300-135 Exam Dumps 300-135 Exam Questions 300-135 New Questions 300-135 PDF 300-135 VCE Cisco

[2017 New] Ensure Pass 300-135 Exam By Training Lead2pass New PDF Dumps (16-30)

2017 July Cisco Official New Released 300-135 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Are you worrying about the 300-135 exam? Lead2pass provides the latest 300-135 braindumps and guarantees you passing 300-135 exam beyond any doubt.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/300-135.html

QUESTION 16
Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Select two)

A.    The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
B.    The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C.    The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable encryption.
D.    The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

Answer: BC

QUESTION 17
At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?

A.    Layer 5
B.    Layer 4
C.    Layer 3
D.    Layer 2
E.    Layer 1

Answer: D

QUESTION 18
In computer networking a multicast address is an identifier for a group of hosts that have joined a multicast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer
3) as IPv4 or IPv6 Multicast. Which two descriptions are correct regarding multicast addressing?

A.    The first 23 bits of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.
B.    The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.
C.    To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address into the last 24 bits of the MAC address. The high-order bit is set to 0.
D.    The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.

Answer: CD

QUESTION 19
EIGRP is being used as the routing protocol on the Company network. While troubleshooting some network connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages. What causes these SIA routes? (Select two)

A.    The neighboring router stops receiving ACK packets from this router.
B.    The neighboring router starts receiving route updates from this router.
C.    The neighboring router is too busy to answer the query (generally caused by high CPU utilization).
D.    The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

Answer: CD
Explanation:
SIA routes are due to the fact that reply packets are not received. This could be caused by a router which is unable to send reply packets. The router could have reached the limit of its capacity, or it could be malfunctioning.
Notes: If a router does not receive a reply to all outstanding queries within 3 minutes, the route goes to the stuck in active (SIA) state. The router then resets the neighbors that fail to reply by going active on all routes known through that neighbor, and it re-advertises all routes to that neighbor.
http://www.cisco.com/warp/public/103/eigrp3.html

QUESTION 20
You want to enhance the security within the Company LAN and prevent VLAN hopping. What two steps can be taken to help prevent this? (Select two)

A.    Enable BPD guard
B.    Disable CDP on ports where it is not necessary
C.    Place unused ports in a common unrouted VLAN
D.    Prevent automatic trunk configuration
E.    Implement port security

Answer: CD

QUESTION 21
The following commands are issued on a Cisco Router:

Router(configuration)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1
Router(configuration)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1
Router(configuration)#exit
Router#debug ip packet 199

What will the debug output on the console show?

A.    All IP packets passing through the router
B.    Only IP packets with the source address of 10.1.1.1
C.    All IP packets from 10.1.1.1 to 172.16.1.1
D.    All IP Packets between 10.1.1.1 and 172.16.1.1

Answer: D
Explanation:
In this example, the “debug ip packet” command is tied to access list 199, specifying which IP packets should be debugged. Access list 199 contains two lines, one going from the host with IP address 10.1.1.1 to 172.16.1.1 and the other specifying all TCP packets from host 172.16.1.1 to 10.1.1.1.

QUESTION 22
What level of logging is enabled on a Router where the following logs are seen?

%LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up

A.    alerts
B.    critical
C.    errors
D.    notifications

Answer: D
Explanation:
Cisco routers, switches, PIX and ASA firewalls prioritize log messages into 8 levels (0-7), as shown below:

LevelLevel NameDescription
0 Emergencies System is unusable
1 Alerts Immediate action needed
2 Critical Critical conditions
3 Errors Error conditions
4 Warnings Warning conditions
5 Notifications Informational messages
6 Informational Normal but significant conditions
7 Debugging Debugging messages

When you enable logging for a specific level, all logs of that severity and greater (numerically less) will be logged. In this case we can see that logging level of 3 (as seen by the 3 in “LINK-3-UPDOWN”) and level 5 (as seen by the 5 in “LINEPROTO-5-UPDOWN”) are shown, which means that logging level 5 must have been configured. As shown by the table, logging level 5 is Notifications.

QUESTION 23
You have the followings commands on your Cisco Router:

ip ftp username admin
ip ftp password backup

You have been asked to switch from FTP to HTTP. Which two commands will you use to replace the existing commands?

A.    ip http username admin
B.    ip http client username admin
C.    ip http password backup
D.    ip http client password backup
E.    ip http server username admin
F.    ip http server password backup

Answer: BD
Explanation:
Configuring the HTTP Client
Perform this task to enable the HTTP client and configure optional client characteristics. The standard HTTP 1.1 client and the secure HTTP client are always enabled. No commands exist to disable the HTTP client. For information about configuring optional characteristics for the HTTPS client, see the HTTPS-HTTP Server and Client with SSL 3.0, Release 12.2(15)T, feature module.

SUMMARY STEPS
1. enable
2. configure terminal
3. ip http client cache {ager interval minutes | memory {file file-size-limit | pool pool-size-limit}
4. ip http client connection {forceclose | idle timeout seconds | retry count | timeout seconds}
5. ip http client password password
6. ip http client proxy-server proxy-name proxy-port port-number
7. ip http client response timeout seconds
8. ip http client source-interface type number
9. ip http client username username

Reference: HTTP 1.1 Web Server and Client.
http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_http_web.html

QUESTION 24
You have 2 NTP servers in your network – 10.1.1.1 and 10.1.1.2.
You want to configure a Cisco router to use 10.1.1.2 as its NTP server before falling back to
10.1.1.1. Which commands will you use to configure the router?

