You are on page 1of 119

300-101

Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0

http://www.exam.com/

Cisco
Exam 300-101
Implementing Cisco IP Routing

Cisco 300-101 : Practice Test
Topic break down
Topic No. of Questions
Topic 1: Network Principles 12
Topic 2: Layer 2 Technologies 7
Topic 3: Layer 3 Technologies 25
Topic 4: VPN Technologies 8
Topic 5: Infrastructure Security 8
Topic 6: Infrastructure Services 22
http://www.exam.com/

Topic 7: Mix Questions 68

Topic 1, Network Principles

http://www.exam.com/

Exam A
QUESTION 1
Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three.)
A.
B.
C.
D.
E.

starvation
jitter
latency
windowing
lower throughput

Correct Answer: ACE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which statement about the use of tunneling to migrate to IPv6 is true?
A.
B.
C.
D.

Tunneling is less secure than dual stack or translation.
Tunneling is more difficult to configure than dual stack or translation.
Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts.
Tunneling destinations are manually determined by the IPv4 address in the low-order 32 bits of IPv4-compatible IPv6 addresses.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which two actions must you perform to enable and use window scaling on a router? (Choose two.)
A. Execute the command ip tcp window-size 65536.
B. Set window scaling to be used on the remote host.

http://www.exam.com/

Which two tables does this command clear and rebuild? (Choose two.com/ . Execute the command ip tcp adjust-mss. D. D. E. E. C. B. Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 4 A network administrator executes the command clear ip route. D. when TCP traffic is in the same class as UDP when UDP flows are assigned a lower priority queue when WRED is enabled when ACLs are in place to block TCP traffic Correct Answer: A Section: (none) http://www. IP routing FIB ARP cache MAC address table Cisco Express Forwarding table topology table Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 5 Under which condition does UDP dominance occur? A.) A. B. C. Set TCP options to "enabled" on the remote host. Execute the command ip tcp queuemax. F.exam.C.

C. B. incomplete ARP information incorrect ACL dynamic routing protocol failure serial link congestion Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 7 A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this scenario describe? A. connectionless communication http://www. D. starvation C.Explanation Explanation/Reference: QUESTION 6 Refer to the exhibit. latency B. A network administrator checks this adjacency table on a router. What is a possible cause for the incomplete marking? A.exam.com/ .

process switching C. nonsequencing unordered packets E. jitter Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 8 Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process? http://www.exam.D.com/ A.com/ .exam. D. dual-stack method 6to4 tunneling GRE tunneling NAT-PT Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 9 Which switching method is used when entries are present in the output of the command show ip cache? A. fast switching B. B. Cisco Express Forwarding switching http://www. C.

The router will listen for all multicast traffic.1. Correct Answer: C Section: (none) http://www.1. The IP address of the router on FastEthernet is 209.201.168. B. cut-through packet switching Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 10 Refer to the exhibit. Based on this FIB table. C. There is no default gateway.201. which statement is correct? A.D.exam. D.com/ .168. The gateway of last resort is 192.

B. C.Explanation Explanation/Reference: QUESTION 11 Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three. E. Which condition causes this? A. F.exam.com/ . B. D.) A. global synchronization tail drop random early detection queue management algorithm Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 13 http://www. D. C. header compression explicit congestion notification keepalive time stamps TCP path discovery MTU window Correct Answer: BCD Section: (none) Explanation Explanation/Reference: QUESTION 12 A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease simultaneously during periods of congestion.

Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 15 Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific connection? A. Execute the no switchport command. Disable CDP on the interface. Frame Relay inverse ARP static DLCI mapping Frame Relay broadcast queue dynamic DLCI mapping http://www. C. B. TCP Adjust Dialer Persistent PPPoE Groups half-bridging Peer Neighbor Route Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 14 Prior to enabling PPPoE in a virtual private dialup network group. B. C. D. D. E. even if no interesting traffic exists. C. B.exam.com/ . which task must be completed? A. Execute the vpdn enable command. Which feature can be used to accomplish this task? A. D. Enable QoS FIFO for PPPoE support.A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP.

C. D. B. B.com/ . PAP dot1x IPsec CHAP ESP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 17 Which PPP authentication method sends authentication information in clear text? A. MS CHAP CDPCP CHAP PAP Correct Answer: D Section: (none) Explanation Explanation/Reference: http://www. in combination with PPPoE. D. Which technology. can be used for authentication in this manner? A.Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 16 A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password.exam. C. E.

C. Once the link setup is completed. PPPoE functions as a Layer 2 encapsulation method that allows data to be encrypted over the PPP link within PPPoE headers. D. Once the link setup is completed. B. PPPoE functions as a Layer 4 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers. B.com/ . PPP options are automatically enabled and authorization is performed. PPP options are negotiated and authentication is performed. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 19 PPPoE is composed of which two phases? A.exam. Active Authentication Phase and PPP Session Phase Passive Discovery Phase and PPP Session Phase Active Authorization Phase and PPP Session Phase Active Discovery Phase and PPP Session Phase Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 20 What is the default OSPF hello interval on a Frame Relay point-to-point network? A. D. 10 http://www. Once the link setup is completed. PPP options are not negotiated and authentication is performed. Once the link setup is completed. C. PPP options are negotiated and authentication is not performed. PPPoE functions as a Layer 2 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.QUESTION 18 Which statement is true about the PPP Session Phase of PPPoE? A. PPPoE functions as a Layer 3 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.

com/ .B. It sets the global BGP autonomous system number. 20 C. B. 30 D. 40 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 21 What is the purpose of the autonomous-system {autonomous-system-number} command? A. It sets the global EIGRP autonomous system number.exam. It sets the BGP autonomous system number in a VRF. http://www. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 22 Refer to the exhibit. D. It sets the EIGRP autonomous system number in a VRF. C.

