exam questions

Exam 300-410 All Questions

View all questions & answers for the 300-410 exam

Exam 300-410 topic 1 question 196 discussion

Actual exam question from Cisco's 300-410
Question #: 196
Topic #: 1
[All 300-410 Questions]



Refer to the exhibits. An engineer identified a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

  • A. spanning-tree portfast bpduguard
  • B. no spanning-tree uplinkfast
  • C. spanning-tree backbonefast
  • D. spanning-tree loopguard default
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
OakA1
Highly Voted 3 years, 6 months ago
The answer should be D. The A enables bpduguard on access ports. We have trunks here. So, loopguard enabled on the trunks will solve the issue. https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-84.html give a good explanation
upvoted 16 times
...
AliMo123
Highly Voted 3 years, 6 months ago
wrong answer portfast is only configured on access port not trunk, so D is correct
upvoted 7 times
[Removed]
3 years, 3 months ago
Im assuming the answer is A because there is a access port connected to a trunk port on that gig interface which would cause loops to occur
upvoted 1 times
Carl1999
3 years, 2 months ago
Where do you know the access port? "Role access" means access switch not access port.
upvoted 3 times
...
...
...
JStorm01
Most Recent 7 months, 2 weeks ago
Had this one on my exam last week. Spanning tree in ENARSI?!
upvoted 2 times
...
tubirubs
8 months, 2 weeks ago
spanning tree in ENARSI Exam?? Not in oficial cert Guild.
upvoted 4 times
...
[Removed]
9 months, 1 week ago
Selected Answer: D
it´s D
upvoted 1 times
...
BTK0311
1 year, 7 months ago
Selected Answer: A
Enabling "spanning-tree portfast bpduguard" on access ports can help prevent Layer 2 loops by shutting down the port if a BPDU (Bridge Protocol Data Unit) is received on the port. This is a common best practice to ensure that access ports do not participate in creating loops.Enabling "spanning-tree loopguard default" globally on a switch will activate the loop guard feature on all designated ports. Loop guard is used to prevent Layer 2 loops in spanning tree networks by detecting and responding to BPDUs (Bridge Protocol Data Units) that are not received as expected. However, enabling "spanning-tree loopguard default" across all designated ports may not be the most appropriate action in all situations. It's a broad change that can affect the entire switch, potentially leading to unwanted consequences in certain network setups.
upvoted 1 times
...
ridonak230
1 year, 7 months ago
Selected Answer: D
Answer D is the correct one ! D. spanning-tree loopguard default
upvoted 2 times
...
HungarianDish_111
1 year, 11 months ago
Selected Answer: D
As I understand, there are some cases, when we would enable portfast and bpduguard on trunk links (for instance, when connecting to ESXi server). Good thread: https://community.cisco.com/t5/switching/enable-bpduguard-on-spanning-tree-portfast-trunk-port-yes-or-no/td-p/2534826 Based on the output, these are two switches that are connected through the affected trunk ports. So, I find loopguard to be the appropriate solution. https://networklessons.com/spanning-tree/spanning-tree-loopguard-udld
upvoted 4 times
Brand
1 year, 7 months ago
We do that but the portfast command requires "trunk" option. It's not the case for A.
upvoted 1 times
...
...
Slinky
2 years ago
Selected Answer: D
Configuring BPDUguard here is just going to shut down both trunks and there will be no traffic.
upvoted 4 times
...
BECAUSE
2 years, 6 months ago
Selected answer is correct. - Not configured under the interface. - https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10586-65.html
upvoted 1 times
...
cyrus777
3 years ago
A https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10596-84.html
upvoted 3 times
cyrus777
3 years ago
The loop guard feature is enabled on a per-port basis. However, as long as it blocks the port on the STP level, loop guard blocks inconsistent ports on a per-VLAN basis (because of per-VLAN STP). That is, if BPDUs are not received on the trunk port for only one particular VLAN, only that VLAN is blocked (moved to loop-inconsistent STP state). For the same reason, if enabled on an EtherChannel interface, the entire channel is blocked for a particular VLAN, not just one link (because EtherChannel is regarded as one logical port from the STP point of view). On which ports should the loop guard be enabled? The most obvious answer is on the blocking ports. However, this is not totally correct. Loop guard must be enabled on the non-designated ports (more precisely, on root and alternate ports) for all possible combinations of active topologies. As long as the loop guard is not a per-VLAN feature, the same (trunk) port might be designated for one VLAN and non-designated for the other. The possible failover scenarios should also be taken into account.
upvoted 1 times
cyrus777
3 years ago
Understanding BPDU Guard The BPDU guard feature can be globally enabled on the switch or can be enabled per interface, but the feature operates with some differences.
upvoted 1 times
cyrus777
3 years ago
At the global level, you enable BPDU guard on Port Fast-enabled STP ports by using the spanning-tree portfast bpduguard default global configuration command. Spanning tree shuts down STP ports that are in a Port Fast-operational state if any BPDU is received on those ports. In a valid configuration, Port Fast-enabled STP ports do not receive BPDUs. Receiving a BPDU on a Port Fast-enabled port signals an invalid configuration, such as the connection of an unauthorized device, and the BPDU guard feature puts the interface in the error-disabled state.
upvoted 1 times
cyrus777
3 years ago
At the interface level, you enable BPDU guard on any STP port by using the spanning-tree bpduguard enable interface configuration command without also enabling the Port Fast feature. When the STP port receives a BPDU, it is put in the error-disabled state. The BPDU guard feature provides a secure response to invalid configurations because you must manually put the interface back in service. Use the BPDU guard feature in a service-provider network to prevent an access port from participating in the spanning tree. You can enable the BPDU guard feature for the entire switch or for an interface.
upvoted 1 times
...
...
...
...
...
bogd
3 years, 2 months ago
Selected Answer: D
Loopguard
upvoted 3 times
...
Carl1999
3 years, 2 months ago
Selected Answer: A
Switch(config)#int gi0/1 Switch(config-if)#switchport mode trunk Switch(config-if)#spanning-tree portfast %Warning: portfast should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc... to this interface when portfast is enabled, can cause temporary bridging loops. Use with CAUTION %Portfast has been configured on GigabitEthernet0/1 but will only have effect when the interface is in a non-trunking mode. Switch(config-if)# Switch(config-if)# spanning-tree portfast trunk %Warning: portfast should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc... to this interface when portfast is enabled, can cause temporary bridging loops. Use with CAUTION Switch(config-if)#exit Switch(config)#spanning-tree portfast bpduguard default
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago