★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-115 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/300-115-dumps.html


Consequently, should you have pondered contributing your Cisco 300-115 credential after your name, keep in mind that it does employ a defined and really legitimate worth. If you are excited about receiving your current Cisco 300-115 recognition ( Implementing Cisco IP Switched Networks ) you may be regarding on keep track of towards taking your job to an alternative and higher level.

2021 Apr 300-115 actual test

Q51. If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated?

A. A MAC address or host moves between different switch ports.

B. A new MAC address is added to the content-addressable memory.

C. A new MAC address is removed from the content-addressable memory.

D. More than 64 MAC addresses are added to the content-addressable memory.

Answer: A


Q52. Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?

A. (config)# aaa authentication login default radius local

B. (config)# aaa authentication login login radius local

C. (config)# aaa authentication login default local radius

D. (config)# aaa authentication login radius local

Answer: B


Q53. refer to the exhibit.

f1/0 and f1/1 have the same end-to-end path cost to the designated bridge. Which action is needed to modify the Layer 2 spanning-tree network so that traffic for PC1 VLAN from switch SW3 uses switchport f1/1 as a primary port?

A. Modify the spanning-tree port-priority on SW1 f1/1 to 0 and f1/0 to 16.

B. Modify the spanning-tree port-priority on SW1 f1/1 to 16 and f1/0 to 0.

C. Modify the spanning-tree port-priority on SW2 f1/1 to 0 and f1/0 to 16.

D. Modify the spanning-tree port-priority on SW2 f1/1 to 16 and f1/0 to 0.

Answer: C


Q54. The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.)

A. switch# show mac address-table

B. switch# show port-security

C. switch# show ip verify source

D. switch# show ip arp inspection

E. switch# show mac address-table address <mac address>

Answer: AE


Q55. A manager tells the network engineer to permit only certain VLANs across a specific trunk interface. Which option can be configured to accomplish this?

A. allowed VLAN list

B. VTP pruning

C. VACL

D. L2P tunneling

Answer: A


Updated 300-115 free question:

Q56. A network engineer notices inconsistent Cisco Discovery Protocol neighbors according to the diagram that is provided. The engineer notices only a single neighbor that uses Cisco Discovery Protocol, but it has several routing neighbor relationships. What would cause the output to show only the single neighbor?

A. The routers are connected via a Layer 2 switch.

B. IP routing is disabled on neighboring devices.

C. Cisco Express Forwarding is enabled locally.

D. Cisco Discovery Protocol advertisements are inconsistent between the local and remote devices.

Answer: A


Q57. Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?

A. ip dhcp snooping trust

B. ip dhcp snooping

C. ip dhcp trust

D. ip dhcp snooping information

Answer: A


Q58. A network engineer must improve bandwidth and resource utilization on the switches by stopping the inefficient flooding of frames on trunk ports where the frames are not needed. Which Cisco IOS feature can be used to achieve this task?

A. VTP pruning

B. access list

C. switchport trunk allowed VLAN

D. VLAN access-map

Answer: A


Q59. When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?

A. 1000

B. 1001

C. 1024

D. 2048

E. 4095

F. 4096

Answer: B


Q60. Which option is a benefit of using VSS?

A. reduces cost

B. simplifies configuration

C. provides two independent supervisors with two different control planes

D. removes the need for a First Hop Redundancy Protocol

Answer: D