Correct Answer: E Section: (none) Explanation Explanation/Reference: QUESTION 23 A router with an interface that is configured with ipv6 address autoconfig also has a link. Users on the 10. B.com/ .0.0.0/8 network will not be in the routing table on Router B.0/8 network. but users on the 192.0/8 network because it is blocked by the ACL. Router B will not advertise the 10.0.0.5.0/24 cannot successfully ping users on the 10.0.0.0. E.168.16.0/8 network can successfully ping users on the 192.0/8 network is missing from Router B.0.0.local address assigned.exam.0/16 network will be blocked by the ACL.0.0/24 network. The 10. The 10. DHCPv6 request http://www.5. Which message is required to obtain a global unicast address when a router is present? A.0.0. D. C.0.Which one statement is true? A.0/8 network will not be advertised by Router B because the network statement for the 10.168. Traffic from the 172.

redirect Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 24 For security purposes. neighbor-solicitation D. shortly after implementing the traffic filter. http://www.exam. B.com/ . OSPFv3 neighbor adjacencies were lost. D. What caused this issue? A. an IPv6 traffic filter was configured under various interfaces on the local router. which caused the neighbor relationships to fail. IPv6 traffic filtering can be implemented only on SVIs. However. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 25 You have been asked to evaluate how EIGRP is functioning in a customer network. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly. C.B. The link-local addresses that were used by OSPFv3 were explicitly denied. router-advertisement C. The traffic filter is blocking all ICMPv6 traffic.

exam.http://www.com/ .

http://www.exam.com/ .

com/ .http://www.exam.

10 20 30 40 http://www.exam.What percent of R1's interfaces bandwidth is EIGRP allowed to use? A.com/ . D. B. C.

Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 26 Scenario: You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation.exam. The customer has disabled your access to the show running-config command.com/ . http://www.

exam.http://www.com/ .

http://www.exam.com/ .

http://www.exam.com/ .

exam.com/ .http://www.

http://www.com/ .exam.

B. 120.Which of the following statements is true about the serial links that terminate in R3 A.40. 120 The R1-R3 link OSPF timer values should be 10. The R1-R3 link needs the neighbor command for the adjacency to stay up The R2-R3 link OSPF timer values are 30. D. C.com/ .40 R3 is responsible for flooding LSUs to all the routers on the network. http://www.exam.

An IPv6 traffic filter is blocking the networks from being learned via the Router B interface that is connected to Router A. However. Currently EIGRP is configured on all routers R2.0 subnets. The networks were not advertised properly under the OSPFv3 process. JS Industries is interested in using route summarization along with the EIGRP Stub Routing feature to increase network stability while reducing the memory usage and bandwidth utilization to R3. R3. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 28 JS Industries has expanded their business with the addition of their first remote office.Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 27 Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFv3. D. Your task is to identify and resolve the cause of connectivity failure with the remote office router R3. The remote office router (R3) was previously configured and all corporate subnets were reachable from R3. Another network professional was tasked with implementing this solution. and R4 in the network. http://www. You have corrected the fault when pings from R2 to the R3 LAN interface are successful.com/ . B.0. Once the issue has been resolved you should complete the task by configuring route summarization only to the remote office router R3. OSPFv3 timers were adjusted for fast convergence. IPv6 unicast routing is not enabled on Router A or Router B. and the R3 IP routing table only contains 2 10. the message "not a router" is found in the output. C. Why is the routing information not being learned by Router B? A. The networks that are advertised from Router A do not show up in Router B's routing table. in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been lost.exam. After debugging IPv6 packets.0.

http://www.exam.com/ .

http://www.com/ .exam.

http://www.exam.com/ .

Correct Answer: Section: (none) Explanation Explanation/Reference: QUESTION 29 http://www. D. C.com/ .A.exam. B.

0007 subnet 2001:DB8:0:1::/64 Which IPv6 addresses should the engineer add to the documentation? A.After you review the output of the command show ipv6 interface brief. D. B.exam. IPv6 unicast forwarding was enabled. you see that several IPv6 addresses have the 16-bit hexadecimal value of "FFFE" inserted into the address.com/ . The IPv6 universal/local flag (bit 7) was flipped. D. C. and was asked to document the IPv6 address of the router. E. The customer has disabled http://www. The addresses were misconfigured and will not function as intended. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 30 An engineer has configured a router to use EUI-64. Based on this information. B. but IPv6 Cisco Express Forwarding was disabled. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device. 2001:DB8:0:1:C601:42FF:FE0F:7 2001:DB8:0:1:FFFF:C601:420F:7 2001:DB8:0:1:FE80:C601:420F:7 2001:DB8:0:1:C601:42FE:800F:7 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 31 Scenario: You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation.420F. what do you conclude about these IPv6 addresses? A. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast. C. The router has the following interface parameters: mac address C601.

http://www.your access to the show running-config command.exam.com/ .

exam.http://www.com/ .

exam.http://www.com/ .

com/ .exam.http://www.

com/ .http://www.exam.

http://www.exam.com/ .

How many times was SPF algorithm executed on R4 for Area 1?
A.
B.
C.
D.
E.

1
5
9
20
54

http://www.exam.com/

F. 224
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?
A.
B.
C.
D.

10.9.1.0/24
10.8.0.0/24
10.8.0.0/16
10.8.0.0/23

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled
your access to the show running-config command.

http://www.exam.com/

http://www.exam.com/

exam.com/ .http://www.

exam.com/ .http://www.

http://www.com/ .exam.

D.exam. 1858 1601 600 1569 http://www. B.com/ .How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output you have examined? A. C.

http://www.com/ .exam.Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 34 You have been asked to evaluate how EIGRP is functioning in a customer network.

http://www.com/ .exam.

com/ .exam.http://www.

http://www.exam.com/ .

D.com/ .46.168. 333056 1938688 1810944 307456 http://www. C. B.What is the advertised distance for the 192.0 network on R1? A.exam.

com/ http://www.com/ .Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 35 You have been asked to evaluate how EIGRP is functioning in a customer network.exam. http://www.exam.

exam.http://www.com/ .

http://www.exam.com/ .

http://www.exam.com/ .

com/ .http://www.exam.

C. B.com/ . CISCO EIGRP key MD5 http://www.exam. D.Which key chain is being used for authentication of EIGRP adjacency between R4 and R2? A.

com/ .Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation: R4 and R2 configs are as shown below: http://www.exam.

exam.com/ .http://www.

All local host traffic will be redirected to the router with the lowest ICMPv6 signature. QUESTION 36 A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment.Clearly we see the actual key chain is named CISCO. such as prefix discovery.3. Routers on the IPv6 segment will respond with an advertisement that provides an external path from the local subnet. as well as certain data. B. C. Which command only announces the 1. where the DHCP server will allocate addresses to the local host. distribute list 1 out distribute list 1 out FastEthernet0/0 distribute list 2 out distribute list 2 out FastEthernet0/0 http://www.0/24 network out of FastEthernet 0/0? A.2. What is the expected acknowledgment and its usage? A. B. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 37 Refer to the exhibit. which is statically defined by the network administrator.com/ . Duplicate Address Detection will determine if any other local host is using the same IPv6 address for communication with the IPv6 routers on the segment. D. D.exam. Router acknowledgment messages will be forwarded upstream. C.

exam.5/30 . ·OSPF area 21 must not receive any inter-area or external routes.Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 38 Route. OSPF has been configured on routers Chicago and NewYork. You have been asked to complete the implementation to allow this ping.6/30 .com's corporate implementation guidelines require: · The OSPF process ID for all routers must be 10.168.168. However.Link between Seattle and Chicago Secre Password: cisco http://www.168. · The routing protocol must be enabled for each interface using the most specific wildcard mask possible. The SO/O interface on Chicago and the SO/1 interface on NewYork are in Area 0. ·The serial link between Seattle and Chicago must be in OSPF area 21.16. ROUTE.com/ . they cannot ping from the serial interface of the Seattle router to the loopback interface of the NewYork router. Network Information Seattle S0/0 192. Currently the implementation is partially completed.Link between Seattle and Chicago Secret Password: cisco Chicago S0/0 192. The routing protocol for each interface must be enabled under the routing process.54.Link between Chicago and NewYork S0/1 192.16. The loopbackO interface on NewYork is in Area 1.com is a small IT corporation that is attempting to implement the network shown in the exhibit.9/30 .

54.189 Secret Password: cisco http://www.189.exam.16.Link between Chicago and NewYork Loopback0 172.10/30 .com/ .168.NewYork S0/1 192.

http://www.com/ .exam.

http://www.exam.com/ .

exam.com/ .A. Correct Answer: http://www. B. C. D.

http://www.com/ .Section: (none) Explanation Explanation/Reference: QUESTION 39 You have been asked to evaluate how EIGRP is functioning in a customer network.exam.

com/ .exam.http://www.

exam.com/ .http://www.

http://www.com/ .exam.

exam.http://www.com/ .

com/ .http://www.exam.

Traffic from R1 to R61 s Loopback address is load shared between R1-R2-R4-R6 and R1- R3-R5-R6 paths. What is the ratio of traffic over each path?
A.
B.
C.
D.

1:1
1:5
6:8
19:80

http://www.exam.com/

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled
your access to the show running-config command.

http://www.exam.com/

http://www.exam.com/

http://www.com/ .exam.

http://www.com/ .exam.

exam.com/ .http://www.

http://www.exam.com/ .

R5's Loopback and R6's Loopback are both present in R5's Routing table B.Areas of Router 5 and 6 are not normal areas.com/ . inspect their routing tables and determine which statement is true? A.exam. Only R5's loopback is present in R5's Routing table http://www. R5's Loopback and R6's Loopback are both present in R6's Routing table C.

Only R5's loopback is present in R6's Routing table Correct Answer: A Section: (none) Explanation Explanation/Reference: Topic 4.165.255. VPN Technologies QUESTION 41 Which encapsulation supports an interface that is configured for an EVN trunk? A. 802. C. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites? A.D.exam.1Q ISL PPP Frame Relay MPLS HDLC Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 42 A company has just opened two remote branch offices that need to be connected to the corporate network.200.com/ .230 255.230 255.255. D. E.224 tunnel source Serial0/0 tunnel mode gre multipoint B.255. B.200. interface fa0/0 bandwidth 1536 ip address 209.255. Only R6's loopback is present in R5's Routing table E.224 tunnel mode gre multipoint http://www.165. interface Tunnel0 bandwidth 1536 ip address 209. F.

