CCNP Route
CCNP Route
CCNP Route
847q
Number: 300-101
Passing Score: 800
Time Limit: 120 min
File Version: 25.0
300-101
Version 25.0
Sections
1. Network Principles
2. Layer 2 Technologies
3. Layer 3 Technologies
4. VPN Technologies
5. Infrastructure Security
6. Infrastructure Services
7. Mix Questions
Exam A
QUESTION 1
Refer to the exhibit.
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
The 0.0.0.0/0 route is the default route and is listed as the first CEF entry. Here we see the next hop for this default route lists 192.168.201.1 as the default
router (gateway of last resort).
QUESTION 2
Refer to the exhibit.
A network administrator checks this adjacency table on a router. What is a possible cause for the incomplete marking?
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
To display information about the Cisco Express Forwarding adjacency table or the hardware Layer 3-switching adjacency table, use the show adjacency
command.
Reasons for Incomplete Adjacencies
There are two known reasons for an incomplete adjacency:
The router cannot use ARP successfully for the next-hop interface.
After a clear ip arp or a clear adjacency command, the router marks the adjacency as incomplete. Then it fails to clear the entry.
In an MPLS environment, IP CEF should be enameled for Label Switching. Interface level command ip route-cache cef
No ARP Entry
When CEF cannot locate a valid adjacency for a destination prefix, it punts the packets to the CPU for ARP resolution and, in turn, for completion of the
adjacency.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/express-forwarding-cef/17812-cef-incomp.html#t4
QUESTION 3
A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease simultaneously during periods of congestion.
Which condition causes this?
A. global synchronization
B. tail drop
C. random early detection
D. queue management algorithm
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
TCP global synchronization in computer networks can happen to TCP/IP flows during periods of congestion because each sender will reduce their
transmission rate at the same time when packet loss occurs.
Routers on the Internet normally have packet queues, to allow them to hold packets when the network is busy, rather than discarding them.
Because routers have limited resources, the size of these queues is also limited. The simplest technique to limit queue size is known as tail drop. The queue
is allowed to fill to its maximum size, and then any new packets are simply discarded, until there is space in the queue again.
This causes problems when used on TCP/IP routers handling multiple TCP streams, especially when bursty traffic is present. While the network is stable, the
queue is constantly full, and there are no problems except that the full queue results in high latency. However, the introduction of a sudden burst of traffic
may cause large numbers of established, steady streams to lose packets simultaneously.
Reference: http://en.wikipedia.org/wiki/TCP_global_synchronization
QUESTION 4
Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three.)
A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput
Explanation/Reference:
Explanation:
It is a general best practice not to mix TCP-based traffic with UDP-based traffic (especially streaming video) within a single service provider class due to the
behaviors of these protocols during periods of congestion. Specifically, TCP transmitters will throttle-back flows when drops have been detected. Although
some UDP applications have application-level windowing, flow control, and retransmission capabilities, most UDP transmitters are completely oblivious to
drops and thus never lower transmission rates due to dropping. When TCP flows are combined with UDP flows in a single service provider class and the
class experiences congestion, then TCP flows will continually lower their rates, potentially giving up their bandwidth to drop-oblivious UDP flows. This effect is
called TCP-starvation/UDP-dominance. This can increase latency and lower the overall throughput.
TCP-starvation/UDP-dominance likely occurs if (TCP-based) mission-critical data is assigned to the same service provider class as (UDP-based) streaming
video and the class experiences sustained congestion. Even if WRED is enabled on the service provider class, the same behavior would be observed, as
WRED (for the most part) only affects TCP-based flows.
Granted, it is not always possible to separate TCP-based flows from UDP-based flows, but it is beneficial to be aware of this behavior when making such
application-mixing decisions.
Reference: http://www.cisco.com/warp/public/cc/so/neso/vpn/vpnsp/spqsd_wp.htm
QUESTION 5
Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process?
A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Dual stack means that devices are able to run IPv4 and IPv6 in parallel. It allows hosts to simultaneously reach IPv4 and IPv6 content, so it offers a very
flexible coexistence strategy. For sessions that support IPv6, IPv6 is used on a dual stack endpoint. If both endpoints support Ipv4 only, then IPv4 is used.
Benefits:
Native dual stack does not require any tunneling mechanisms on internal networks
Both IPv4 and IPv6 run independent of each other
Dual stack supports gradual migration of endpoints, networks, and applications.
Reference: http://www.cisco.com/web/strategy/docs/gov/IPV6at_a_glance_c45-625859.pdf
QUESTION 6
Which statement about the use of tunneling to migrate to IPv6 is true?
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Using the tunneling option, organizations build an overlay network that tunnels one protocol over the other by encapsulating IPv6 packets within IPv4 packets
and IPv4 packets within IPv6 packets. The advantage of this approach is that the new protocol can work without disturbing the old protocol, thus providing
connectivity between users of the new protocol.
Tunneling has two disadvantages, as discussed in RFC 6144:
Users of the new architecture cannot use the services of the underlying infrastructure.
Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts, which negates
interoperability.
Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/white_paper_c11-676278.html
QUESTION 7
A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.)
A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
To clear one or more entries in the IP routing table, use the following commands in any mode:
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/unicast/5_0_3_N1_1/Cisco_n5k_layer3_ucast_cfg_rel_503_N1_1/
l3_manage-routes.html
QUESTION 8
Which switching method is used when entries are present in the output of the command show ip cache?
A. fast switching
B. process switching
C. Cisco Express Forwarding switching
D. cut-through packet switching
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Fast switching allows higher throughput by switching a packet using a cache created by the initial packet sent to a particular destination. Destination
addresses are stored in the high-speed cache to expedite forwarding. Routers offer better packet-transfer performance when fast switching is enabled. Fast
switching is enabled by default on all interfaces that support fast switching.
To display the routing table cache used to fast switch IP traffic, use the “show ip cache” EXEC command.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/switch/command/reference/fswtch_r/xrfscmd5.html#wp1038133
QUESTION 9
Which two actions must you perform to enable and use window scaling on a router? (Choose two.)
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
The TCP Window Scaling feature adds support for the Window Scaling option in RFC 1323, TCP Extensions for High Performance. A larger window size is
recommended to improve TCP performance in network paths with large bandwidth-delay product characteristics that are called Long Fat Networks (LFNs).
The TCP Window Scaling enhancement provides that support.
The window scaling extension in Cisco IOS software expands the definition of the TCP window to 32 bits and then uses a scale factor to carry this 32-bit
value in the 16-bit window field of the TCP header. The window size can increase to a scale factor of 14. Typical applications use a scale factor of 3 when
deployed in LFNs.
The TCP Window Scaling feature complies with RFC 1323. The larger scalable window size will allow TCP to perform better over LFNs. Use the ip tcp
window-size command in global configuration mode to configure the TCP window size. In order for this to work, the remote host must also support this
feature and its window size must be increased.
QUESTION 10
Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three.)
A. header compression
B. explicit congestion notification
C. keepalive
D. time stamps
E. TCP path discovery
F. MTU window
Explanation/Reference:
Explanation:
TCP Selective Acknowledgment
The TCP Selective Acknowledgment feature improves performance if multiple packets are lost from one TCP window of data.
Prior to this feature, because of limited information available from cumulative acknowledgments, a TCP sender could learn about only one lost packet per-
round-trip time. An aggressive sender could choose to resend packets early, but such re-sent segments might have already been successfully received.
The TCP selective acknowledgment mechanism helps improve performance. The receiving TCP host returns selective acknowledgment packets to the
sender, informing the sender of data that has been received. In other words, the receiver can acknowledge packets received out of order. The sender can
then resend only missing data segments (instead of everything since the first missing packet).
Prior to selective acknowledgment, if TCP lost packets 4 and 7 out of an 8-packet window, TCP would receive acknowledgment of only packets 1, 2, and 3.
Packets 4 through 8 would need to be re-sent. With selective acknowledgment, TCP receives acknowledgment of packets 1, 2, 3, 5, 6, and 8. Only packets 4
and 7 must be re-sent.
TCP selective acknowledgment is used only when multiple packets are dropped within one TCP window. There is no performance impact when the feature is
enabled but not used. Use the ip tcp selective-ack command in global configuration mode to enable TCP selective acknowledgment.
Refer to RFC 2018 for more details about TCP selective acknowledgment.
TCP Time Stamp
The TCP time-stamp option provides improved TCP round-trip time measurements. Because the time stamps are always sent and echoed in both directions
and the time-stamp value in the header is always changing, TCP header compression will not compress the outgoing packet. To allow TCP header
compression over a serial link, the TCP time-stamp option is disabled. Use the ip tcp timestamp command to enable the TCP time-stamp option.
TCP Explicit Congestion Notification
The TCP Explicit Congestion Notification (ECN) feature allows an intermediate router to notify end hosts of impending network congestion. It also provides
enhanced support for TCP sessions associated with applications, such as Telnet, web browsing, and transfer of audio and video data that are sensitive to
delay or packet loss. The benefit of this feature is the reduction of delay and packet loss in data transmissions. Use the ip tcp ecn command in global
configuration mode to enable TCP ECN.
TCP Keepalive Timer
The TCP Keepalive Timer feature provides a mechanism to identify dead connections.
