[February 2018] Free Lead2pass 300-135 PDF Download 100% Pass Exam 300-135 137q

Free Lead2pass 300-135 PDF Guarantee 100% Get 300-135 Certification:

https://www.lead2pass.com/300-135.html

QUESTION 11
Refer to the shown below.

%LINK-3-UPDOWN: Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up

What statement is correct regarding the output shown in the graphic?

A.    These two log messages will not have a severity level.
They are not errors but are just informational messages.
B.    The first log message is categorized as a warning message.
C.    These messages regarding interface status are normal output and will always be displayed when you exit config mode.
D.    The first log message is an error message with a severity level of 3.
E.    The second message would be shown if the logging console warning command had been issued.

Answer: D

QUESTION 12
Refer to the configuration statements shown in the graphic above.

R1(config)#access-list 199 permit tcp host 10.1.1.1 host 172.16.1.1
R1(config)#access-list 199 permit tcp host 172.16.1.1 host 10.1.1.1
R1(config)#end
R1#debug ip packet 199 detail

Which statement reflects what the effect is of this configuration sequence?

A.    These commands will generate an error message because you cannot use an access list with any debug commands.
B.    These commands will have no effect at all. The debug ip packet command will work as normal and display info for all IP packets.
C.    These commands turn on debug ip packet only for packets between hosts 10.1.1.1 and
172.16.1.1.
D.     These commands will only work when you specify only one host rather than two.

Answer: C

QUESTION 13
What is the result if you configure two devices with the ntp server command?

A.    Nothing will happen until one of the devices is configured with the prefer parameter.
B.    The NTP protocol will determine which server is most reliable and will synchronize to that server.
C.    The device with the highest priority will become the active server and the other device will become the backup server.
D.    The device with the lowest MAC address will become the active server and the other device will become the backup server.

Answer: B

QUESTION 14
A technician is troubleshooting connectivity problems between two routers that are directly connected through a serial line. The technician notices that the serial line is up, but cannot see any neighbors displayed in the output of the show cdp neighbors command.
In which OSI layer is the problem most likely occurring?

A.    physical
B.    data link
C.    network
D.    transport
E.    application

Answer: B

QUESTION 15
What are two approaches to maintaining a network?(Choose two.)

A.    PPDIOO
B.    structured
C.    bottoms up
D.    interrupt-driven

Answer: BD

QUESTION 16
Which two statements about the Cisco Aironet Desktop Utility (ADU) are true? (Select two)

A.    The Aironet Desktop Utility (ADU) profile manager feature can create and manage only one profile for the wireless client adapter.
B.    The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.
C.    The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point, manage authentication to the wireless network, and enable encryption.
D.    The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

Answer: BC

QUESTION 17
At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?

A.    Layer 5
B.    Layer 4
C.    Layer 3
D.    Layer 2
E.    Layer 1

Answer: D

QUESTION 18
In computer networking a multicast address is an identifier for a group of hosts that have joined a multicast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer
3) as IPv4 or IPv6 Multicast. Which two descriptions are correct regarding multicast addressing?

A.    The first 23 bits of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.
B.    The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.
C.    To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address into the last 24 bits of the MAC address. The high-order bit is set to 0.
D.    The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E.
This is a reserved value that indicates a multicast application.

Answer: CD

QUESTION 19
EIGRP is being used as the routing protocol on the Company network. While troubleshooting some network connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages. What causes these SIA routes? (Select two)

A.    The neighboring router stops receiving ACK packets from this router.
B.    The neighboring router starts receiving route updates from this router.
C.    The neighboring router is too busy to answer the query (generally caused by high CPU utilization).
D.    The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.

Answer: CD
Explanation:
SIA routes are due to the fact that reply packets are not received. This could be caused by a router which is unable to send reply packets. The router could have reached the limit of its capacity, or it could be malfunctioning.
Notes: If a router does not receive a reply to all outstanding queries within 3 minutes, the route goes to the stuck in active (SIA) state. The router then resets the neighbors that fail to reply by going active on all routes known through that neighbor, and it re-advertises all routes to that neighbor.
http://www.cisco.com/warp/public/103/eigrp3.html

QUESTION 20
You want to enhance the security within the Company LAN and prevent VLAN hopping. What two steps can be taken to help prevent this? (Select two)

A.    Enable BPD guard
B.    Disable CDP on ports where it is not necessary
C.    Place unused ports in a common unrouted VLAN
D.    Prevent automatic trunk configuration
E.    Implement port security

Answer: CD

300-135 dumps full version (PDF&VCE): https://www.lead2pass.com/300-135.html

Large amount of free 300-135 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDZmFQVlZDZnpLejA

Maybe you also need:

300-101 exam dumps:  https://drive.google.com/open?id=0B3Syig5i8gpDakxVRXg3aUpmTE0

300-115 exam dumps:  https://drive.google.com/open?id=0B3Syig5i8gpDM0pqaFJWUXVuM2M

Comments are closed.