Wednesday, 21 February 2018

Cisco 300-115 Question Answer

A network engineer tries to configure storm control on an EtherChannel bundle. What is the result of the configuration?

A. The storm control settings will appear on the EtherChannel, but not on the associated physical ports.
B. The configuration will be rejected because storm control is not supported for EtherChannel.
C. The storm control configuration will be accepted, but will only be present on the physical interfaces.
D. The settings will be applied to the EtherChannel bundle and all associated physical interfaces.

Answer: D                                                        300-115 Dumps

What is the function of NSF?

A. forward traffic simultaneously using both supervisors
B. forward traffic based on Cisco Express Forwarding
C. provide automatic failover to back up supervisor in VSS mode
D. provide nonstop forwarding in the event of failure of one of the member supervisors

Answer: D

Wednesday, 20 December 2017

Cisco 300-115 Question Answer

Refer to the exhibit.

What is the result of the configuration?

A. The EtherChannels would not form because the load-balancing method must match on the devices.
B. The EtherChannels would form and function properly even though the load-balancing and EtherChannel modes do not match.
C. The EtherChannels would form, but network loops would occur because the load-balancing methods do not match.
D. The EtherChannels would form and both devices would use the dst-ip load-balancing method because Switch1 is configured with EtherChannel mode active.

Answer: B

Monday, 6 November 2017

We'll All Eat Crickets In 20 Years, Says Cisco's Chambers

Cisco's outgoing executive says clean, cheap insects will be our main source of protein.

Hungry? It's better to get used to eating insects, says the outgoing leader of tech giant Cisco.

"The main source of protein that you will have in your life, certainly in 20 years and maybe in 15 years, will be insects," said John Chambers, speaking at Half Moon Bay at the Techonomy conference. They are "the cleanest way to produce, at least it defies the environment".

In particular, think that eating crickets is the cat's pajamas. This vision aligns well with companies such as Aspire Food Group, which grows crickets for human consumption, and many cultures in Asia, Africa and Latin America. So maybe it's better to adopt an insectivore diet.

Chambers has been the executive director of the Cisco Systems network giant for years, but is now breaking his latest tie as chairman of the company's board. What makes you so expert in food technology? In short, he plans to become more active with startups, and pays close attention to what is happening.
Cricket growth is a high-tech operation, he says, with robots able to help crickets grow 50 percent larger in a third of the time, as usual, he said.
Chambers likes the prospects of Aspire Food Group, based in Austin, Texas, and says that cricket food is now ready. He is also an investor in the food company and mentor of CEO Mohammed Ashour, a spokesman for Aspire confirmed.
However, you will not necessarily know that you are eating small, long-legged arthropods because they can be crushed and added to other foods. He has just made a seven-course dinner at a San Francisco restaurant, Season, with crickets infused with cookies, desserts and even a margarita.
Chambers loves startups, but he worries them in the United States. France and China are doing a better job of encouraging them and making sure they are not isolated from urban coastal pockets.

 "We have become the worst," said Chambers.

And the Silicon Valley seedbed is too complacent, he added.

"When a region is disconnected from technology or from commercial or social changes, it is in danger," said Chambers. "Boston Route 128 was once the world's high-tech center," near MIT and Harvard, home to 2,000 or 3,000 high-tech companies. But the region lost the way to personal computers, software and the Internet and lost its position of influence.

"Silicon Valley has the risk of losing significant market transitions," Chambers said.

Monday, 11 September 2017

Cisco 300-115 Question Answer

A network engineer deployed a switch that operates the LAN base feature set and decides to use the SDM VLAN template. The SDM template is causing the CPU of the switch to spike during peak working hours. What is the root cause of this issue?

A. The VLAN receives additional frames from neighboring switches.
B. The SDM VLAN template causes the MAC address-table to overflow.
C. The VLAN template disables routing in hardware.
D. The switch needs to be rebooted before the SDM template takes effect.

Answer: C

An access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network administrator notices that not all traffic is being replicated to the management server. What is a cause for this issue?

A. VLAN filters are required to ensure traffic mirrors effectively
B. SPAN encapsulation replication must be enabled to capture EtherChannel destination traffic.
C. The port channel can be used as a SPAN source, but not a destination.
D. RSPAN must be used to capture EtherChannel bidirectional traffic.

Answer: C

Tuesday, 18 April 2017

Cisco 300-115 Question Answer

What effect does the mac address-table aging-time 180 command have on the MAC address-table?

A. This is how long a dynamic MAC address will remain in the CAM table.
B. The MAC address-table will be flushed every 3 minutes.
C. The default timeout period will be 360 seconds.
D. ARP requests will be processed less frequently by the switch.
E. The MAC address-table will hold addresses 180 seconds longer than the default of 10 minutes.

Answer: A

While working in the core network building, a technician accidently bumps the fiber connection between two core switches and damages one of the pairs of fiber. As designed, the link was placed into a non-forwarding state due to a fault with UDLD. After the damaged cable was replaced, the link did not recover. What solution allows the network switch to automatically recover from such an issue?

A. macros
B. errdisable autorecovery
C. IP Event Dampening
D. command aliases
E. Bidirectional Forwarding Detection

Answer: B