# CCNP ENCOR 350-401 CHAPTER 1 – 5

·

Welcome to your CCNP ENCOR 350-401 CHAPTER 1 - 5

1.
Which two statements are true about routed ports on a multilayer switch? (Choose two.)

2.
What is the goal of Layer 3 switching?
3.
Which two statements are true about the 802.1Q trunking protocol? (Choose two.)

4.
Which technology does CEF switching use on Cisco hardware-based routers to forward packets?
5.
What type of specialized memory is used to facilitate high performance switching in Cisco multilayer switches?
6.
Which two network design features require Spanning Tree Protocol (STP) to ensure correct network operation? (Choose two.)
7.
Which protocol is required for Cisco Express Forwarding to be able to successfully forward packets on a multilayer switch?
8.
If left to default configuration settings, what will determine which switch becomes the spanning-tree root bridge in a Layer 2 domain?
9.
During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process?
10.
Which statement describes the term bridge priority in the operation of STP?
11.
After the election of the root bridge has been completed, how will switches find the best paths to the root bridge?
12.
Which three components are combined to form a bridge ID?

13.
In which two port states does a switch learn MAC addresses and process BPDUs in a PVST network? (Choose two.)

14.
Which STP priority configuration would ensure that a switch would always be the root switch?
15.
Refer to the exhibit. The network has converged and Switch_6 has been elected root bridge of the STP tree. However, network traffic analysis indicates that Switch_1 would be a better root bridge. How can the network administrator make this change, assuming that the spanning-tree priorities are at the default settings?
16.
Why is it important that the network administrator consider the spanning-tree network diameter when choosing the root bridge?
17.
A network administrator enters the spanning-tree portfast bpduguard default command. What is the result of this command being issued on a Cisco switch?
18.
In what situation would a network administrator most likely implement root guard?
19.
Which two statements describe the MST internal spanning tree instance? (Choose two)

20.
What are the two options that describe the effects of the spanning-tree portfast command? (Choose two.)

21.
Which LACP technology is used for designating a specific number of member interfaces that must remain active in order for the Ether Channel bundle to be usable?
22.
Which statement describes the term root port in the operation of STP?
23.
What are two configuration parameters that must match for all switches in the same MST region? (Choose two.)

24.
Assuming that all switches in a network have the default bridge priority for each MST instance, what effect does the command spanning-tree mst 10 root seconday have when entered on a single switch?
25.
Refer to the exhibit. A network administrator issues the show spanning-tree command to verify the MST configuration. Which two conclusions can be drawn based on the output? (Choose two.)

26.
Refer to the exhibit. A network administrator is configuring MST tuning on SW1. The objective is to change the path cost value of the interface Gi1/0/1 to represent a higher-speed bandwidth link. Which value could be used in the command spanning-tree mst 0 cost for this task?
27.
What are two misconfigurations within an MST region that might introduce port blocking unintentionally? (Choose two.)

28.
How does an MST region send VLAN information through the PVST simulation mechanism to a switch that runs PVST+?
29.
Which two VTP modes allow for the creation, modification, and deletion of VLANs on the local switch? (Choose two.)

30.
Given the following configuration, which two statements are true? (Choose two.)

switch(vlan)# vtp version 2 switch(vlan)# vtp mode server switch(vlan)# vtp domain Cisco switch(vlan)# vtp password Paw0rd

31.
Which Cisco proprietary protocol is used for dynamically forming a trunk connection between two switches?
32.
Which is a characteristic of EtherChannel?
33.
Refer to the exhibit. The administrator tried to create an EtherChannel between S1 and the other two switches via the commands that are shown, but was unsuccessful. What is the problem?
34.
Refer to the exhibit. An EtherChannel was configured between switches S1 and S2, but the interfaces do not form an EtherChannel. What is the problem?
35.
Which two DTP mode combinations will form a trunk link between two switches? (Choose two.)

36.
Which statement is true about the port roles of the 802.1w Rapid Spanning Tree Protocol?
37.
Which technology is used to protect the switched infrastructure from problems caused by receiving BPDUs on ports that should not be receiving them?
38.
Which statement describes the term blocking in the operation of STP?
39.
The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)

40.
Which LACP technology is used for designating which member interfaces will be active in a port-channel configuration where there are more member interfaces than the maximum allowed?
41.
Which LACP technology can identify and remove a LACP enabled link from an EtherChannel within three seconds when the link is experiencing connectivity issues?
42.
Which two statements descibe the MST internal spanning tree instance? (Choose two)

43.
Which statement describes the term root bridge in the operation of STP?
44.
Which LACP technology can identify and remove a LACP enabled link from an EtherChannel within three seconds when the link is experiencing connectivity issues?