161.C.2/8 via 10. The mapping entry was created in response to an NHRP registration request.165. Data packets are process switches for this mapping entry.1.exam.231 255. interface Tunnel0 bandwidth 1536 ip address 209.1 tunnel-mode dynamic Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 43 Refer to the following output: Router#show ip nhrp detail 10.168.2 tunnel destination 209. The NHRP mapping entry cannot be overwritten. NHRP mapping is for networks that are local to this router. Tunnel1 created 00:00:12.2.224 tunnel source 192.255.2. B. Flags: authoritative unique nat registered used NBMA address: 10. Correct Answer: A Section: (none) Explanation http://www.2 What does the authoritative flag mean in regards to the NHRP information? A.1 tunnel-mode dynamic D.224 tunnel source 209.165. E. expire 01:59:47 TypE.1.255. interface fa 0/0 bandwidth 1536 ip address 209. dynamic.165. D.255.201.com/ . It was obtained directly from the next-hop server.165.1.255.200.201.12.231 255.1. C.200.

B. and Cisco Express Forwarding? A. mGRE. E. inbound crypto map remaining key lifetime path MTU tagged packets untagged packets invalid identity packets Correct Answer: ABC Section: (none) http://www.) http://www. C. D. C.com/ . FlexVPN DMVPN GETVPN Cisco Easy VPN Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 45 A network engineer executes the show crypto ipsec sa command.com/ A. B. Which three pieces of information are displayed in the output? (Choose three. F.exam. D. NHRP.Explanation/Reference: QUESTION 44 Which Cisco IOS VPN technology leverages IPsec. dynamic routing protocol.exam.

) A. C.Explanation Explanation/Reference: QUESTION 46 Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three. input a prescribed IP address.exam. The network engineer advises the user to open a web browser. Which type of remote access did the engineer enable? A. and follow the instructions. After doing this. D. D. B. EZVPN IPsec VPN client access VPDN client access SSL VPN client access Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 48 What are the three modes of Unicast Reverse Path Forwarding? http://www. B. C. IP address routing table forwarding table access control lists NetFlow configuration Correct Answer: ABC Section: (none) Explanation Explanation/Reference: QUESTION 47 A user is having issues accessing file shares on a network.com/ . E. the user is able to access company shares.

com/ .15.0.16. loose mode.0. which is applied on the external interface FastEthernet 1/0 of the perimeter router.0.168. loose mode. and VRF mode Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 49 What does the following access list. accomplish? router(config)#access-list 101 deny ip 10.255 any log router (config)#access-list 101 deny ip 192. 172.255 and logs any intrusion attempts. B.0.255. loose mode. D.0-10. D.255. B.255.0.0.0.0.0.255 any log router (config)#access-list 101 permit ip any any router (config)#interface fastEthernet 1/0 router (config-if)#ip access-group 101 in A.0. C.168. and VRF mode broadcast mode. and broadcast mode strict mode.A.31.0.0 0. strict mode. broadcast mode.255.0-192. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.172.255. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://www.255.255.255.255 any log router (config)#access-list 101 deny ip 172. 192.168. and VRF mode strict mode. C.0 0.0.0 0.exam. It prevents incoming traffic from IP address ranges 10. It prevents private internal addresses to be accessed directly from outside.16.

225. the network engineer notices that the router CPU utilization has risen to 99 percent. access-list 100 permit ip any any log After applying the access list on a Cisco router.QUESTION 50 A network engineer is configuring a routed interface to forward broadcasts of UDP 69. D. B.exam.20.com/ .14. router(config-if)#ip helper-address 172.20.225 router(config-if)#udp helper-address 172.14. Which command should be applied to the configuration to allow this? A. C. D.20.14.14. 53. and 49 to 172.20.225 router(config-if)#ip udp helper-address 172.225 router(config-if)#ip helper-address 172. B. source address destination address router interface default gateway Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 52 Refer to the following access list.225 69 53 49 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 51 Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? A.14. C. What is the reason for this? http://www.20.

com/ . You can use an IOS parser. B. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 54 Which traffic does the following configuration allow? ipv6 access-list cisco permit ipv6 host 2001:DB8:0:4::32 any eq ssh line vty 0 4 ipv6 access-class cisco in http://www. D. E. C. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 53 For troubleshooting purposes. A packet that matches access-list with the "log" keyword is fast switched. A packet that matches access-list with the "log" keyword is process switched.A. D. C.exam. A large amount of IP traffic is being permitted on the router. You can disable the IP route cache globally. B. You can use the KRON scheduler. You can use the RITE traffic exporter. You can use an extended access list. which method can you use in combination with the "debug ip packet" command to limit the amount of output data? A.

It is checksum-neutral. It maintains a per-node state. C. all traffic to vty 0 4 from source 2001:DB8:0:4::32 only ssh traffic to vty 0 4 from source all only ssh traffic to vty 0 4 from source 2001:DB8:0:4::32 all traffic to vty 0 4 from source all Correct Answer: C Section: (none) Explanation Explanation/Reference: Topic 6. B. Correct Answer: C Section: (none) http://www. E. It interferes with encryption of the full IP payload. B.A. C. Which feature allows IPv6 devices to communicate with IPv4 servers? A. NAT NATng NAT64 dual-stack NAT DNS64 Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 56 What is a function of NPTv6? A. but not to the servers. B. It rewrites transport layer headers.com/ . C. D. D. Infrastructure Services QUESTION 55 IPv6 has just been deployed to all of the hosts within a network. D.exam.

D. the network engineer is unable to see OUT traffic on the interfaces.com/ . C. D. B. which allows for maintenance mode.Explanation Explanation/Reference: QUESTION 57 Which NetFlow component is applied to an interface and collects information about flows? A. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 59 An organization decides to implement NetFlow on its network to monitor the fluctuation of traffic that is disrupting core services. Track the up/down state of a loopback interface and shut down this interface during maintenance. What can you determine based on this information? http://www. B.exam. Disable and enable all active interfaces on the active HSRP node. Enable HSRPv2 under global configuration. Which action will allow for manual switching of HSRP nodes? A. Adjust the HSRP priority without the use of preemption. C. as an alternative to powering down the active router and letting the network respond accordingly. After reviewing the output of NetFlow. flow monitor flow exporter flow sampler flow collector Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 58 A network engineer is configuring a solution to allow failover of HSRP nodes during maintenance windows.