A.    ntp server 10.1.1.1
ntp server 10.1.1.2
B.    ntp server 10.1.1.1
ntp server 10.1.1.2 primary
C.    ntp server 10.1.1.1
ntp server 10.1.1.2 prefer
D.    ntp server 10.1.1.1 fallback
ntp server 10.1.1.2

Answer: C
Explanation:
A router can be configured to prefer an NTP source over another. A preferred server’s responses are discarded only if they vary dramatically from the other time sources. Otherwise, the preferred server is used for synchronization without consideration of the other time sources. Preferred servers are usually specified when they are known to be extremely accurate. To specify a preferred server, use the prefer keyword appended to the ntp server command. The following example tells the router to prefer TimeServerOne over TimeServerTwo:
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#ntp server TimeServerOne prefer
Router(config)#ntp server TimeServerTwo
Router(config)#^Z

QUESTION 25
The following command is issued on a Cisco Router:

Router(configuration)#logging console warnings

Which alerts will be seen on the console?

A.    Warnings only
B.    debugging, informational, notifications, warnings
C.    warnings, errors, critical, alerts, emergencies
D.    notifications, warnings, errors
E.    warnings, errors, critical, alerts

Answer: C
Explanation:
Cisco routers prioritize log messages into 8 levels (0-7), as shown below:

LevelLevel NameDescription
0 Emergencies System is unusable
1 Alerts Immediate action needed
2 Critical Critical conditions
3 Errors Error conditions
4 Warnings Warning conditions
5 Notifications Informational messages
6 Informational Normal but significant conditions
7 Debugging Debugging messages

When you enable logging for a specific level, all logs of that severity and greater (numerically less) will be logged. In this case, when you enable console logging of warning messages (level 4), it will log levels 0-4, making the correct answer warnings, errors, critical, alerts, and emergencies.

QUESTION 26
Which two of the following options are categories of Network Maintenance tasks?

A.    Firefighting
B.    Interrupt-driven
C.    Policy-based
D.    Structured
E.    Foundational

Answer: BD
Explanation:
Proactive Versus Reactive Network Maintenance:
Network maintenance tasks can be categorized as one of the following:

Structured tasks: Performed as a predefined plan.
Interrupt-driven tasks: Involve resolving issues as they are reported.

QUESTION 27
A customer network engineer has made configuration changes that have resulted in some loss of connectivity. You have been called in to evaluate a switch network and suggest resolutions to the problems.

 
PC2 in VLAN 200 is unable to ping the gateway address 172.16.200.1; identify the issue.

A.    VTP domain name mismatch on SW4
B.    VLAN 200 not configured on SW1
C.    VLAN 200 not configured on SW2
D.    VLAN 200 not configured on SW4

Answer: D
Explanation:
By looking at the configuration for SW4, we see that it is missing VLAN 200, and the “switchport access vlan 200” command is missing under interface eth 0/0:

 

QUESTION 28
A customer network engineer has made configuration changes that have resulted in some loss of connectivity. You have been called in to evaluate a switch network and suggest resolutions to the problems.
 
Which of statement is true regarding STP issue identified with switches in the given topology?

A.    Loopguard configured on the New_Switch places the ports in loop inconsistent state
B.    Rootguard configured on SW1 places the ports in root inconsistent state
C.    Bpduguard configured on the New_Switch places the access ports in error-disable
D.    Rootguard configured on SW2 places the ports in root inconsistent state

Answer: A
Explanation:
On the new switch, we see that loopguard has been configured with the “spanning-tree guard loop” command.

 

The loop guard feature makes additional checks. If BPDUs are not received on a non-designated port, and loop guard is enabled, that port is moved into the STP loop- inconsistent blocking state, instead of the listening / learning / forwarding state. Without the loop guard feature, the port assumes the designated port role. The port moves to the STP forwarding state and creates a loop.

QUESTION 29
A customer network engineer has made configuration changes that have resulted in some loss of connectivity. You have been called in to evaluate a switch network and suggest resolutions to the problems.
 
You have configured PVST+ load balancing between SW1 and the New_Switch in such a way that both the links E2/2 and E2/3 are utilized for traffic flow, which component of the configuration is preventing PVST+ load balancing between SW1 and SW2 links

A.    Port priority configuration on SW1
B.    Port priority configuration on the New_Switch
C.    Path cost configuration on SW1
D.    Path cost configuration on the New_Switch

Answer: D
Explanation:
Here is the configuration found on the New_Switch:

 

This causes the port cost for link eth 1/3 to increase the path cost to 250 for all VLANs, making that link less preferred so that only eth 1/2 will be used.

QUESTION 30
A customer network engineer has made configuration changes that have resulted in some loss of connectivity. You have been called in to evaluate a switch network and suggest resolutions to the problems.

 
Refer to the topology. SW1 Switch Management IP address is not pingable from SW4. What could be the issue?

A.    Management VLAN not allowed in the trunk links between SW1 and SW4
B.    Management VLAN not allowed in the trunk links between SW1 and SW2
C.    Management VLAN not allowed in the trunk link between SW2 and SW4
D.    Management VLAN ip address on SW4 is configured in wrong subnet
E.    Management VLAN interface is shutdown on SW4

Answer: D
Explanation:
In the network, VLAN 300 is called the Management VLAN. Based on the configurations shown below, SW1 has VLAN 300 configured with the IP address of 192.168.10.1/24, while on SW4 VLAN 300 has an IP address of 192.168.100.4/24, which is not in the same subnet.

Lead2pass offers the latest 300-135 PDF and VCE dumps with new version VCE player for free download, and the new 300-135 dump ensures your exam 100% pass.

300-135 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDRnY1enRHb3hVeDQ

2017 Cisco 300-135 exam dumps (All 110 Q&As) from Lead2pass:

http://www.lead2pass.com/300-135.html [100% Exam Pass Guaranteed]