Question 6 of 110

Refer to the exhibit.

The network administrator enables DHCP snooping globally and on VLAN 2. An additional step is mandatory for DHCP snooping to operate correctly and for clients to receive DHCP settings.

What is the additional mandatory step?

    Correct Answer: A

    To ensure DHCP snooping operates correctly and clients receive the appropriate DHCP settings, you need to define the trunk port (trk1) as a trusted DHCP port. By default, all ports, including trunk ports, are considered untrusted, which means DHCP offers and acknowledgments cannot pass through them. Defining the trunk port as trusted allows the legitimate DHCP traffic to be forwarded to the clients.

Question 7 of 110

Refer to the exhibit.

action. Device 1 crosses the threshold and triggers the action.

What does the switch do?

    Correct Answer: A

    When Device 1 crosses the threshold and triggers the action, the switch temporarily drops all IP traffic from Device 1 only. This is in line with how connection rate filtering typically functions, where the specific offending device is targeted rather than an entire interface.

Question 8 of 110

Refer to the exhibit.

The routing switches shown in the exhibit run OSPF on the links between each other. The commander in the Switch-1 VSF fabric goes down. Traffic is disrupted for several seconds.

What should a network administrator do to support a faster failover in a similar situation?

    Correct Answer: C

    To support a faster failover when the commander in the Switch-1 VSF fabric goes down, the network administrator should configure graceful restart, or nonstop OSPF, on Switch-1 and Switch-2 with a proper timer. Graceful restart (or nonstop OSPF) allows the router to continue forwarding packets while the OSPF process reroutes, which minimizes disruption during a failover event. This ensures continuous routing and faster recovery in case of a failure, which addresses the problem described.

Question 9 of 110

Refer to the exhibits.

Exhibit 1.

Exhibit 2.

The VoIP phone connects, authenticates successfully, and is dynamically assigned to tagged VLAN 6. The endpoint connected to the phone does not authenticate but starts to send untagged traffic.

How does the switch handle this traffic?

    Correct Answer: A

    When the VoIP phone authenticates and is assigned to tagged VLAN 6, it indicates that the phone's traffic belongs to VLAN 6. Since the endpoint connected to the phone does not authenticate and sends untagged traffic, the switch handles the untagged traffic based on the default VLAN for untagged traffic on that port, which is VLAN 5. Therefore, the switch forwards the untagged traffic in VLAN 5.

Question 10 of 110

An AOS-Switch needs to be configured to support tunneled node in role-based mode. The Mobility Controller administrators tell the switch administrators that the

AOS-Switch will integrate with a cluster of Mobility Controllers. The cluster virtual IP address is 10.1.1.10.

How should switch administrator integrate the AOS-Switch with the cluster?

    Correct Answer: C

    To integrate the AOS-Switch with the clustered Mobility Controllers, the switch should use the virtual IP address as the tunneled-node-server address. The cluster's virtual IP address will allow the switch to learn the actual IP addresses of the controller members dynamically, ensuring proper load balancing and failover. This addresses both connectivity and redundancy without needing to specify individual controller IP addresses for each role.