C. The command ip flow-capture fragment-offset has been enabled. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 60 When using SNMPv3 with NoAuthNoPriv. In this situation. D. username password community-string encryption-key Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 61 A network engineer finds that a core router has crashed without warning. which string is matched for authentication? A. B. E. which feature can the engineer use to create a crash collection? A. Flow Export version 9 is in use. B.com/ . D.exam. C.A. D. Cisco Express Forwarding has not been configured globally. secure copy protocol core dumps warm reloads SNMP NetFlow Correct Answer: B http://www. B. NetFlow output has been filtered by default. C.

exam. C. D. C. information such as the source/destination IP and Layer 4 port numbers is required. D. Which line in the output indicates that the send queue is full and export packets are not being sent? A.com/ . E. B. In order to identify which specific type of traffic is causing this slowness. Which feature should the engineer use to gather the required information? A. B.Section: (none) Explanation Explanation/Reference: QUESTION 62 A network engineer executes the show ip flow export command. SNMP Cisco IOS EEM NetFlow Syslog WCCP Correct Answer: C Section: (none) Explanation Explanation/Reference: http://www. and bandwidth-intensive applications are identified as the root cause. output drops enqueuing for the RP fragmentation failures adjacency issues Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 63 A network engineer is notified that several employees are experiencing network performance related issues.

QUESTION 64 A network engineer is asked to configure a "site-to-site" IPsec VPN tunnel. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 65 A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. D. Use the msec option to enable service time stamps. C. One of the last things that the engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside source list 1 int s0/0 overload. B. B.com/ .) A. The command access-list 1 defines interesting traffic that is allowed through the tunnel. The command ip nat inside source list 1 int s0/0 overload disables "many-to-one" access for all devices on a defined segment to share a single IP address upon exiting the external interface. senior management asks you to implement better logging functionality on all IOS-based devices. D. connectionless-oriented service-oriented connection-oriented application-oriented Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 66 After a recent DoS attack on a network. The command access-list 1 permit any defines only one machine that is allowed through the tunnel. Which functions do the two commands serve in this scenario? A. http://www. Which type of statistics does the engineer see? A. Which two actions can you take to provide enhanced logging results? (Choose two. C. The command ip nat inside source list 1 int s0/0 overload provides "many-to-one" access for all devices on a defined segment to share a single IP address upon exiting the external interface.exam.

Disable event logging on all noncritical items. C.10.1 on port UDP/5858.10. It configures the router to export cache flow information to IP 10. D. Increase the logging history Set the logging severity level to 1.B. It configures the router to receive cache flow information about flows with destination IP 10.10. Specify a logging rate limit.) A.10. It configures the router to receive cache flow information from IP 10. Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 67 Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.1 and port UDP/5858. D.1 5858? A. B. C.1 and port UDP/5858.10.10. DNS NAT port redirection stateless translation session handling Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 68 What is the result of the command ip flow-export destination 10.exam. E.10.1 on port UDP/5858. It configures the router to export cache flow information about flows with destination IP 10. Correct Answer: A Section: (none) http://www.10. C.com/ . E. D. B.10.10.

Explanation Explanation/Reference: QUESTION 69 A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Which statement about the output of the show flow-sampler command is true? A. D. It enables a device to receive NTP broadcast and unicast packets. C. It enables a device to be an NTP peer to another device.com/ . It enables receiving NTP broadcasts on the interface where the command was executed.exam. one packet every 100 seconds. Assuming that an NTP server is already set up. D. The sampler matched 10 packets. The sampler matched 10 packets. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 70 Refer to the exhibit. one packet every 100 packets. C. The sampler matched 10 packets. Correct Answer: A Section: (none) Explanation http://www. B. what is the result of the command? A. It enables receiving NTP broadcasts on all interfaces globally. The sampler matched 10 packets. B. each packet randomly chosen from every group of 100 packets. each one randomly chosen from every 100-second interval.

What is the result? A. C. What is the best solution to ensure compliance with this new policy? A. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 73 A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications. and IPv6 to IPv6 translations at the Internet edge are performed. Which command satisfies the requirements of this scenario? http://www. 1-to-1. B. IPv6 flow control is enabled on the router. Flow-set marking in 1280-byte or larger packets is enabled. B.com/ . D. the engineer is not concerned with authentication or encryption. E.exam. C. IPv6 PMTU is enabled on the router. Flow-label marking in 1280-byte or larger packets is enabled.Explanation/Reference: QUESTION 71 A company's corporate policy has been updated to require that stateless. D. However. NAT64 NAT44 NATv6 NPTv4 NPTv6 Correct Answer: E Section: (none) Explanation Explanation/Reference: QUESTION 72 A network engineer executes the "ipv6 flowset" command.

The following command is entered: switch#show flow exporter Flow_Exporter-1 What is the expected output? A. D.http://www.201.201.16. configuration of the specified flow exporter current status of the specified flow exporter status and statistics of the specified flow monitor configuration of the specified flow monitor Correct Answer: B Section: (none) Explanation Explanation/Reference: http://www. C.16.exam.28 informs version 2c CISCORO router(config)#snmp-server host 172. router(config)#snmp-server host 172. B.201.28 traps version 2c CISCORO router(config)#snmp-server host 172.com/ . D.16.28 informs version 3 auth CISCORO Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 74 A network engineer has left a NetFlow capture enabled over the weekend to gather information regarding excessive bandwidth utilization. C.exam.28 traps version 3 auth CISCORO router(config)#snmp-server host 172.com/ A.201.16. B.