When a TCP connection on a routing device is idle for too long, the device sends a TCP keepalive packet to the peer with only the Acknowledgment (ACK)
flag turned on. If a response packet (a TCP ACK packet) is not received after the device sends a specific number of probes, the connection is considered
dead and the device initiating the probes frees resources used by the TCP connection.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/configuration/xe-3s/asr1000/iap-xe-3s-asr1000-book/iap-tcp.html#GUID-22A82C5F-631F-
4390-9838-F2E48FFEEA01
QUESTION 11
A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the
opposite direction. Which UDP characteristic does this scenario describe?
A. latency
B. starvation
C. connectionless communication
D. nonsequencing unordered packets
E. jitter
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Cisco IOS IP SLAs provides a proactive notification feature with an SNMP trap. Each measurement operation can monitor against a pre-set performance
threshold. Cisco IOS IP SLAs generates an SNMP trap to alert management applications if this threshold is crossed. Several SNMP traps are available:
round trip time, average jitter, one-way latency, jitter, packet loss, MOS, and connectivity tests.
Here is a partial sample output from the IP SLA statistics that can be seen:
router#show ip sla statistics 1
Round Trip Time (RTT) for Index 55
Latest RTT: 1 ms
Latest operation start time: *23:43:31.845 UTC Thu Feb 3 2005
Latest operation return code: OK
RTT Values:
Number Of RTT: 10 RTT Min/Avg/Max: 1/1/1 milliseconds
Latency one-way time:
Number of Latency one-way Samples: 0
Source to Destination Latency one way Min/Avg/Max: 0/0/0 milliseconds
Destination to Source Latency one way Min/Avg/Max: 0/0/0 milliseconds
Reference: http://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_paper09186a00802d5efe.html
QUESTION 12
Under which condition does UDP dominance occur?
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Mixing TCP with UDP
It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially Streaming-Video) within a single service-provider class because
of the behaviors of these protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when drops are detected. Although some
UDP applications have application-level windowing, flow control, and retransmission capabilities, most UDP transmitters are completely oblivious to drops
and, thus, never lower transmission rates because of dropping.
When TCP flows are combined with UDP flows within a single service-provider class and the class experiences congestion, TCP flows continually lower their
transmission rates, potentially giving up their bandwidth to UDP flows that are oblivious to drops. This effect is called TCP starvation/UDP dominance.
TCP starvation/UDP dominance likely occurs if (TCP-based) Mission-Critical Data is assigned to the same service-provider class as (UDP-based)
Streaming-Video and the class experiences sustained congestion. Even if WRED is enabled on the service-provider class, the same behavior would be
observed because WRED (for the most part) manages congestion only on TCP-based flows.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/QoS-SRND-Book/VPNQoS.html
QUESTION 13
Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed?
Correct Answer: B
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Enabling PPPoE in a VPDN Group
Perform this task to enable PPPoE in a virtual private dial-up network (VPDN) group.
Restrictions
This task applies only to releases prior to Cisco IOS Release 12.2(13)T.
SUMMARY STEPS
1. enable
2. configure terminal
3. vpdn enable
4. vpdn-group name
5. request-dialin
6. protocol pppoe
DETAILED STEPS
Reference: http://www.cisco.com/en/US/docs/ios/12_2t/12_2t2/feature/guide/ftpppoec_support_TSD_Island_of_Content_Chapter.html
QUESTION 14
A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology,
in combination with PPPoE, can be used for authentication in this manner?
A. PAP
B. dot1x
C. Ipsec
D. CHAP
E. ESP
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
With PPPoE, the two authentication options are PAP and CHAP. When CHAP is enabled on an interface and a remote device attempts to connect to it, the
access server sends a CHAP packet to the remote device. The CHAP packet requests or “challenges” the remote device to respond. The challenge packet
consists of an ID, a random number, and the host name of the local router.
When the remote device receives the challenge packet, it concatenates the ID, the remote device’s password, and the random number, and then encrypts all
of it using the remote device’s password. The remote device sends the results back to the access server, along with the name associated with the password
used in the encryption process.
When the access server receives the response, it uses the name it received to retrieve a password stored in its user database. The retrieved password
should be the same password the remote device used in its encryption process. The access server then encrypts the concatenated information with the
newly retrieved password — if the result matches the result sent in the response packet, authentication succeeds.
The benefit of using CHAP authentication is that the remote device’s password is never transmitted in clear text (encrypted). This prevents other
devices from stealing it and gaining illegal access to the ISP’s network.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html
QUESTION 15
A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists. Which feature can be used to
accomplish this task?
A. TCP Adjust
B. Dialer Persistent
C. PPPoE Groups
D. half-bridging
E. Peer Neighbor Route
Correct Answer: B
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
A new interface configuration command, dialer persistent, allows a dial-on-demand routing (DDR) dialer profile connection to be brought up without being
triggered by interesting traffic. When configured, the dialer persistent command starts a timer when the dialer interface starts up and starts the connection
when the timer expires. If interesting traffic arrives before the timer expires, the connection is still brought up and set as persistent. The command provides a
default timer interval, or you can set a custom timer interval.
To configure a dialer interface as persistent, use the following commands beginning in global configuration mode:
QUESTION 16
Which PPP authentication method sends authentication information in clear text?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
PAP authentication involves a two-way handshake where the username and password are sent across the link in clear text; hence, PAP authentication does
not provide any protection against playback and line sniffing.
CHAP authentication, on the other hand, periodically verifies the identity of the remote node using a three-way handshake. After the PPP link is established,
the host sends a "challenge" message to the remote node. The remote node responds with a value calc“lated usi”g a one-way hash function. The host
checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise, the
connection is terminated.
Reference: http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10241-ppp-callin-hostname.html
QUESTION 17
Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific connection?
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection, given its known DLCI.
Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server; the table is then used to supply the
next-hop protocol address or the DLCI for outgoing traffic.
QUESTION 18
Which statement is true about the PPP Session Phase of PPPoE?
A. PPP options are negotiated and authentication is not performed. Once the link setup is completed, PPPoE functions as a Layer 3 encapsulation method
that allows data to be transferred over the PPP link within PPPoE headers.
B. PPP options are not negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 4 encapsulation method
that allows data to be transferred over the PPP link within PPPoE headers.
C. PPP options are automatically enabled and authorization is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation
method that allows data to be encrypted over the PPP link within PPPoE headers.
D. PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method that
allows data to be transferred over the PPP link within PPPoE headers.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
PPPoE is composed of two main phases:
Active Discovery Phase — In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is
assigned and the PPPoE layer is established.
PPP Session Phase — In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE
functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.
Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-cli/vpn-pppoe.html
QUESTION 19
PPPoE is composed of which two phases?
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
PPPoE is composed of two main phases:
Active Discovery Phase — In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is
assigned and the PPPoE layer is established.
PPP Session Phase — In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as
a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.
Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-cli/vpn-pppoe.html
QUESTION 20
Refer to the exhibit.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
You can filter what individual routes are sent (out) or received (in) to any interface within your EIGRP configuration.
One example is noted above. If you filter outbound, the next neighbor(s) will not know about anything except the 172.16.0.0/16 route and therefore won’t
send it to anyone else downstream. If you filter inbound, YOU won’t know about the route and therefore won’t send it to anyone else downstream.
QUESTION 21
A router with an interface that is configured with ipv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a
global unicast address when a router is present?
A. DHCPv6 request
B. router-advertisement
C. neighbor-solicitation
D. redirect
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Autoconfiguration is performed on multicast-enabled links only and begins when a multicast-enabled interface is enabled (during system startup or manually).
Nodes (both, hosts and routers) begin the process by generating a link-local address for the interface. It is formed by appending the interface identifier to
well-known link-local prefix FE80::0. The interface identifier replaces the right-most zeroes of the link-local prefix.
Before the link-local address can be assigned to the interface, the node performs the Duplicate Address Detection mechanism to see if any other node is
using the same link-local address on the link. It does this by sending a Neighbor Solicitation message with target address as the "tentative" address and
destination address as the solicited-node multicast address corresponding to this tentative address. If a node responds with a Neighbor Advertisement
message with tentative address as the target address, the address is a duplicate address and must not be used. Hence, manual configuration is required.
Once the node verifies that its tentative address is unique on the link, it assigns that link-local address to the interface. At this stage, it has IP-connectivity to
other neighbors on this link.
The autoconfiguration on the routers stop at this stage, further tasks are performed only by the hosts. The routers will need manual configuration (or stateful
configuration) to receive site-local or global addresses.
The next phase involves obtaining Router Advertisements from routers if any routers are present on the link. If no routers are present, a stateful configuration
is required. If routers are present, the Router Advertisements notify what sort of configurations the hosts need to do and the hosts receive a global unicast
IPv6 address.
Reference: https://sites.google.com/site/amitsciscozone/home/important-tips/ipv6/ipv6-stateless-autoconfiguration
QUESTION 22
An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface
parameters:
A. 2001:DB8:0:1:01:42AF:FE0F:4
B. 2001:DB8:0:1:FFFF:2201:420F:4
C. 2001:DB8:0:1:FE80:2201:420F:4
D. 2001:DB8:0:1:C601:42AE:800F:4
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Extended Unique Identifier (EUI), as per RFC2373, allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identifier (EUI-64). This feature is a
key benefit over IPv4 as it eliminates the need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained through
the 48-bit MAC address. The Mac address is first separated into two 24-bits, with one being OUI (Organizationally Unique Identifier) and the other being NIC
specific. The 16-bit 0xFFFE is then inserted between these two 24-bits to for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which can
only appear in EUI-64 generated from the EUI-48 MAC address.
