mediummultiple choiceObjective-mapped

A switch has DHCP snooping enabled globally, but clients on an access port still receive rogue DHCP offers from an unauthorized device on another access port.

Which additional action should be verified first?

Question 1mediummultiple choice
Full question →

A switch has DHCP snooping enabled globally, but clients on an access port still receive rogue DHCP offers from an unauthorized device on another access port.

Which additional action should be verified first?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Verify that the client-facing access ports are trusted.

Client-facing access ports should normally be untrusted, not trusted.

B

Best answer

Verify that the uplink toward the legitimate DHCP server is trusted.

Correct. The legitimate server or uplink must be trusted, while rogue client ports stay untrusted.

C

Distractor review

Disable Option 82 insertion.

Option 82 is not the first thing to check for rogue offers in this scenario.

D

Distractor review

Enable BPDU Guard on the uplink.

BPDU Guard is unrelated to DHCP snooping trust behavior.

Common exam trap

Common exam trap: answer the scenario, not the keyword

A frequent exam trap is to assume that enabling DHCP snooping globally automatically protects the network from rogue DHCP servers. Candidates may overlook the necessity of configuring the uplink port toward the legitimate DHCP server as trusted. Without this, DHCP server replies from the authorized server are blocked, while rogue DHCP offers from other untrusted ports may still reach clients. This misconfiguration leads to clients receiving incorrect IP addresses, defeating the purpose of DHCP snooping. The trap lies in confusing global enablement with complete protection, ignoring the critical trust assignment step.

Technical deep dive

How to think about this question

DHCP snooping is a security feature on Cisco switches that filters untrusted DHCP messages to prevent rogue DHCP servers from assigning incorrect IP addresses to clients. It classifies switch ports as trusted or untrusted; trusted ports can send DHCP server messages, while untrusted ports can only send DHCP client messages. This mechanism protects the network by ensuring only authorized DHCP servers respond to client requests. When DHCP snooping is enabled globally, the correct operation depends on properly configuring port trust states. Typically, access ports connected to clients remain untrusted to block rogue DHCP offers. The uplink port toward the legitimate DHCP server must be explicitly configured as trusted to allow DHCP server replies to pass through. If the uplink is not trusted, DHCP server messages are dropped, but if a rogue DHCP server is connected to an untrusted access port, its offers may still reach clients if trust settings are misconfigured. A common exam trap is assuming that enabling DHCP snooping globally is sufficient to block rogue DHCP servers. However, if the uplink port to the legitimate DHCP server is not trusted, the switch may inadvertently allow rogue DHCP offers from other untrusted ports. This misconfiguration leads to clients receiving incorrect IP information. Understanding the trust model and verifying uplink trust status is critical for securing DHCP services in Cisco networks.

KKey Concepts to Remember

  • DHCP snooping classifies switch ports as trusted or untrusted to control which ports can send DHCP server messages.
  • Access ports connected to clients should remain untrusted to prevent rogue DHCP server offers from reaching clients.
  • The uplink port toward the legitimate DHCP server must be configured as trusted to allow DHCP server replies.
  • DHCP snooping drops DHCP server messages received on untrusted ports to protect against rogue DHCP servers.
  • Enabling DHCP snooping globally does not automatically trust any ports; trust must be manually assigned to uplinks.
  • Rogue DHCP offers can reach clients if the uplink port is not trusted, even when DHCP snooping is enabled.
  • DHCP snooping helps maintain IP address integrity by filtering unauthorized DHCP server responses on Cisco switches.
  • Misconfiguring port trust states is a common cause of DHCP snooping failures and rogue DHCP server vulnerabilities.

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related 200-301 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this 200-301 question test?

DHCP snooping classifies switch ports as trusted or untrusted to control which ports can send DHCP server messages.

What is the correct answer to this question?

The correct answer is: Verify that the uplink toward the legitimate DHCP server is trusted. — With DHCP snooping, only trusted ports should be allowed to send server replies. Access ports facing clients should remain untrusted.

What should I do if I get this 200-301 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.