B. D. stateless stateful manual automatic static functional dynamic Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 77 Which type of handshake does CHAP authentication use to establish a PPP link? A. G. C.) A. B. E.QUESTION 75 Which type of traffic does DHCP snooping drop? A. discover messages DHCP messages where the source MAC and client MAC do not match traffic from a trusted DHCP server to client DHCP messages where the destination MAC and client MAC do not match Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 76 Which two methods of deployment can you use when implementing NAT64? (Choose two. one-way http://www.exam. D. C. F.com/ .

) A. EUI-64 SLAAC DHCPv6 BOOTP Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 79 http://www.com ! If IPv6 is configured with default settings on all interfaces on the router. D. C.com/ .exam. which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.B. B. three-way D. four-way Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 78 The following configuration is applied to a router at a branch site: ipv6 dhcp pool dhcp-pool dns-server 2001:DB8:1:B::1 dns-server 2001:DB8:3:307C::42 domain-name example. two-way C.

exam. D. Neither RADIUS nor TACACS+ allow for accounting of commands. C. C. B. RIP OSPF iBGP EIGRP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 81 Which two commands would be used to troubleshoot high memory usage for a process? (Choose two. E. Correct Answer: BD Section: (none) Explanation Explanation/Reference: QUESTION 80 A router receives a routing advertisement for the same prefix and subnet from four different routing protocols.) A. C. RADIUS and TACACS+ allow accounting of commands.Which two statements about AAA implementation in a Cisco router are true? (Choose two. RADIUS and TACACS+ are client/server AAA protocols. Which advertisement is installed in the routing table? A.com/ .) A. RADIUS and TACACS+ encrypt the entire body of the packet. B. RADIUS is more flexible than TACACS+ in router management. router#show memory allocating-process table router#show memory summary router#show memory dead router#show memory events router#show memory processor statistics http://www. B. D. D. E.

Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 83 Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three. C. troubleshooting. F.Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 82 Refer to the following configuration command. and usability reduced configuration and deployment time for dot1q trunking increased network performance and throughput decreased BGP neighbor configurations Correct Answer: ABC Section: (none) Explanation http://www. D.exam.com/ . E. C. The router acts as an authoritative NTP clock and allows only 10 NTP client connections. simplified Layer 3 network virtualization improved shared services support enhanced management. The router acts as an authoritative NTP clock for 10 minutes only. The router acts as an authoritative NTP clock at stratum 10. B. D. B.) A. The router acts as an authoritative NTP clock with a priority number of 10. router (config-line)# ntp master 10 Which statement about this command is true? A.

Which statement is true? http://www.0/27 from its routing table. Correct Answer: AC Section: (none) Explanation Explanation/Reference: QUESTION 85 Refer to the exhibit.2. Which two events will occur following link failure between R2 and R3? (Choose two.168.168.0/27 route from its routing table.168.com/ .0/27 with a hop count of 16. R1 will remove the 192. R3 will not accept any further updates from R2.168.) A. After communication fails and after the hold-down timer expires. D. due to the split-horizon loop prevention mechanism.2. B.Explanation/Reference: QUESTION 84 Refer to the exhibit. The network setup is running the RIP routing protocol.exam. E. R2 will not send any advertisements and will remove route 192. C.2.0/27 with a hop count of 16 to R1.2. R1 will reply to R2 with the advertisement for network 192. R2 will advertise network 192.

E. Router B will not advertise the 10.1 eq 80 any permit ip any any http://www. Users on the 10.0.0. ip access-list extended 200 deny tcp host 10.0.A.1? A.10.0/24 network.0. applied to the WAN interface of a router.exam.0. The 10.0/8 network.0/8 network is missing from Router B. B.10.16.com/ . D. Correct Answer: E Section: (none) Explanation Explanation/Reference: QUESTION 86 Which outbound access list.0/8 network because it is blocked by the ACL. Traffic from the 172.0.0.10.0. C. The 10.0.10.0.0/8 network will not be advertised by Router B because the network statement for the 10.168.5.0.5.0.168.0.0/8 network will not be in the routing table on Router B.0/24 cannot successfully ping users on the 10. but users on the 192.0/8 network can successfully ping users on the 192.0/16 network will be blocked by the ACL. permits all traffic except for http traffic sourced from the workstation with IP address 10.

10.1 any eq 80 permit ip any any Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 87 Refer to the exhibit.10.10. ip access-list extended 10 deny tcp host 10.10. ip access-list extended NO_HTTP deny tcp host 10.com/ .exam.10.10. Which statement about the command output is true? http://www.1 any eq 80 D.1 any eq 80 permit ip any any C.B. ip access-list extended 100 deny tcp host 10.