Here is an example showing how the Mac Address is used to generate EUI.
Next, the seventh bit from the left, or the universal/local (U/L) bit, needs to be inverted. This bit identifies whether this interface identifier is universally or
locally administered. If 0, the address is locally administered and if 1, the address is globally unique. It is worth noticing that in the OUI portion, the globally
unique addresses assigned by the IEEE has always been set to 0 whereas the locally created addresses has 1 configured. Therefore, when the bit is
inverted, it maintains its original scope (global unique address is still global unique and vice versa). The reason for inverting can be found in RFC4291 section
2.5.1.
Reference: https://supportforums.cisco.com/document/100566/understanding-ipv6-eui-64-bit-address
QUESTION 23
For security purposes, an Ipv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter,
OSPFv3 neighbor adjacencies were lost. What caused this issue?
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
OSPFv3 uses link-local Ipv6 addresses for neighbor discovery and other features, so if any Ipv6 traffic filters are implemented be sure to include the link local
address so that it is permitted in the filter list.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html
QUESTION 24
What is the purpose of the autonomous-system {autonomous-system-number} command?
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To configure the autonomous-system number for an Enhanced Interior Gateway Routing Protocol (EIGRP) routing process to run within a VPN routing and
forwarding (VRF) instance, use the autonomous-system command in address-family configuration mode. To remove the autonomous-system for an EIGRP
routing process from within a VPN VRF instance, use the no form of this command.
Autonomous-system autonomous-system-number
no autonomous-system autonomous-system-number
Reference: http://www.cisco.com/c/en/us/td/docs/ios/iproute_eigrp/command/reference/ire_book/ire_a1.html#wp1062796
QUESTION 25
What is the default OSPF hello interval on a Frame Relay point-to-point network?
A. 10
B. 20
C. 30
D. 40
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Before you troubleshoot any OSPF neighbor-related issues on an NBMA network, it is important to remember that an NBMA network can be configured in
these modes of operation with the ip ospf network command:
Point-to-Point
Point-to-Multipoint
Broadcast
NBMA
The Hello and Dead Intervals of each mode are described in this table:
Reference: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13693-22.html
QUESTION 26
Refer to the exhibit.
Which command only announces the 1.2.3.0/24 network out of FastEthernet 0/0?
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Access list 2 is more specific, allowing only 1.2.3.0/24, whereas access list 1 permits all 1.0.0.0/8 networks. This question also asks us to apply this distribute
list only to the outbound direction of the fast Ethernet 0/0 interface, so the correct command is “distribute list 2 out FastEthernet0/0.”
QUESTION 27
Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?
A. 10.9.1.0/24
B. 10.8.0.0/24
C. 10.8.0.0/16
D. 10.8.0.0/23
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
With prefix lists, the ge 24 term means greater than or equal to a /24 and the le 24 means less than or equal to /24, so only a /24 is both greater than or equal
to 24 and less than or equal to 24. This translates to any prefix in the 10.8.x.0/24 network, where X is any value in the 0-255 range. Only the choice of
10.8.0.0.24 matches this.
QUESTION 28
Router A and Router B are configured with IPv6 addressing and basic routing capabilities using oSPFv3. The networks that are advertised from Router A do
not show up in Router B's routing table. After debugging IPv6 packets, the message "not a router" is found in the output. Why is the routing information not
being learned by Router B?
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/command/reference/ipv6_book/ipv6_16.html
QUESTION 29
After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of "fFFE"
inserted into the address. Based on this information, what do you conclude about these IPv6 addresses?
A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Extended Unique Identifier (EUI), as per RFC2373, allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identify them EUI-64). This feature is a
key benefit over IPv4 as it eliminates the need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained through
the 48-bit MAC address. The Mac address is first separated into two 24-bits, with one being OUI (Organizationally Unique Identifier) and the other being NIC
specific. The 16-bit 0xFFFE is then inserted between these two 24-bits to for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which
can only appear in EUI-64 generated from the EUI-48 MAC address.
Here is an example showing how the Mac Address is used to generate EUI.
Next, the seventh bit from the left, or the universal/local (U/L) bit, needs to be inverted. This bit identifies whether this interface identifier is universally or
locally administered. If 0, the address is locally administered and if 1, the address is globally unique. It is worth noticing that in the OUI portion, the globally
unique addresses assigned by the IEEE have always been set to 0 whereas the locally created addresses have 1 configured. Therefore, when the bit is
inverted, it maintains its original scope (global unique address is still global unique and vice versa). The reason for inverting can be found in RFC4291 section
2.5.1.
Once the above is done, we have a fully functional EUI-64 format address.
Reference: https://supportforums.cisco.com/document/100566/understanding-ipv6-eui-64-bit-address
QUESTION 30
A packet capture log indicates that several router solicitation messages were sent from a local host on the Ipv6 segment. What is the expected
acknowledgment and its usage?
A. Router acknowledgment messages will be forwarded upstream, where the DHCP server will allocate addresses to the local host.
B. Routers on the Ipv6 segment will respond with an advertisement that provides an external path from the local subnet, as well as certain data, such as
prefix discovery.
C. Duplicate Address Detection will determine if any other local host is using the same Ipv6 address for communication with the Ipv6 routers on the
segment.
D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature, which is statically defined by the network administrator.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Router Advertisements (RA) are sent in response to router solicitation messages. Router solicitation messages, which have a value of 133in the Type field of
the ICMP packet header, are sent by hosts at system startup so that the host can immediately autoconfigure without needing to wait for the next scheduled
RA message. Given that router solicitation messages are usually sent by hosts at system startup (the host does not have a configured unicast address), the
source address in router solicitation messages is usually the unspecified Ipv6 address (0:0:0:0:0:0:0:0). If the host has a configured unicast address, the
unicast address of the interface sending the router solicitation message is used as the source address in the message. The destination address in router
solicitation messages is the all-routers multicast address with a scope of the link. When an RA is sent in response to a router solicitation, the destination
address in the RA message is the unicast address of the source of the router solicitation message.
RA messages typically include the following information:
• One or more on link Ipv6 prefixes that nodes on the local link can use to automatically configure their Ipv6 addresses
• Lifetime information for each prefix included in the advertisement
• Sets of flags that indicate the type of autoconfiguration (stateless or stateful) that can be completed
• Default router information (whether the router sending the advertisement should be used as a default router and, if so, the amount of time (in seconds) the
router should be used as a default router)
• Additional information for hosts, such as the hop limit and MTU a host should use in packets that it originates
QUESTION 31
SIMULATION
Route.com is a small IT corporation that is attempting to implement the network shown in the
exhibit. Currently the implementation is partially completed. OSPF has been configured on routers
Chicago and NewYork. The SO/O interface on Chicago and the SO/1 interface on NewYork are in
Area 0. The loopbackO interface on NewYork is in Area 1. However, they cannot ping from the
serial interface of the Seattle router to the loopback interface of the NewYork router. You have
been asked to complete the implementation to allow this ping.
ROUTE.com’s corporate implementation guidelines require:
• The OSPF process ID for all routers must be 10.
• The routing protocol for each interface must be enabled under the routing process.
• The routing protocol must be enabled for each interface using the most specific wildcard mask
possible.
• The serial link between Seattle and Chicago must be in OSPF area 21.
• OSPF area 21 must not receive any inter-area or external routes.
Network Information
Seattle
S0/0 192.168.16.5/30 — Link between Seattle and Chicago
Secret Password: cisco
Chicago
S0/0 192.168.54.9/30 — Link between Chicago and New York
S0/1 192.168.16.6/30 — Link between Seattle and Chicago
Secret Password: cisco
New York
S0/1 192.168.54.10/30 — Link between Chicago and New York
Loopback0 172.16.189.189
Secret Password: cisco
Correct Answer: See explanation below
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Note: In actual exam, the IP addressing, OSPF areas and process ID, and router hostnames may change, but the overall solution is the same.
Seattle’s S0/0 IP Address is 192.168.16.5/30. So, we need to find the network address and wildcard mask of 192.168.16.5/30 in order to configure the OSPF.
Here subtract 252 from 2565, 256-252 = 4, hence the subnets will increment by 4.
Now we configure OSPF using process ID 10 (note the process ID may change to something else in real exam).
Seattle>enable
Password:
Seattle#conf t
Seattle(config)#router ospf 10
One of the tasks states that area 21 should not receive any external or inter-area routes (except the default route).
Seattle(config-router)#area 21 stub
Seattle(config-router)#end
Seattle#copy run start
Chicago Configuration:
Chicago>enable
Password: cisco
Chicago#conf t
Chicago(config)#router ospf10
Again, area 21 should not receive any external or inter-area routes (except the default route).
In order to accomplish this, we must stop LSA Type 5 if we don’t want to send external routes. And if we don’t want to send inter-area routes, we have to stop
LSA Type 3 and Type 4. There fore we want to configure area 21 as a totally stubby area.
Chicago(config-router)#end
Chicago#copy run start
The other interface on the Chicago router is already configured correctly in this scenario, as well as the New York router so there is nothing that needs to be
done on that router.
QUESTION 32
SIMULATION
JS Industries has expanded their business with the addition of their first remote office. The remote office router (R3) was previously configured and all
corporate subnets were reachable from R3. JS Industries is interested in using route summarization along with the EIGRP Stub Routing feature to increase
network stability while reducing the memory usage and bandwidth utilization to R3. Another network professional was tasked with implementing this solution.
However, in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been lost.
