Home > Share your SWITCH v2.0 Experience

Share your SWITCH v2.0 Experience

February 7th, 2015 Go to comments
Note: The last day to take this SWITCH 300-115 exam is February 23, 2020. After this day you have to take new Enterprise exams to get new CCNP Enterprise certification. If you want to find out more about the new exams please visit here.

Please share with us your materials, the way you learned, your feeling and experience after taking the SWITCH v2.0 exam… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Note: Posting email is not allowed in the comment section.

Your posts are warmly welcome!

Comments
Comment pages
1 8 9 10 11 12 53 742
  1. CCNP-Switch
    January 20th, 2020

    @Guohua Abel. Congratulations! You only got two D&D questions? Please upload the dump if possible. Thank you!

  2. shanaka
    January 20th, 2020

    Can anyone share me a valid dump to “{email not allowed}”

  3. Anonymous
    January 20th, 2020

    Which err-disable recovery command option enables a device to recover from an incorrect SFP state?
    A. sfp-config-mismatch
    B. gbic-invalid
    C. port-mode-failure
    D. link-monitor-failure
    Answer: A o B???

  4. Dan21
    January 20th, 2020

    @Anonymous

    It’s B

    Can someone explain to me why premium is worth it if they are giving out the free October PDF?

  5. Anonymous
    January 20th, 2020

    Sorry if i dinn’t respond. If you want my dump write me – nasa4me ‘at’ yahoo ‘dot’ com. I passed SWITCH last week (870pts) – LACP with STP Sim, HSRP Sim, VTPv3 Sim. I used different dumps, which had all question on test, but not on certprepare. Certprepare i used only for comparing. I had about 2 new easy questions about Radius/TACACS and BPDU guard. Everything else was in my dumps. Good luck to everybody!

  6. Dan21
    January 20th, 2020

    What is default behavior expected upon running the ip dhcp snooping vlan 10
    command?

    A. All of the switch ports in VLAN 10 are un trusted.
    B. All of the switch ports in VLAN 10 are trusted.
    C. The user can obtain an IP address are DHCP.
    D. All of the ports that are not placed in VLAN 10 are un trusted.

  7. COULD anyone share VTP v3 answers please
    January 20th, 2020

    COULD anyone share VTP v3 answers please

  8. Ans
    January 20th, 2020

    B

  9. Anonymous
    January 20th, 2020

    COULD anyone share VTP v3 answers please

  10. SeeSeeNPee yeah
    January 20th, 2020

    Completed my last piece, got good remarks, 9xx/1000, sims are LACP, HSRP & VTP3. Don’t forget to copy run start on LACP sims, it works this time. My LACP sims has SVI vlan1 already configured eventhough it is part of the requirement, but I just re-entered it just in case. For VTP3, same. I’m having doubts initially but I’ve answered what’s in here. Just got the right explanation after reading some comments and research.

    Also, I think I got 4 or 5 new Qs, I can’t remember the others, but here’s the 2 I remembered

    Question about how to check vlan? choose two (ans.ac)
    a. show vlan brief
    b. show vlan id
    c. show vlan
    d. show run

    CDP TVLs? choose two (ans. ac)
    a. Native VLAN TLV
    b. System TLV
    c. VTP Management Domain TLV
    d. ?
    e. ?

    I also got 4 DnDs, 2 here and 2 from Chinese dumps that’s not in here
    AAA (this is easy)
    TACACS+
    encryption is performed on the entire packet
    processes each AAA functions separately
    RADIUS
    processes authentication and authorization functions together
    encryption is performed only on the password and component of the packet

    SPAN
    Source port
    it can be an Etherchannel port
    it is monitored port
    multiple port can be included in a single session

    Destination port
    it can be any physical Ethernet port
    it is excluded from STP
    it is removed from the Etherchannel group when SPAN configuration is applied

    on CHN dumps “it can be any physical Ethernet port” is with Source port and “multiple port can be included in a single session” is w/ Destination port. I think my answer is correct.

    https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swspan.html

    You can shoot me an email, kirades(dot)lewilitt@yahoo(dot)com and I can share you my own made VCE file, that’s only 800+ Qs, it’s a combination of certprepare and chinese dumps.

  11. VTPV3
    January 20th, 2020

    @seeseee

    How did you answer VTPv3?

  12. SeeSeeNPee yeah
    January 20th, 2020

    for Q3 I chose A. Configure VLAN 500 & VLAN 600 on both SW1 & SW2
    and for Q4 I chose C. Disable VTP pruning on SW4 only

  13. Vtpv3
    January 20th, 2020

    @seesee

    Could you Plesse share your related investigation for that answer ?

    Just make the long story short please.?