The router exports flow information to 10.10.10.10. The router receives flow information from 10. D. B. C. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://www.1 on TCP port 5127. The router exports flow information to 10.2 on UDP port 5127.10. The router receives flow information from 10.10.1 on UDP port 5127.com/ .10.10.2 on TCP port 5127.A.10.exam.

exam. any other return code means that the track's state is up. D.com/ . any other return code means that the track's state is down. When tracking state. an OK return code means that the track's state is down. Which technology must be configured to prevent remote sites from getting overwhelmed with traffic and prevent packet drops from the headquarters? A.0 Upon entering the command on the IOS router. B.20 192. any other return code means that the track's state is down.1.1. D. Which statement about state tracking is true? A. When tracking state.QUESTION 88 A company has their headquarters located in a large city with a T3 frame relay link that connects 30 remote locations that each have T1 frame relay connections. an OK or over threshold return code means that the track's state is up. C. C. the following message is seen on the console: http://www. When tracking state. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 90 A network engineer is trying to modify an existing active NAT configuration on an IOS router by using the following command: (config)# no ip nat pool dynamic-nat-pool 192. an OK or over threshold return code means that the track's state is down.1. an OK return code means that the track's state is up.255.255. any other return code means that the track's state is up. When tracking state. B.254 netmask 255.1. traffic shaping IPsec VPN GRE VPN MPLS Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 89 Two aspects of an IP SLA operation can be tracked: state and reachability.

com/ . cannot destroy What is the least impactful method that the engineer can use to modify the existing IP NAT configuration? A. then replace the NAT configuration quickly. then replace the NAT configuration quickly. Clear the IP NAT translations using the reload command on the router. B. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 91 Which technology was originally developed for routers to handle fragmentation in the path between end points? A. then replace the NAT configuration quickly. D.%Dynamic Mapping in Use. C. Clear the IP NAT translations using the clear ip nat translation * " command. E. before any new NAT entries are populated into the translation table due to active NAT traffic. D. before any new NAT entries are populated into the translation table due to active NAT traffic. Clear the IP NAT translations using the clear ip nat table * " command. Clear the IP NAT translations using the clear ip nat traffic * " command. then replace the NAT configuration quickly.exam. Cannot remove message or the %Pool outpool in use. before any new NAT entries are populated into the translation table due to active NAT traffic. before any new NAT entries are populated into the translation table due to active NAT traffic. C. B.) http://www. PMTUD MSS windowing TCP global synchronization Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 92 In which two ways can NetFlow data be viewed? (Choose two.

B. The monitor starts at 12:05:00 a.com/ . 20 packets are being sent every 30 seconds. C. Correct Answer: A Section: (none) Explanation Explanation/Reference: http://www. B.A. Which statement about the configuration is true? A. C. D. The packets that are being sent use DSCP EF.m. D. E.exam. CLI NetFlow built-in GUI syslog server interface web interface Correct Answer: AB Section: (none) Explanation Explanation/Reference: QUESTION 93 Refer to the exhibit. Jitter is being tested with TCP packets to port 65051.

C. by forwarding the packet by dropping the packet by creating a new FIB entry for the packet by looking in the routing table for an alternate FIB entry Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 96 A network engineer is investigating the cause of a service disruption on a network segment and executes the debug condition interface fastethernet f0/0 command. Which type of IPv6 address is portrayed in the exhibit? A. link-local site-local global multicast Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 95 How does an IOS router process a packet that should be switched by Cisco Express Forwarding without an FIB entry? A. In which situation is the debugging output generated? A. B.QUESTION 94 Refer to the exhibit.com/ . C. B. D. when packets on the interface are received and the interface is operational http://www. D.exam. The command is executed while configuring a point-to-multipoint Frame Relay interface.

when packets on the interface are received and logging buffered is enabled C. A PPPoE session can be initiated only by the client. Correct Answer: C Section: (none) Explanation http://www. C. Verify the GRE tunnels. Multiple PPPoE clients can use the same dialer interface. C. Verify crypto maps. when packets on the interface are received and forwarded to a configured syslog server D. D. Which action should the administrator take before troubleshooting the IPsec configuration? A. B. A PPPoE session can be initiated only by the access concentrator.com/ .exam. Verify ISAKMP. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 98 Which statement is a restriction for PPPoE configuration? A. Multiple PPPoE clients can use the same dialer pool. B. Verify NHRP. D.B. when packets on the interface are received and the interface is shut down Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 97 A network administrator is troubleshooting a DMVPN setup between the hub and the spoke.

25 every 3 seconds using an ICMP echo packet via an ICMP echo probe. E.exam.Explanation/Reference: QUESTION 99 Which three items can you track when you use two time stamps with IP SLAs? (Choose three.com/ . F. Update: 30 seconds Expire: 180 seconds Flush: 240 seconds Update: 20 seconds Expire: 120 seconds Flush: 160 seconds Update: 10 seconds Expire: 60 seconds Flush: 80 seconds Update: 5 seconds Expire: 30 seconds Flush: 40 seconds Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 101 An engineer is asked to monitor the availability of the next-hop IP address of 172.) http://www. delay jitter packet loss load throughput path Correct Answer: ABC Section: (none) Explanation Explanation/Reference: QUESTION 100 What are the default timers for RIPng? A. C.201. C. D. B. Which two commands accomplish this task? (Choose two. B.16.) A. D.

25 interval 100 D. 2. link-local global site-local anycast multicast Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 103 The OSPF database of a router shows LSA types 1. E. D. 3. and 7 only.16.exam.16. router(config-ip-sla-echo)#threshold 3 Correct Answer: AD Section: (none) Explanation Explanation/Reference: QUESTION 102 Which IPv6 address type is seen as the next-hop address in the output of the show ipv6 rip RIPng database command? http://www. router(config-ip-sla-echo)#frequency 3 router(config-ip-sla)#udp-echo 172. B.201.com/ . B.A. Which type of area is this router connected to? http://www. router(config-ip-sla)#icmp-echo 172.25 source-interface FastEthernet 0/0 router(config-ip-sla-echo)#timeout 3 router(config-ip-sla)#icmp-jitter 172. C.com/ A.25 source-port 23 F.exam.201.16. D. C.201.