Currently EIGRP is configured on all routers R2, R3, and R4 in the network. Your task is to identify and resolve the cause of connectivity failure with the
remote office router R3. Once the issue has been resolved you should complete the task by configuring route summarization only to the remote office router
R3.
You have corrected the fault when pings from R2 to the R3 LAN interface are successful, and the R3 IP routing table only contains 2 10.0.0.0 subnets.
Correct Answer: See explanation below
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
First we have to figure out why R3 and R4 can not communicate with each other. Use the show running-config command on router R3.
Notice that R3 is configured as a stub receive-only router. The receive-only keyword will restrict the router from sharing any of its routes with any other router
in that EIGRP autonomous system. This keyword will also prevent any type of route from being sent. Therefore we will remove this command and replace it
with the eigrp stub command:
R3# configure terminal R3(config)# router eigrp 123 R3(config-router)# no eigrp stub receive-only R3(config-router)# eigrp stub
R3(config-router)# end
Now R3 will send updates containing its connected and summary routes to other routers. Notice that the eigrp stub command equals to the eigrp stub
connected summary because the connected and summary options are enabled by default.
Next we will configure router R3 so that it has only 2 subnets of 10.0.0.0 network. Use the show ip route command on R3 to view its routing table:
Because we want the routing table of R3 only have 2 subnets so we have to summary sub-networks at the interface which is connected with R3, the s0/0
interface of R4.
There is one interesting thing about the output of the show ip route shown above: the 10.2.3.0/24, which is a directly connected network of R3. We can’t get
rid of it in the routing table no matter what technique we use to summary the networks. Therefore, to make the routing table of R3 has only 2 subnets we
have to summary other subnets into one subnet.
In the output if we don’t see the summary line (like 10.0.0.0/8 is a summary…) then we should use the command ip summary-address eigrp 123 10.2.0.0
255.255.0.0 so that all the ping can work well.
In conclusion, we will use the ip summary-address eigrp 123 10.2.0.0 255.255.0.0 at the interface s0/0 of R4 to summary.
Now we jump back to R3 and use the show ip route command to verify the effect, the output is shown below:
Note: Please notice that the IP addresses and the subnet masks in your real exam might be different so you might use different ones to solve this question.
Just for your information, notice that if you use another network than 10.0.0.0/8 to summary, for example, if you use the command ip summary-address eigrp
123 10.2.0.0 255.255.0.0 you will leave a /16 network in the output of the show ip route command.
But in your real exam, if you don’t see the line “10.0.0.0/8 is a summary, Null0” then you can summarize using the network 10.2.0.0/16. This summarization is
better because all the pings can work well.
Finally don’t forget to use the copy run start command on routers R3 and R4 to save the configurations.
R3(config-if)# end
R3# copy run start
R4(config-if)# end
R4# copy run start
If the “copy run start” command doesn’t work then use “write memory.”
QUESTION 33
SIMULATION
ROUTE.com is a small IT corporation that has an existing enterprise network that is running Ipv6 0SPFv3. Currently OSPF is configured on all routers.
However, R4’s loopback address (FEC0:4:4) cannot be seen in R1’s Ipv6 routing table. You are tasked with identifying the cause of this fault and
implementing the needed corrective actions that uses OPSF features and does not change the current area assignments. You will know that you have
corrected the fault when R4’s loopback address (FEC0:4:4) can be seen in RTs Ipv6 routing table.
Special Note: To gain the maximum number of points you must remove all incorrect or unneeded configuration statements related to this issue.
Correct Answer: See explanation below
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To troubleshoot the problem, first issue the show running-config on all of 4 routers. Pay more attention to the outputs of routers R2 and R3 The output of the
“show running-config” command of R2:
QUESTION 34
SIMULATION
You are a network engineer with ROUTE.com, a small IT company. ROUTE.com has two connections to the Internet; one via a frame relay link and one via
an EoMPLS link. IT policy requires that all outbound HTTP traffic use the frame relay link when it is available. All other traffic may use either link. No static or
default routing is allowed.
Choose and configure the appropriate path selection feature to accomplish this task. You may use the Test Workstation to generate HTTP traffic to validate
your solution.
Correct Answer: See explanation below
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
First you need to configure access list to HTTP traffic and then configure that access list. After that configure the route map and then apply it on the interface
to the server in EIGRP network.
QUESTION 35
SIMULATION
You are a network engineer with ROUTE.com, a small IT company. They have recently merged two organizations and now need to merge their networks as
shown in the topology exhibit. One network is using OSPF as its IGP and the other is using EIGRP as its IGP. R4 has been added to the existing OSPF
network to provide the interconnect between the OSPF and EIGRP networks. Two links have been added that will provide redundancy.
The network requirements state that you must be able to ping and telnet from loopback 101 on R1 to the OPSF domain test address of 172.16.1.100. All
traffic must use the shortest path that provides the greatest bandwidth. The redundant paths from the OSPF network to the EIGRP network must be available
in case of a link failure. No static or default routing is allowed in either network.
A previous network engineer has started the merger implementation and has successfully assigned and verified all IP addressing and basic IGP routing. You
have been tasked with completing the implementation and ensuring that the network requirements are met. You may not remove or change any of the
configuration commands currently on any of the routers. You may add new commands or change default values.
Correct Answer: Please see explanation
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
First we need to find out 5 parameters (Bandwidth, Delay, Reliability, Load, MTU) of the s0/0/0 interface (the interface of R2 connected to R4) for
redistribution:
R2#show interface s0/0/0
Write down these 5 parameters, notice that we have to divide the Delay by 10 because the metric unit is in tens of microsecond. For example, we get
Bandwidth=1544 Kbit, Delay=20000 us, Reliability=255, Load=1, MTU=1500 bytes then we would redistribute as follows:
R2#config terminal
R2(config)# router ospf 1
R2(config-router)# redistribute eigrp 100 metric-type 1 subnets
R2(config-router)#exit
R2(config-router)#router eigrp 100
R2(config-router)#redistribute ospf 1 metric 1544 2000 255 1 1500
Note: In fact, these parameters are just used for reference and we can use other parameters with no problem.
If the delay is 20000us then we need to divide it by 10, that is 20000 / 10 = 2000)
For R3 we use the show interface fa0/0 to get 5 parameters too
R3#show interface fa0/0
For example we get Bandwidth=10000 Kbit, Delay=1000 us, Reliability=255, Load=1, MTU=1500 bytes
R3#config terminal
R3(config)#router ospf 1
R3(config-router)#redistribute eigrp 100 metric-type 1 subnets
R3(config)#exit
R3(config-router)#router eigrp 100
R3(config-router)#redistribute ospf 1 metric 10000 100 255 1 1500
Finally you should try to “show ip route” to see the 172.16.100.1 network (the network behind R4) in the routing table of R1 and make a ping from R1 to this
network.
Note: If the link between R2 and R3 is FastEthernet link, we must put the command below under EIGRP process to make traffic from R1 to go through R3
(R1 -> R2 -> R3 -> R4), which is better than R1 -> R2 -> R4.
R2(config-router)# distance eigrp 90 105
This command sets the Administrative Distance of all EIGRP internal routes to 90 and all EIGRP external routes to 105, which is smaller than the
Administrative Distance of OSPF (110) -> the link between R2 & R3 will be preferred to the serial link between R2 & R4.
Note: The actual OPSF and EIGRP process numbers may change in the actual exam so be sure to use the actual correct values, but the overall solution is
the same.
QUESTION 36
Scenario
You have been asked to evaluate how EIGRP is functioning in a customer network. Access the device consoles to answer the questions.
Instructions
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on the individual device icons or use the tab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are five multiple-choice questions with this task. Be sure to answer all five questions before selecting the Next button.
What percent of R1’s interfaces bandwidth is EIGRP allowed to use?
A. 10
B. 20
C. 30
D. 40
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
QUESTION 37
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Instructions
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on the icon or the lab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
How old is the Type 4 LSA from Router 3 for area 1 on the router R5, based on the output you have examined?
A. 1858
B. 1601
C. 600
D. 1569
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Part of the “show ip ospf topology” command on R5 shows this:
The Link ID of R3 (3.3.3.3) shows the age is 1858.
QUESTION 38
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Instructions
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on the icon or the lab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
Which of the following statements is true about the serial links that terminate in R3?
A. The R1-R3 link needs the neighbor command for the adjacency to stay up
B. The R2-R3 link OSPF timer values are 30, 120, 120
C. The R1-R3 link OSPF timer values should be 10, 40, 40
D. R3 is responsible for flooding LSUs to all the routers on the network
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
We can see the configured timers using the following command:
QUESTION 39
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Instructions
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on the icon or the lab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
How many times was SPF algorithm executed on R4 for Area 1?
A. 1
B. 5
C. 9
D. 20
E. 54
F. 224
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
This can be found using the “show ip ospf” command on R4. Look for the Area 1 stats which shows this:
QUESTION 40
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Instructions
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on the icon or the lab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
Areas of Router 5 and 6 are not normal areas. Inspect their routing tables and determine which statement is true.
A. R5’s Loopback and R6’s Loopback are both present in R5’s Routing table
B. R5’s Loopback and R6’s Loopback are both present in R6’s Routing table
C. Only R5’s loopback is present in R5’s Routing table
D. Only R6’s loopback is present in R5’s Routing table
E. Only R5’s loopback is present in R6’s Routing table
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Here are the routing tables of R5 and R6:
Here we see R5’s loopbacks in the routing table shown as connected, and the 6.6.6.6 loopback IP address of R6 is also seen as an OSPF route in R5’s
routing table.