  14. Vtp3
    January 20th, 2020

    @seesee

    Could you Plesse share your related investigation for that answer ?

    Just make the long story short please.?

  15. georoot
    January 20th, 2020

    On which PVLAN type can host ports communicate with promiscuous ports?
    a. isolated
    b. primary
    c. promiscuous
    d. community

    promiscuous, isolated and community ports can talk to promiscuous ports
    so what is the answer?

  16. MHD
    January 20th, 2020

    Just pass today 8XX, i become CCNP certified.

    44 Questions.

    1 DnD,
    Labs: Lacp with STP, HSRP hotspot and VTP.

    there is few new questions. sadly i don’t remember them.

    Good luck to you all.

  17. karim
    January 20th, 2020

    @ MHD I dont think you are correct.

    you lair outdated dump seller

  18. Richard
    January 20th, 2020

    @SeeSeeNPee

    Were can we find this CHN dump?
    (Only interested in DnD’s)

  19. NotSeeSeeNPee
    January 20th, 2020

    So I scored mid 900’s and picked configure VLAN500/600 on SW1 only and disable pruning on SW1.

    My reasoning is as follows:

    The sim is running VTPv3, and in VTPv3 you can only configure VLAN’s on the primary server. In the sim Sw1 is the primary server as per “show vtp status”. The primary root stuff is a red herring in my opinion as this isn’t a spanning tree lab, and VTP and SPT have nothing to do with each other. However, adding the VLANs to Sw1 means they will be propagated to all other switches in the network. You can then configure “spanning-tree vlan 500 root primary” on Sw1 and “spanning-tree vlan 600 root primary” Sw2 in the real world.

    For where to disable pruning, again we need to consider the version of VTP we are running. If this was VTPv2 I could accept disable it on Sw4 as correct, as VTPv2 does not support PVLANs, and you have to be running transparent mode to have them on a switch. However, VTPv3 does support PVLAN’s, but only when pruning is disabled. Again we need to remember that in v3 you can only configure VLANs on the primary server (Sw1) and therefore you disable pruning there.

  20. Rick
    January 20th, 2020

    Can someone please tell me if these questions came in your exam?

    1. Which statement about VSPAN is true?
    A. It can monitor ingress and egress traffic on the source VLAN
    B. It sends all VLAN traffic to the destination port regardless of the VLAN’s status
    C. It can monitor destination port traffic that belongs to a source VLAN
    D. It can monitor token ring VLANs

    2. Which mechanism is specific for RSPAN and not for SPAN?
    A. source port
    B. monitor port
    C. reflector port
    D. redundant port
    E. destination port

    3. Which two statements about source port monitoring in a SPAN are true? (Choose two.)
    A. Traffic through a destination port can be copied and included in the SPAN session.
    B. The entire EtherChannel must be monitored.
    C. It can monitor only FastEthernet and GigabitEthernet port types.
    D. It can monitor individual interfaces within a port channel.
    E. It can monitor ingress and egress traffic.

    4. A switch has been configured with the vlan dot1q tag native command. Which statement describes what the switch does with untagged frames that it receive?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunked port is put in err-disable state
    D. Untagged frames are forwarded via the native VLAN

    5. Which two operational attributes can be checked for EtherChannel ports that are in err-disabled state?
    A. Port mode B. Port cost C. Duplex D. DTP E. VLAN

    6. Which command do you enter to enable Dynamic ARP Inspection for VLAN 15?
    A. SW1(config-vlan)# ip arp inspection vlan 15
    B. SW1(config-vlan)# ip arp inspection trust
    C. SW1(config-if)# ip arp-inspection trust
    D. SW1(config)# ip arp inspection vlan 15

    7. Which two statements are true about port security? (Choose two)
    A. It is used on EtherChannel bundle.
    B. It must be used on the switch interface.
    C. It can be configured for SPAN.
    D. It is configured on an access port.
    E. ?

    8. Which two statements about static MAC addresses are true? (Choose two)
    A. They are configured without an aging time.
    B. They have a default aging time of 300 seconds.
    C. They supersede dynamically learned MAC address.
    D. They can be configured on multiple interfaces in the same VLAN.
    E. They have a default aging time of 60 seconds.

    9. Which security feature inspects ARP packets based on valid IP-to-MAC address bindings?
    A. BPDU guard
    B. port security
    C. DAI
    D. IP source Guard

    10. In which two ways can a port respond to a port-security violation? (Choose two)
    A. The port enters the err-disabled state.
    B. The Security Violation counter is incremented and the port sends an SNMP trap.
    C. The Security Violation counter is incremented and the port sends a critical syslog message to the console.
    D. The port triggers an EEM script to notify support staff and continues to forward traffic normally.
    E. The port immediately begins to drop all traffic.
    F. The port enters the shutdown state.

