

Question 1

Question 2

Question 3

Question 4


There are several STP timers, as this list shows:
+ Hello – is the time between each bridge protocol data unit (BPDU) that is sent on a port. This time is equal to 2 seconds (sec) by default, but you can tune the time to be between 1 and 10 sec.
+ Forward delay – The forward delay is the time that is spent in the listening and learning state. This time is equal to 15 sec by default, but you can tune the time to be between 4 and 30 sec.
+ Max Age – controls the maximum length of time that passes before a bridge port saves its configuration BPDU information. This time is 20 sec by default, but you can tune the time to be between 6 and 40 sec.

Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html

Question 5

Question 6


Bridge transit delay (transit delay)This value is the time that elapsed between the reception and the transmission of the same frame by the bridge. This is logically the latency through the bridge. The IEEE recommendation is to consider 1 sec as the maximum bridge transit delay.

Medium access delay (med_access_delay)—This value is the time that is necessary for a device to gain access to the media for initial transmission. It is the time between the CPU decision to send a frame and the moment when the frame effectively begins to leave the bridge. The IEEE recommendation is to use 0.5 sec as the maximum time.

Question 7

Question 8

Question 9

Question 10

Question 11

Question 12


A source port (also called a monitored port) is a switched or routed port that you monitor for network traffic analysis. In a local SPAN session or RSPAN source session, you can monitor source ports or VLANs for traffic in one or both directions.

A source port has these characteristics:
+ It can be monitored in multiple SPAN sessions.
+ Each source port can be configured with a direction (ingress, egress, or both) to monitor.
+ It can be any port type (for example, EtherChannel, Gigabit Ethernet, and so forth).
+ For EtherChannel sources, you can monitor traffic for the entire EtherChannel or individually on a physical port as it participates in the port channel.
+ It can be an access port, trunk port, routed port, or voice VLAN port.
+ It cannot be a destination port.
+ Source ports can be in the same or different VLANs.
+ You can monitor multiple source ports in a single session.

The two last characteristics mean that multiple VLANs can be included in a single session.

A destination port has these characteristics:
+ For a local SPAN session, the destination port must reside on the same switch or switch stack as the source port. For an RSPAN session, it is located on the switch containing the RSPAN destination session. There is no destination port on a switch or switch stack running only an RSPAN source session.
+ When a port is configured as a SPAN destination port, the configuration overwrites the original port configuration. When the SPAN destination configuration is removed, the port reverts to its previous configuration. If a configuration change is made to the port while it is acting as a SPAN destination port, the change does not take effect until the SPAN destination configuration had been removed.
+ If the port was in an EtherChannel group, it is removed from the group while it is a destination port. If it was a routed port, it is no longer a routed port.
+ It can be any Ethernet physical port.
+ It cannot be a secure port.
+ It cannot be a source port.
+ It cannot be an EtherChannel group or a VLAN.
+ It can participate in only one SPAN session at a time (a destination port in one SPAN session cannot be a destination port for a second SPAN session).
+ When it is active, incoming traffic is disabled. The port does not transmit any traffic except that required for the SPAN session. Incoming traffic is never learned or forwarded on a destination port.
+ If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at Layer 2.
+ It does not participate in any of the Layer 2 protocols (STP, VTP, CDP, DTP, PagP).
+ A destination port that belongs to a source VLAN of any SPAN session is excluded from the source list and is not monitored.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swspan.html

Comment pages
1 7 8 9 929
  1. Chris
    May 1st, 2019

    Valid questions
    Passed switching

    About 10 new questions observed

    Vtp v3
    hsrp branch

  2. Albert
    May 4th, 2019

    Hello Chris, I take the exam on May 7, I’m ready with Certre, this helps me, can you pass me some tips?

  3. Tom
    May 21st, 2019

    Hello ;-)

    if they anyone that have seen a “Drag & Drop” with Switch Stack election….

    Today i had this in my Exam… but i can’t remember the task at the Drag&Drop menue….

  4. Anonymous
    December 4th, 2019

    Did anyone take the text recently ?

  5. Anonymous
    December 17th, 2019

    Did anyone took the exam recently, please share your experience.

  6. polleke
    January 21st, 2020

    Root Guard: a better BPDU does not disables the port as err-disabled state, but in a root-inconsistent state.

  7. polleke
    January 21st, 2020

    Hello BPDU has a default value of 2 sec, not 10 sec.

  8. polleke
    January 21st, 2020

    Path Cost has a range from 1 – 200,000 (100Mbps). But we also have 10Mbps, which would be 2,000,000.

  9. Anonymous
    January 28th, 2020

    Please anyone with the latest dumps should please forward to me utibee at gmail dotcom

  10. utivo
    January 28th, 2020

    Please can anyone help with vce test engine?

  11. switch 300-115
    February 5th, 2020

    D n D got to be same order as answer by network Certprepare, please advise asap I got an exam tomorrow

  12. Exiler652
    February 13th, 2020

    Certprep, these drag and drops in the simulations could do better.

    Simply typing in numbers is not enough.
    Its called drag and drop for a reason!

    Please fix this

  13. nostradamus
    February 16th, 2020

    Q8: in the root guard feature ¿the port self recovery or not?

Comment pages
1 7 8 9 929
  1. No trackbacks yet.