QUESTION 41
A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be
applied to the corporate router to allow communication to the remote sites?
A.
B.
C.
D.
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The configuration of mGRE allows a tunnel to have multiple destinations. The configuration of mGRE on one side of a tunnel does not have any relation to
the tunnel properties that might exist at the exit points. This means that an mGRE tunnel on the hub may connect to a p2p tunnel on the branch. Conversely,
a p2p GRE tunnel may connect to an mGRE tunnel. The distinguishing feature between an mGRE interface and a p2p GRE interface is the tunnel
destination. An mGRE interface does not have a configured destination. Instead the GRE tunnel is configured with the command tunnel mode gre
multipoint. This command is used instead of the tunnel destination x.x.x.x found with p2p GRE tunnels. Besides allowing for multiple destinations, an
mGRE tunnel requires NHRP to resolve the tunnel endpoints. Note, tunnel interfaces by default are point-to-point (p-p) using GRE encapsulation, effectively
they have the tunnel mode gre command, which is not seen in the configuration because it is the default.
The mGRE configuration is as follows:
!
interface Tunnel0
bandwidth 1536
ip address 10.62.1.10 255.255.255.0
tunnel source Serial0/0
tunnel mode gre multipoint
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMVPN_2_Phase2.html
QUESTION 42
A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three.)
Explanation/Reference:
Explanation:
show crypto ipsec sa
This command shows IPsec SAs built between peers. The encrypted tunnel is built between 12.1.1.1 and 12.1.1.2 for traffic that goes between networks
20.1.1.0 and 10.1.1.0. You can see the two Encapsulating Security Payload (ESP) SAs built inbound and outbound. Authentication Header (AH) is not used
since there are no AH SAs.
This output shows an example of the show crypto ipsec sa command (bolded ones found in answers for this question).
interface: FastEthernet0
Crypto map tag: test, local addr. 12.1.1.1
local ident (addr/mask/prot/port): (20.1.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.1.1.0/255.255.255.0/0/0)
current_peer: 12.1.1.2
PERMIT, flags={origin_is_acl,}
#pkts encaps: 7767918, #pkts encrypt: 7767918, #pkts digest 7767918
#pkts decaps: 7760382, #pkts decrypt: 7760382, #pkts verify 7760382
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0,
#pkts decompress failed: 0, #send errors 1, #Recv errors 0
local crypto endpt.: 12.1.1.1, remote crypto endpt.: 12.1.1.2
path mtu 1500, media mtu 1500
current outbound spi: 3D3
inbound esp sas:
spi: 0x136A010F(325714191)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 3442, flow_id: 1443, crypto map: test
sa timing: remaining key lifetime (k/sec): (4608000/52)
IV size: 8 bytes
replay detection support: Y
inbound ah sas:
inbound pcp sas:
inbound pcp sas:
outbound esp sas:
spi: 0x3D3(979)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 3443, flow_id: 1444, crypto map: test
sa timing: remaining key lifetime (k/sec): (4608000/52)
IV size: 8 bytes
replay detection support: Y
outbound ah sas:
outbound pcp sas:
Reference: http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html
QUESTION 43
Refer to the following output:
What does the authoritative flag mean in regards to the NHRP information?
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Show NHRP: Examples
The following is sample output from the show ip nhrp command:
Router# show ip nhrp
10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16
Type: dynamic Flags: authoritative
NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11
10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56
Type: static Flags: authoritative
NBMA address: 10.1.1.2
The fields in the sample display are as follows:
The IP address and its network mask in the IP-to-NBMA address cache. The mask is always 255.255.255.255 because Cisco does not support
aggregation of NBMA information through NHRP.
The interface type and number and how long ago it was created (hours:minutes:seconds).
The time in which the positive and negative authoritative NBMA address will expire (hours:minutes:seconds). This value is based on the ip nhrp holdtime
command.
Type of interface:
– dynamic — NBMA address was obtained from the NHRP Request packet.
– static — NBMA address was statically configured.
Flags:
– authoritative — Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping
for a particular destination.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nhrp/configuration/xe-16/nhrp-xe-16-book/config-nhrp.html
QUESTION 44
Which common issue causes intermittent DMVPN tunnel flaps?
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
DMVPN Tunnel Flaps Intermittently
Problem
DMVPN tunnel flaps intermittently.
Solution
When DMVPN tunnels flap, check the neighborship between the routers as issues with neighborship formation between routers may cause the DMVPN
tunnel to flap. In order to resolve this problem, make sure the neighborship between the routers is always up.
Reference: http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/29240-dcmvpn.html#Prblm1
QUESTION 45
Which encapsulation supports an interface that is configured for an EVN trunk?
A. 802.1Q
B. ISL
C. PPP
D. Frame Relay
E. MPLS
F. HDLC
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Restrictions for EVN
An EVN trunk is allowed on any interface that supports 802.1q encapsulation, such as Fast Ethernet, Gigabit Ethernet, and port channels.
A single IP infrastructure can be virtualized to provide up to 32 virtual networks end-to-end.
If an EVN trunk is configured on an interface, you cannot configure VRF-Lite on the same interface.
OSPFv3 is not supported; OSPFv2 is supported.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.pdf
QUESTION 46
Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Explanation/Reference:
Explanation:
A trunk interface can carry traffic for multiple EVNs. To simplify the configuration process, all the subinterfaces and associated EVNs have the same IP
address assigned. In other words, the trunk interface is identified by the same IP address in different EVN contexts. This is accomplished as a result of each
EVN having a unique routing and forwarding table, thereby enabling support for overlapping IP addresses across multiple EVNs.
Reference: http://www.cisco.com/en/US/docs/ios-xml/ios/evn/configuration/xe-3sg/evn-overview.pdf
QUESTION 47
A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address,
and follow the instructions. After doing this, the user is able to access company shares. Which type of remote access did the engineer enable?
A. EZVPN
B. Ipsec VPN client access
C. VPDN client access
D. SSL VPN client access
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The Cisco AnyConnect VPN Client provides secure SSL connections to the security appliance for remote users. Without a previously installed client, remote
users enter the IP address in their browser of an interface configured to accept SSL VPN connections. Unless the security appliance is configured to redirect
http:// requests to https://, users must enter the URL in the form https://<address>.
After entering the URL, the browser connects to that interface and displays the login screen. If the user satisfies the login and authentication, and the security
appliance identifies the user as requiring the client, it downloads the client that matches the operating system of the remote computer. After downloading, the
client installs and configures itself, establishes a secure SSL connection and either remains or uninstalls itself (depending on the security appliance
configuration) when the connection terminates.
Reference: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100936-asa8x-split-tunnel-anyconnect-
config.html
QUESTION 48
Which Cisco IOS VPN technology leverages Ipsec, mGRE, dynamic routing protocol, NHRP, and Cisco Express Forwarding?
A. FlexVPN
B. DMVPN
C. GETVPN
D. Cisco Easy VPN
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Dynamic Multipoint Virtual Private Network (DMVPN) is a dynamic tunneling form of a virtual private network (VPN) supported on Cisco IOS-based routers
and Unix-like Operating Systems based on the standard protocols, GRE, NHRP and Ipsec. This DMVPN provides the capability for creating a dynamic-mesh
VPN network without having to pre-configure (static) all possible tunnel end-point peers, including Ipsec (Internet Protocol Security) and ISAKMP (Internet
Security Association and Key Management Protocol) peers. DMVPN is initially configured to build out a hub-and-spoke network by statically configuring the
hubs (VPN headends) on the spokes, no change in the configuration on the hub is required to accept new spokes. Using this initial hub-and-spoke network,
tunnels between spokes can be dynamically built on demand (dynamic-mesh) without additional configuration on the hubs or spokes. This dynamic-mesh
capability alleviates the need for any load on the hub to route data between the spoke networks.
DMVPN is combination of the following technologies:
Multipoint GRE (mGRE)
Next-Hop Resolution Protocol (NHRP)
Dynamic Routing Protocol (EIGRP, RIP, OSPF, BGP)
Dynamic Ipsec encryption
Cisco Express Forwarding (CEF)
Reference: http://en.wikipedia.org/wiki/Dynamic_Multipoint_Virtual_Private_Network
QUESTION 49
Which traffic does the following configuration allow?
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Here we see that the Ipv6 access list called “cisco” is being applied to incoming VTY connections to the router. Ipv6 access list has just one entry, which
allows only the single Ipv6 IP address of 2001:DB8:0:4::32 to connect using SSH only.
QUESTION 50
For troubleshooting purposes, which method can you use in combination with the “debug ip packet” command to limit the amount of output data?
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
The “debug ip packet” command generates a substantial amount of output and uses a substantial amount of system resources. This command should be
used with caution in production networks. Always use with the access-list command to apply an extended ACL to the debug output.
Reference: http://www.cisco.com/c/en/us/support/docs/security/dynamic-multipoint-vpn-dmvpn/111976-dmvpn-troubleshoot-00.html
QUESTION 51
Refer to the following access list.
After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for
this?
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.
B. A packet that matches access-list with the "log" keyword is fast switched.
C. A packet that matches access-list with the "log" keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Logging-enabled access control lists (ACLs) provide insight into traffic as it traverses the network or is dropped by network devices. Unfortunately, ACL
logging can be CPU intensive and can negatively affect other functions of the network device. There are two primary factors that contribute to the CPU load
increase from ACL logging: process switching of packets that match log-enabled access control entries (ACEs) and the generation and transmission of log
messages.