    11. Which three features can be optimized by using SDM templates? (Choose three)
    A. port security
    B. Trunk
    C. VLAN
    D. access
    E. DHCP snooping
    F. routing

    12. What types of SDM templates you can use in switch? (Choose three)
    A. Access B. Default C. Routing D. VLANs E. ? F. ?

    13. Which two statements about default FHRP behavior are true? (Choose two)
    A. A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails
    B. Preemption is enabled by default
    C. Unless specifically configured, the priority of an HSRP router is 200
    D. A standby HSRP router becomes active if it has a higher priority than the priority of the current active router
    E. A VRRP backup virtual router becomes the master router if its priority is higher than the priority of the current master router

    14. How many AVGs can be elected by GLBP member?
    A. 1
    B. 2
    C. 4
    D. 6

    15. Which option is the minimum number of bindings that the DHCP snooping database can store?
    A. 1000 bindings
    B. 2000 bindings
    C. 5000 bindings
    D. 8000 bindings

    16. A switch has been configured with the VLAN dot1q tag native command. Which statement describes what the switch does with untagged frames when it
    receives on a trunked interface?
    A. Untagged frames are forwarded via the default VLAN
    B. It drops the untagged frames
    C. The trunk ports is put in err-disable state.
    D. Untagged frames are forward via the native vlan

    17. Which two commands display the VLANs that are present in the VLAN database? (Choose two.)
    A. show running-config
    B. show vlan database
    C. show vlan brief
    D. show vlan
    E. show vlan id

    18. Which two commands do you enter to add VLAN 20 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 20
    B. switchport access vlan 20
    C. vlan 20
    D. switchport trunk allowed vlan 20
    E. encapsulation dot1q 20

    19. Which two commands do you enter to add VLAN 15 on a switch VLAN configuration file? (Choose two.)
    A. switchport trunk native vlan 15
    B. switchport access vlan 15
    C. vlan 15
    D. switchport trunk allowed vlan 15
    E. encapsulation dot1q 15

    20. Refer to the exhibit. A single server in Company 123 is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the routers to the server?
    A. source MAC address
    B. source IP address
    C. source and destination MAC address
    D. destination MAC address

    21. Which command enables root guard on a Cisco switch?
    A. Switch(config)#spanning-tree guard root
    B. Switch(config)#spanning-tree root guard
    C. Switch(config-if)#spanning-tree guard-root
    D. Switch(config-if)#spanning-tree guard root
    E. Switch(config-if)#spanning-tree root guard

    22. Which two configuration requirements for port security are true? (Choose two.)
    A. Port must be in access mode
    B. Port security must be enabled on the port level
    C. Port must be in interface VLAN mode
    D. Port security must be disabled on the port level
    E. Port must be in encapsulation mode

    23. Which two configuration requirements for port security are true? (Choose two.)
    A. The port must be part of a trunk.
    B. Port security must be enable at the port level
    C. Port security must be enabled at the global level.
    D. The port must be SPAN port.
    E. The port must be part of an EtherChannel bundle.
    F. The port must be in access mode.

    24. Which type of failure has occurred, if a link fails and the MEC successfully redistributes the load among the remaining operational links?
    A. multiple MEC link failure
    B. standby switch failure
    C. active switch failure
    D. single MEC link failure

    25. Which command do you enter on a device so that users are automatically placed in enable mode after they authenticate with TACACS+?
    A. aaa authorization exec default group tacacs+ if-authenticated
    B. aaa authorization exec default group tacacs+ local-case
    C. aaa authorization exec default group tacacs+ enable
    D. aaa authentication exec default group tacacs+ if-authenticated

    26. Which two statements about the local user database are true? (Choose two.)
    A. For console connections, it can be used only as a backup authentication method.
    B. It can be configured to grant a user-specific privilege level.
    C. It can store passwords in clear text only.
    D. For VTY connections, it can be used only as a backup authentication method.
    E. It can be used as the only method of authentication or as a backup for other methods.

    27. What is the value of the TPID/tag protocol identifier in dot1q?
    A. 0x8100
    B. 0x8a88
    C. 0x8b45
    D. 0x8200

    28. Which two TLVs are included in Cisco Discovery Protocol advertisements? (Choose two.)
    A. Network Policy TLV
    B. VTP Management Domain TLV
    C. System Name TLV
    D. Inventory Management TLV
    E. Native VLAN TLV

    29. Which two statements about sticky MAC address learning are true? (Choose two.)
    A. A single device can learn up to three sticky MAC addresses.
    B. Devices can learn sticky MAC addresses dynamically.
    C. Learned addresses are saved to the startup configuration file by default.
    D. Learned addresses are saved to the running configuration by default.
    E. Learned addresses are automatically preserved when the device reboots.
    F. It can be used only on devices that operate in a single layer.