what is the bandwidth delay product? A. C.A. D. stub area totally stubby area backbone area not-so-stubby area Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 104 If the total bandwidth is 64 kbps and the RTT is 3 seconds.000 bytes 62.exam. B. E.000 bytes 16.000 bytes Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 105 On which two types of interface is Frame Relay switching supported? (Choose two. C.) A. B. C.000 bytes 24. B. D.com/ .000 bytes 32. serial interfaces Ethernet interfaces fiber interfaces ISDN interfaces auxiliary interfaces Correct Answer: AD http://www. E. D. 8.

adding a static route for the VRF that points to the global route table adding the loopback to the VRF adding dynamic routing between the two routers and advertising the loopback adding the IP address of the loopback to the export route targets for the VRF adding a static route for the VRF that points to the loopback interface F. Which two configurations enable the local or remote router to ping the loopback from any existing interface? (Choose two.) A. C. adding all interfaces to the global and VRF routing tables Correct Answer: AB Section: (none) Explanation Explanation/Reference: http://www. EIGRP uses a default variance of 2 for load balancing. E. but it cannot ping any of the existing interfaces. By default. At a later time. D. B. By default. EIGRP performs equal cost load balancing at least across four equal cost paths. EIGRP unequal path load balancing can result in routing loops. C. EIGRP allows a maximum of four paths across for load balancing traffic.exam. a new loopback is added to Router 1.com/ .Section: (none) Explanation Explanation/Reference: QUESTION 106 A network engineer is considering enabling load balancing with EIGRP. Which consideration should be analyzed? A. B. D. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 107 A network engineer has set up VRF-Lite on two routers where all the interfaces are in the same VRF.

a private AS number a public AS number a private 4-byte AS number a public 4-byte AS number http://www. B. and TACACS+ uses UDP. C. RIPv2 OSPFv2 BGP EIGRP IS-IS Correct Answer: BD Section: (none) Explanation Explanation/Reference: QUESTION 109 Which statement is true? A.exam. Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 110 Which type of BGP AS number is 64591? A. D.com/ . B. C. RADIUS uses TCP. TACACS+ encrypts only the password portion of a packet. TACACS+ separates authentication and authorization. D.) A. C.QUESTION 108 Which two routing protocols are supported by Easy Virtual Network? (Choose two. E. RADIUS encrypts the entire body of the packet. B. D.

ip nat inside source list 10 interface FastEthernet0/1 overload ip nat outside source static 209.exam.10. D. B.10.200. C. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet? A.0 overload ip nat inside source list 10 interface FastEthernet0/2 overload ip nat outside source list 10 interface FastEthernet0/2 overload Correct Answer: A Section: (none) Explanation Explanation/Reference: http://www.Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 111 Refer to the exhibit.225 10.com/ .165.

B. C. D. Either a firewall between the two routers or an ACL on the router is blocking UDP 57. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 113 Which parameter in an SNMPv3 configuration offers authentication and encryption? http://www. Either a firewall between the two routers or an ACL on the router is blocking TCP 47. Either a firewall between the two routers or an ACL on the router is blocking IP protocol number 47. After configuring GRE between two routers running OSPF that are connected to each other via a WAN link.com/ . What is the reason for this? A. Either a firewall between the two routers or an ACL on the router is blocking IP protocol number 57.QUESTION 112 Refer to the exhibit. a network engineer notices that the two routers cannot establish the GRE tunnel to begin the exchange of routing updates.exam.

auth noauth priv secret Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 114 Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses? A. B. It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities. C. BGP LLDP EIGRP NHRP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 115 What is the purpose of the route-target command? A.A. It manages the import and export of routes between two or more VRF instances. Correct Answer: C Section: (none) http://www. B. B. C. It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities. D. D.com/ . It extends the IP address to identify which VRF instance it belongs to. D. C.exam.

) http://www. if the required matching is based on which criteria? A. D.exam. addressing information route types AS paths metrics Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 117 To configure SNMPv3 implementation. They become unauthenticated and encrypted. B. They become authenticated and unencrypted. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 118 The enterprise network WAN link has been receiving several denial of service attacks from both IPv4 and IPv6 sources. What effect does this action have on the SNMP messages? A. Which three elements can you use to identify an IPv6 packet via its header. a network engineer is using the AuthNoPriv security level. They become authenticated and encrypted.Explanation Explanation/Reference: QUESTION 116 A route map uses an ACL. C.com/ . D. in order to filter future attacks? (Choose three. B. C. They become unauthenticated and unencrypted.

A. C. E. Traffic Class Source address Flow Label Hop Limit Destination Address Fragment Offset Correct Answer: ACD Section: (none) Explanation Explanation/Reference: QUESTION 119 Which two authentication protocols does PPP support? (Choose two. WAP PAP CHAP EAP RADIUS Correct Answer: BC Section: (none) Explanation Explanation/Reference: QUESTION 120 Drag and drop the BGP states from the left to the matching definitions on the right. http://www. C.com/ .) A. E.exam. B. B. F. D. D.

A.com/ . D.exam. Correct Answer: Section: (none) Explanation Explanation/Reference: http://www. B. C.

com/ . http://www.exam.QUESTION 121 Refer to the exhibit.

HSRP VRRP IP SLA multicast Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 122 What is the primary service that is provided when you implement Cisco Easy Virtual Network? A. Correct Answer: C Section: (none) Explanation Explanation/Reference: http://www. It reduces the need for common services separation. C. B. It introduces multi-VRF and label-prone network segmentation. It requires and enhances the use of VRF-Lite. It allows for traffic separation and improved network efficiency. C.exam.Which technology can be employed to automatically detect a WAN primary link failure and failover to the secondary link? A. D. B.com/ .exam.com/ http://www. D.