Reference: http://www.cisco.com/web/about/security/intelligence/acl-logging.html#4
QUESTION 52
Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table?
A. source address
B. destination address
C. router interface
D. default gateway
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
The Unicast RPF feature helps to mitigate problems that are caused by the introduction of malformed or forged (spoofed) IP source addresses into a network
by discarding IP packets that lack a verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks, including
Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source IP addresses to allow attackers to thwart efforts to locate or
filter the attacks. For Internet service providers (ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have
source addresses that are valid and consistent with the IP routing table. This action protects the network of the ISP, its customer, and the rest of the Internet.
Reference: http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfrpf.html
QUESTION 53
What are the three modes of Unicast Reverse Path Forwarding?
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security
feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of
spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. Unicast RPF works in one of three different modes: strict
mode, loose mode, or VRF mode. Note that not all network devices support all three modes of operation. Unicast RPF in VRF mode will not be covered in
this document.
When administrators use Unicast RPF in strict mode, the packet must be received on the interface that the router would use to forward the return packet.
Unicast RPF configured in strict mode may drop legitimate traffic that is received on an interface that was not the router's choice for sending return traffic.
Dropping this legitimate traffic could occur when asymmetric routing paths are present in the network.
When administrators use Unicast RPF in loose mode, the source address must appear in the routing table. Administrators can change this behavior using
the allow-default option, which allows the use of the default route in the source verification process. Additionally, a packet that contains a source address for
which the return route points to the Null 0 interface will be dropped. An access list may also be specified that permits or denies certain source addresses in
Unicast RPF loose mode.
Care must be taken to ensure that the appropriate Unicast RPF mode (loose or strict) is configured during the deployment of this feature because it can drop
legitimate traffic. Although asymmetric traffic flows may be of concern when deploying this feature, Unicast RPF loose mode is a scalable option for networks
that contain asymmetric routing paths.
Reference: http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html
QUESTION 54
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion
attempts.
B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
D. It prevents private internal addresses to be accessed directly from outside.
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
The private IP address ranges defined in RFC 1918 are as follows:
10.0.0.0 — 10.255.255.255
172.16.0.0 — 172.31.255.255
192.168.0.0 — 192.168.255.255
These IP addresses should never be allowed from external networks into a corporate network as they would only be able to reach the network from the
outside via routing problems or if the IP addresses were spoofed. This ACL is used to prevent all packets with a spoofed reserved private source IP address
to enter the network. The log keyword also enables logging of this intrusion attempt.
QUESTION 55
Refer to the following command:
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
To set the secure HTTP (HTTPS) server port number for listening, use the ip http secure-port command in global configuration mode. To return the HTTPS
server port number to the default, use the no form of this command.
Ip http secure-port port-number
no ip http secure-port
Syntax Description
Reference: http://www.cisco.com/en/US/docs/ios-xml/ios/https/command/nm-https-cr-cl-sh.html#wp3612805529
QUESTION 56
A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to
the configuration to allow this?
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
To let a router forward broadcast packet the command ip helper-address can be used. The broadcasts will be forwarded to the unicast address which is
specified with the ip helper command.
When configuring the ip helper-address command, the following broadcast packets will be forwarded by the router by default:
TFTP — UDP port 69
Domain Name System (DNS) – UDP port 53
Time service — port 37
NetBIOS Name Server — port 137
NetBIOS Datagram Server — port 138
Bootstrap Protocol (BOOTP) — port 67
TACACS – UDP port 49
QUESTION 57
A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with
authentication or encryption. Which command satisfies the requirements of this scenario?
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Most network admins and engineers are familiar with SNMPv2c which has become the dominant SNMP version of the past decade. It’s simple to configure
on both the router/switch-side and just as easy on the network monitoring server. The problem of course is that the SNMP statistical payload is not encrypted
and authentication is passed in cleartext. Most companies have decided that the information being transmitted isn’t valuable enough to be worth the extra
effort in upgrading to SNMPv3, but I would suggest otherwise.
Like IPv4 to Ipv6, there are some major changes under the hood. SNMP version 2 uses community strings (think clear text passwords, no encryption) to
authenticate polling and trap delivery. SNMP version 3 moves away from the community string approach in favor of user-based authentication and view-
based access control. The users are not actual local user accounts, rather they are simply a means to determine who can authenticate to the device. The
view is used to define what the user account may access on the IOS device. Finally, each user is added to a group, which determines the access policy for its
users. Users, groups, views.
QUESTION 58
When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?
A. username
B. password
C. community-string
D. encryption-key
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The following security models exist: SNMPv1, SNMPv2, SNMPv3. The following security levels exits: “noAuthNoPriv” (no authentiation and no encryption –
noauth keyword in CLI), “AuthNoPriv109thernet109ationre authenticated but not encrypted – auth keyword in CLI), “AuthPriv” (messages are authenticated
and encrypted – priv keyword in CLI). SNMPv1 and SNMPv2 models only support the “noAuthNoPriv” model since they use plain community string to match
the incoming packets. The SNMPv3 implementations could be configured to use either of the models on per-group basis (in case if “noAuthNoPriv” is
configured, username serves as a replacement for community string).
Reference: http://blog.ine.com/2008/07/19/snmpv3-tutorial/
QUESTION 59
After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions
can you take to provide enhanced logging results? (Choose two.)
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The optional msec keyword specifies the date/time format should include milliseconds. This can aid in pinpointing the exact time of events, or to correlate the
order that the events happened. To limit syslog messages sent to the router’s history table and to an SNMP network management station based on severity,
use the logging history command in global configuration mode. By default, Cisco devices Log error messages of severity levels 0 through 4 (emergency,
alert, critical, error, and warning levels); in other words, “saving level warnings or higher.” By increasing the severity level, more granular monitoring can
occur, and SNMP messages will be sent by the less sever (5-7) messages.
QUESTION 60
A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection?
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
When a router crashes, it is sometimes useful to obtain a full copy of the memory image (called a core dump) to identify the cause of the crash. Core dumps
are generally very useful to your technical support representative.
Four basic ways exist for setting up the router to generate a core dump:
Using Trivial File Transfer Protocol (TFTP)
Using File Transfer Protocol (FTP)
Using remote copy protocol (rcp)
Using a Flash disk
Reference: http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr19aa.html
QUESTION 61
A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Assuming that an NTP server
is already set up, what is the result of the command?
A. It enables receiving NTP broadcasts on the interface where the command was executed.
B. It enables receiving NTP broadcasts on all interfaces globally.
C. It enables a device to be an NTP peer to another device.
D. It enables a device to receive NTP broadcast and unicast packets.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The NTP service can be activated by entering any ntp command. When you use the ntp broadcast client command, the NTP service is activated (if it has not
already been activated) and the device is configured to receive NTP broadcast packets on a specified interface simultaneously.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bsm/command/bsm-xe-3se-3850-cr-book/bsm-xe-3se-3850-cr-book_chapter_00.html
QUESTION 62
What is a function of NPTv6?
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
RFC 6296 describes a stateless Ipv6-to-Ipv6 Network Prefix Translation (NPTv6) function, designed to provide address independence to the edge network. It
is transport-agnostic with respect to transports that do not checksum the IP header, such as SCTP, and to transports that use the TCP/UDP/DCCP
(Datagram Congestion Control Protocol) pseudo-header and checksum
NPTv6 provides a simple and compelling solution to meet the address-independence requirement in Ipv6. The address-independence benefit stems directly
from the translation function of the network prefix translator. To avoid as many of the issues associated with NAPT44 as possible, NPTv6 is defined to
include a two-way, checksum-neutral, algorithmic translation function, and nothing else.
Reference: http://tools.ietf.org/html/rfc6296
QUESTION 63
Ipv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows Ipv6 devices to communicate with Ipv4 servers?
A. NAT
B. NATng
C. NAT64
D. dual-stack NAT
E. DNS64
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NAT64 is a mechanism to allow Ipv6 hosts to communicate with Ipv4 servers. The NAT64 server is the endpoint for at least one Ipv4 address and an Ipv6
network segment of 32-bits (for instance 64:ff9b::/96, see RFC 6052, RFC 6146). The Ipv6 client embeds the Ipv4 address it wishes to communicate with
using these bits, and sends its packets to the resulting address. The NAT64 server then creates a NAT-mapping between the Ipv6 and the Ipv4 address,
allowing them to communicate.
Reference: http://en.wikipedia.org/wiki/NAT64
QUESTION 64
A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does
the engineer see?
A. connectionless-oriented
B. service-oriented
C. connection-oriented
D. application-oriented
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Configuration Examples for IP SLAs TCP Connect Operations
The following example shows how to configure a TCP Connection-oriented operation from Device B to the Telnet port (TCP port 23) of IP Host 1 (IP address
10.0.0.1), as shown in the “TCP Connect Operation” figure in the “Information About the IP SLAs TCP Connect Operation” section. The operation is
scheduled to start immediately. In this example, the control protocol is disabled on the source (Device B). IP SLAs uses the control protocol to notify the IP
SLAs responder to enable the target port temporarily. This action allows the responder to reply to the TCP Connect operation. In this example, because the
target is not a Cisco device and a well-known TCP port is used, there is no need to send the control message.