    30. After you connected a host to switch port G0/1, the port is error disabled. Which command can you enter to determine the reason?
    A. show interfaces g0/1 status
    B. show log
    C. show run interface g0/1
    D. show ip interface brief

    31. Refer to the exhibit.
    Which option is the most likely explanation of the duplicate address message logged?
    A. spanning-tree loop
    B. HSRP misconfiguration
    C. a PC with IP of 10.10.1.1
    D. a hardware problem

    32. Which feature can prevent ARP poisoning attacks on a device?
    A. Dynamic ARP Inspection
    B. DHCP snooping
    C. MAC snooping
    D. CGMP snooping
    E. Dynamic MAC Inspection
    F. Static ARP Inspection

    33. Which two device types does DHCP snooping treat as untrusted in an ISP environment? (Choose two.)
    A. end host devices
    B. customer edge services
    C. user-facing provider edge devices
    D. provider edge devices
    E. provider devices

    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.

    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guard on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.

    Drag and Drop – PVST+ / Rapid PVST+ / MSTP
    PVST + 802.1d standard + default STP
    RapidPVST + 802.1w standard + has Discarding port state
    MST + 802.1s standard + group vlan int instance

    Drag and Drop – SPAN Source and Destination Ports
    Source port:
    1. It can be trunk or an access port
    2. It can be monitored as a bundled logical port or as individual physical ports
    3. Multiple VLANs can be included in a single session
    Destination switch:
    1. It acts as the monitoring port
    2. It is not supported as part of a VLAN
    3. Its original configuration is overwritten by the SPAN configuration

  21. SeeSeeNPee yeah
    January 21st, 2020

    wow, I got most of the MCQs @Rick posted.

    @VTP3
    Q3 I chose A. Configure VLAN 500 & VLAN 600 on both SW1 & SW2
    Why? because the Q ask how to configure 500 and 600 as primary root and secondary root on SW1, and vise versa on SW2, not just add 500 and 600. My keypoint here is “configure” not “add”, which I believe here pertains to STP. It is like you can’t configure STP without accessing both SWs, or I could say propagate STP set up it using VTP.

    and for Q4 I chose C. Disable VTP pruning on SW4 only
    Same explanation as certprepare.

  22. Rick
    January 21st, 2020

    @SeeSeeNPee

    When did you took the exam?

  23. Dan21
    January 21st, 2020

    Guys, is there a Dump that doesnt have any errors in it or that has been corrected? does the October dump have errors?

  24. NEW_MCQ
    January 21st, 2020

    Guys, where can i find new updated questions 1 – 5?

  25. laga
    January 21st, 2020

    hello family, wish me goodluck, taking my exam today, this site has helped me a lot and I promise to bring some feedback after my exam.
    goodbye

  26. Dan21
    January 21st, 2020

    @laga

    Good luck man! hope you crush it. Don’t forget us after your done :)

  27. ABC
    January 21st, 2020

    pass with score 9xx
    premium dump
    4DND (radius,tacacs+ & pvst,rapidpvst,mst&source port , destination port & avg,avf,arp)
    labs (lacp & hsrp & vtpv3)
    about 4 new questions
    good luck

  28. MHD
    January 21st, 2020

    @karim what ever you like. i paid more the 150$ for it but the important thing is i have 3 years to prepare for CCIE.

    99% from the questions already posted in here.

    and NO i am NOT selling any thing.

  29. Anonymous
    January 21st, 2020

    34. You want to correctly configure IP Source Guard on a switch. Which two tasks must you perform? (Choose two.)
    A. Enable DHCP snooping on the switch.
    B. Enable DHCP packet validation on the device.
    C. Configure the DHCP snooping relay.
    D. Enable DHCP option 82.
    E. Configure the ip verify source vlan dhcp-snooping command.

    35. Refer to the exhibit. An engineer is configuring a trunking port-channel between switch 1 and switch 2 and receives an error message on switch 1. Which
    option corrects this error?
    A. enabling BPDU guard on interface Fa0/23 of switch 2.
    B. enabling BPDU guard on interface Fa0/23 of switch 1.
    C. disabling BPDU guardef on interface Fa0/23 of switch 2.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.

  30. MHD
    January 21st, 2020

    Anonymous
    Q34
    A. Enable DHCP snooping on the switch.
    E. Configure the ip verify source vlan dhcp-snooping command.
    Q35.
    D. disabling BPDU guard on interface Fa0/23 of switch 1.


  31. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 8 9 10 11 12 53 742
  1. No trackbacks yet.