Device A (target device) Configuration
configure terminal
ip sla responder tcp-connect ipaddress 10.0.0.1 port 23
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_tcp_conn.html
QUESTION 65
A network engineer executes the “ipv6 flowset” command. What is the result?
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Enabling Flow-Label Marking in Packets that Originate from the Device
This feature allows the device to track destinations to which the device has sent packets that are 1280 bytes or larger.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 flowset
4. exit
5. clear ipv6 mtu
DETAILED STEPS
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/15-mt/ip6b-15-mt-book/ip6-mtu-path-disc.html
QUESTION 66
A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and export packets are not
being sent?
A. output drops
B. enqueuing for the RP
C. fragmentation failures
D. adjacency issues
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
References:
http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/oaggnf.html
QUESTION 67
A network engineer is asked to configure a “site-to-site” Ipsec VPN tunnel. One of the last things that the engineer does is to configure an access list
(access-list 1 permit any) along with the command ip nat inside source list 1 int s0/0 overload. Which functions do the two commands serve in this scenario?
A. The command access-list 1 defines interesting traffic that is allowed through the tunnel.
B. The command ip nat inside source list 1 int s0/0 overload disables “many-to-one” access for all devices on a defined segment to share a single IP
address upon exiting the external interface.
C. The command access-list 1 permit any defines only one machine that is allowed through the tunnel.
D. The command ip nat inside source list 1 int s0/0 overload provides “many-to-one” access for all devices on a defined segment to share a single IP
address upon exiting the external interface.
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Configuring NAT to Allow Internal Users to Access the Internet Using Overloading
Note in the previous second configuration, the NAT pool “ovrld”only has a range of one address. The keyword overload used in the ip nat inside source list
7 pool ovrld overload command allows NAT to translate multiple inside devices to the single address in the pool.
Reference: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094e77.shtml
QUESTION 68
A network engineer is configuring a solution to allow failover of HSRP nodes during maintenance windows, as an alternative to powering down the active
router and letting the network respond accordingly. Which action will allow for manual switching of HSRP nodes?
A. Track the up/down state of a loopback interface and shut down this interface during maintenance.
B. Adjust the HSRP priority without the use of preemption.
C. Disable and enable all active interfaces on the active HSRP node.
D. Enable HSRPv2 under global configuration, which allows for maintenance mode.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The standby track command allows you to specify another interface on the router for the HSRP process to monitor in order to alter the HSRP priority for a
given group. If the line protocol of the specified interface goes down, the HSRP priority is reduced. This means that another HSRP router with higher priority
can become the active router if that router has standby preempt enabled. Loopback interfaces can be tracked, so when this interface is shut down the
HSRP priority for that router will be lowered and the other HSRP router will then become the active one.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/hot-standby-router-protocol-hsrp/13780-6.html
QUESTION 69
A network engineer is notified that several employees are experiencing network performance related issues, and bandwidth-intensive applications are
identified as the root cause. In order to identify which specific type of traffic is causing this slowness, information such as the source/destination IP and Layer
4 port numbers is required. Which feature should the engineer use to gather the required information?
A. SNMP
B. Cisco IOS EEM
C. NetFlow
D. Syslog
E. WCCP
Correct Answer: C
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NetFlow Flows Key Fields
A network flow is identified as a unidirectional stream of packets between a given source and destination--both are defined by a network-layer IP address and
transport-layer source and des—nation port numbers. Specifically, a flow is identified as the combination of the following key fields:
Source IP address
Destination IP address
Source Layer 4 port number
Destination Layer 4 port number
Layer 3 protocol type
Type of service (ToS)
Input logical interface
QUESTION 70
An organization decides to implement NetFlow on its network to monitor the fluctuation of traffic that is disrupting core services. After reviewing the output of
NetFlow, the network engineer is unable to see OUT traffic on the interfaces. What can you determine based on this information?
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
We came across a recent issue where a user setup a router for NetFlow export but was unable to see the OUT traffic for the interfaces in NetFlow Analyzer.
Every NetFlow configuration aspect was checked and nothing incorrect was found. That is when we noticed the ‘no ip cef’ command on the router. CEF was
enabled at the global level and within seconds, NetFlow Analyzer started showing OUT traffic for the interfaces. This is why this topic is about Cisco Express
Forwarding.
What is switching?
A Router must make decisions about where to forward the packets passing through. This decision-making process is called “switching”. Switching is what a
router does when it makes the following decisions:
1. Whether to forward or not forward the packets after checking that the destination for the packet is reachable.
2. If the destination is reachable, what is the next hop of the router and which interface will the router use to get to that destination.
What is CEF?
CEF is one of the available switching options for Cisco routers. Based on the routing table, CEF creates its own table, called the Forwarding Information Base
(FIB). The FIB is organized differently than the routing table and CEF uses the FIB to decide which interface to send traffic from. CEF offers the following
benefits:
1. Better performance than fast-switching (the default) and takes less CPU to perform the same task.
2. When enabled, allows for advanced features like NBAR
3. Overall, CEF can switch traffic faster than route-caching using fast-switching
How to enable CEF?
CEF is disabled by default on all routers except the 7xxx series routers. Enabling and Disabling CEF is easy. To enable CEF, go into global configuration
mode and enter the CEF command.
Router# config t
Router(config)# ip cef
Router(config)#
To disable CEF, simply use the ‘no’ form of the command, ie. ‘no ip cef‘.
Why CEF Needed when enabling NetFlow?
CEF is a prerequisite to enable NetFlow on the router interfaces. CEF decides through which interface traffic is exiting the router. Any NetFlow analyzer
product will calculate the OUT traffic for an interface based on the Destination Interface value present in the NetFlow packets exported from the router. If
the CEF is disabled on the router, the NetFlow packets exported from the router will have “Destination interface” as “null” and this leads NetFlow Analyzer to
show no OUT traffic for the interfaces. Without enabling the CEF on the router, the NetFlow packets did not mark the destination interfaces and so NetFlow
Analyzer was not able to show the OUT traffic for the interfaces.
Reference: https://blogs.manageengine.com/network-2/netflowanalyzer/2010/05/19/need-for-cef-in-netflow-data-export.html
QUESTION 71
A network engineer has left a NetFlow capture enabled over the weekend to gather information regarding excessive bandwidth utilization. The following
command is entered:
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Reference: http://www.cisco.com/en/US/docs/ios-xml/ios/fnetflow/configuration/15-mt/cfg-de-fnflow-exprts.html
QUESTION 72
A company’s corporate policy has been updated to require that stateless, 1-to-1, and Ipv6 to Ipv6 translations at the Internet edge are performed. What is the
best solution to ensure compliance with this new policy?
A. NAT64
B. NAT44
C. NATv6
D. NPTv4
E. NPTv6
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NPTv6 provides a mechanism to translate the private internal organization prefixes to public globally reachable addresses. The translation mechanism is
stateless and provides a 1:1 relationship between the internal addresses and external addresses. The use cases for NPTv6 outlined in the RFC include
peering with partner networks, multi homing, and redundancy and load sharing.
Reference: http://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/August2012/Cisco_SBA_BN_IPv6AddressingGuide-Aug2012.pdf
QUESTION 73
Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.)
A. DNS
B. NAT
C. port redirection
D. stateless translation
E. session handling
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Work Address Translation IPv6 to IPv4, or NAT64, technology facilitates communication between IPv6-only and IPv4-only hosts and networks (whether in a
transit, an access, or an edge network). This solution allows both enterprises and ISPs to accelerate IPv6 adoption while simultaneously handling IPv4
address depletion. The DnS64 and NAT64 functions are completely separated, which is essential to the superiority of NAT64 over NAT-PT.
Reference: http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/white_paper_c11-676278.html
QUESTION 74
Which two methods of deployment can you use when implementing NAT64? (Choose two.)
A. stateless
B. stateful
C. manual
D. automatic
E. static
F. functional
G. dynamic
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
While stateful and stateless NAT64 perform the task of translating IPv4 packets into IPv6 packets and vice versa, there are important differences. The
following table provides a high-level overview of the most relevant differences.
QUESTION 75
Which NetFlow component is applied to an interface and collects information about flows?
A. flow monitor
B. flow exporter
C. flow sampler
D. flow collector
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Flow monitors are the NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache.
You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is
applied to the first interface. Flow data is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record,
which is configured for the flow monitor and stored in the flow monitor cache.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/fnetflow/command/reference/fnf_book/fnf_01.html#wp1314030
QUESTION 76
Refer to the exhibit.
Which statement about the output of the show flow-sampler command is true?
A. The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets.
B. The sampler matched 10 packets, one packet every 100 packets.
C. The sampler matched 10 packets, each one randomly chosen from every 100-second interval.
D. The sampler matched 10 packets, one packet every 100 seconds.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The sampling mode determines the algorithm that selects a subset of traffic for NetFlow processing. In the random sampling mode that Random Sampled
NetFlow uses, incoming packets are randomly selected so that one out of each n sequential packets is selected on average for NetFlow processing. For
example, if you set the sampling rate to 1 out of 100 packets, then NetFlow might sample the 5th, 120th, 199th, 302nd, and so on packets. This sample
configuration provides NetFlow data on 1 percent of total traffic. The n value is a parameter from 1 to 65535 packets that you can configure.
References:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/xe-16-6/nf-xe-16-6-book/nflow-filt-samp-traff-xe.html
QUESTION 77
What is the result of the command ip flow-export destination 10.10.10.1 5858?
A. It configures the router to export cache flow information to IP 10.10.10.1 on port UDP/5858.
B. It configures the router to export cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858.
C. It configures the router to receive cache flow information from IP 10.10.10.1 on port UDP/5858.
D. It configures the router to receive cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
To enable the exporting of information in NetFlow cache entries, use the ip flow-export destination command in global configuration mode.
Syntax Description
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_mdnf.html#wp1023091
QUESTION 78
Which type of traffic does DHCP snooping drop?
A. discover messages
B. DHCP messages where the source MAC and client MAC do not match
C. traffic from a trusted DHCP server to client
D. DHCP messages where the destination MAC and client MAC do not match
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The switch validates DHCP packets received on the untrusted interfaces of VLANs with DHCP snooping enabled. The switch forwards the DHCP packet
unless any of the following conditions occur (in which case the packet is dropped):
1. The switch receives a packet (such as a DHCPOFFER, DHCPACK, DHCPNAK, or DHCPLEASEQUERY packet) from a DHCP server outside the network
or firewall.
2. The switch receives a packet on an untrusted interface, and the source MAC address and the DHCP client hardware address do not match. This
check is performed only if the DHCP snooping MAC address verification option is turned on.
3. The switch receives a DHCPRELEASE or DHCPDECLINE message from an untrusted host with an entry in the DHCP snooping binding table, and the
interface information in the binding table does not match the interface on which the message was received.
4. The switch receives a DHCP packet that includes a relay agent IP address that is not 0.0.0.0.
To support trusted edge switches that are connected to untrusted aggregation-switch ports, you can enable the DHCP option-82 on untrusted port feature,
which enables untrusted aggregation-switch ports to accept DHCP packets that include option-82 information. Configure the port on the edge switch that
connects to the aggregation switch as a trusted port.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html
QUESTION 79
Which two commands would be used to troubleshoot high memory usage for a process? (Choose two.)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 80
The following configuration is applied to a router at a branch site:
If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to
provide end-to-end connectivity? (Choose two.)
A. EUI-64
B. SLAAC
C. DHCPv6
D. BOOTP
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 81
The enterprise network WAN link has been receiving several denial of service attacks from both IPv4 and IPv6 sources. Which three elements can you use
to identify an IPv6 packet via its header, in order to filter future attacks? (Choose three.)
A. Traffic Class
B. Source address
C. Flow Label
D. Hop Limit
E. Destination Address
F. Fragment Offset
Explanation/Reference:
Explanation:
Because flows are identified by the 3-tuple of the Flow Label and the Source and Destination Addresses, the risk of theft or denial of service introduced by
the Flow Label is related to the risk of theft or denial of service by address spoofing.
QUESTION 82
A network engineer has set up VRF-Lite on two routers where all the interfaces are in the same VRF. At a later time, a new loopback is added to Router 1,
but it cannot ping any of the existing interfaces. Which two configurations enable the local or remote router to ping the loopback from any existing interface?
(Choose two.)
A. adding a static route for the VRF that points to the global route table
B. adding the loopback to the VRF
C. adding dynamic routing between the two routers and advertising the loopback
D. adding the IP address of the loopback to the export route targets for the VRF
E. adding a static route for the VRF that points to the loopback interface
F. adding all interfaces to the global and VRF routing tables
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 83
Refer to the exhibit. The network setup is running the RIP routing protocol. Which two events will occur following link failure between R2 and R3? (Choose
two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 84
Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three.)
Explanation/Reference:
QUESTION 85
Which technology was originally developed for routers to handle fragmentation in the path between end points?
A. PMTUD
B. MSS
C. windowing
D. TCP
E. global synchronization
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Path MTU Discovery (PMTUD) is a standardized technique in computer networking for determining the maximum transmission unit (MTU) size on the
network path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in
Internet Protocol Version 4 (IPv4).[1] However, all modern operating systems use it on endpoints. In IPv6, this function has been explicitly delegated to the
end points of a communications session.[2]
PMTUD is standardized for IPv4 in RFC 1191 and for IPv6 in RFC 1981. RFC 4821 describes an extension to the techniques that works without support from
Internet Control Message Protocol.
QUESTION 86
Which traffic characteristic is the reason that UDP traffic that carries voice and video is assigned to the queue only on a link that is at least 768 kbps?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 87
A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before
troubleshooting the IPsec configuration?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 88
To configure SNMPv3 implementation, a network engineer is using the AuthNoPriv security level. What effect does this action have on the SNMP
messages?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 89
A network engineer is investigating the cause of a service disruption on a network segment and executes the debug condition interface fastethernet f0/0
command. In which situation is the debugging output generated?
A. when packets on the interface are received and the interface is operational
B. when packets on the interface are received and logging buffered is enabled
C. when packets on the interface are received and forwarded to a configured syslog server
D. when packets on the interface are received and the interface is shut down
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 90
Refer to the exhibit. The command is executed while configuring a point-to-multipoint Frame Relay interface. Which type of IPv6 address is portrayed in the
exhibit?
A. link-local
B. site-local
C. global
D. multicast
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 91
An engineer executes the ip flow ingress command in interface configuration mode. What is the result of this action?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 92
What is the primary service that is provided when you implement Cisco Easy Virtual Network?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 93
How does an IOS router process a packet that should be switched by Cisco Express Forwarding without an FIB entry?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 94
Which statement about dual stack is true?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 95
Which PPP authentication method sends authentication information in cleartext?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
PAP authentication involves a two-way handshake where the username and password are sent across the link in clear text; hence, PAP authentication does
not provide any protection against playback and line sniffing.
CHAP authentication, on the other hand, periodically verifies the identity of the remote node using a three-way handshake. After the PPP link is established,
the host sends a "challenge" message to the remote node. The remote node responds with a value calc"lated usi"g a one-way hash function. The host
checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise, the
connection is terminated.
Reference:
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10241-ppp-callin-hostname.html
QUESTION 96
A router receives a routing advertisement for the same prefix and subnet from four different routing protocols. Which advertisement is installed in the routing
table?
A. RIP
B. OSPF
C. iBGP
D. EIGRP
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 97
Refer to the exhibit. When summarizing these routes, which route is the summarized route?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 98
Which type of BGP AS number is 64591?
A. a private AS number
B. a public AS number
C. a private 4-byte AS number
D. a public 4-byte AS number
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 99
Refer to the exhibit. After configuring GRE between two routers running EIGRP that are connected to each other via a WAN link, a network engineer notices
that the two routers cannot establish the GRE tunnel to begin the exchange of routing updates. What is the reason for this?
A. Either a firewall between the two routers or an ACL on the router is blocking IP protocol number 47.
B. Either a firewall between the two routers or an ACL on the router is blocking UDP 57.
C. Either a firewall between the two routers or an ACL on the router is blocking TCP 47.
D. Either a firewall between the two routers or an ACL on the router is blocking IP protocol number 57.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 100
Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple
spoke devices?
A. DMVPN
B. GETVPN
C. Cisco Easy VPN
D. FlexVPN
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 101
Which Cisco VPN technology uses AAA to implement group policies and authorization and is also used for the XAUTH authentication method?
A. DMVPN
B. Cisco Easy VPN
C. GETVPN
D. GREVPN
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 102
Which parameter in an SNMPv3 configuration offers authentication and encryption?
A. auth
B. noauth
C. priv
D. secret
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 103
Refer to the following configuration command.
A. The router acts as an authoritative NTP clock and allows only 10 NTP client connections.
B. The router acts as an authoritative NTP clock at stratum 10.
C. The router acts as an authoritative NTP clock with a priority number of 10.
D. The router acts as an authoritative NTP clock for 10 minutes only.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 104
Refer to the exhibit. The DHCP client is unable to receive a DHCP address from the DHCP server. Consider the following output:
hostname RouterB
!
interface fastethernet 0/0
ip address 172.31.1.1 255.255.255.0
interface serial 0/0
ip address 10.1.1.1 255.255.255.252
!
ip route 172.16.1.0 255.255.255.0 10.1.1.2
Which configuration is required on the Router B fastEthernet 0/0 port in order to allow the DHCP client to successfully receive an IP address from the DHCP
server?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 105
Which statement about the NPTv6 protocol is true?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
NPT stands for Network Prefix Translation.
IPv6-to-IPv6 Network Prefix Translation (NPTv6) performs a stateless, static translation of one IPv6 prefix to another IPv6 prefix thereby allowing private
Unique Local Addresses (ULA) to be able to access the Internet, by translating it to Global Routable Addresses
NPTv6 does not do a port translation, hence, the ports remain the same for incoming and outgoing packets.
QUESTION 106
Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true?
A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down.
B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down.
C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up.
D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 107
Refer to the exhibit. Which statement about the configuration is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 108
Refer to the exhibit. Which statement about the command output is true?
Explanation/Reference:
QUESTION 109
A network engineer is trying to modify an existing active NAT configuration on an IOS router by using the following command:
Upon entering the command on the IOS router, the following message is seen on the console:
%Dynamic Mapping in Use, Cannot remove message or the %Pool outpool in use, cannot destroy
What is the least impactful method that the engineer can use to modify the existing IP NAT configuration?
A. Clear the IP NAT translations using the clear ip nat traffic * " command, then replace the NAT configuration quickly, before any new NAT entries are
populated into the translation table due to active NAT traffic.
B. Clear the IP NAT translations using the clear ip nat translation * " command, then replace the NAT configuration quickly, before any new NAT entries are
populated into the translation table due to active NAT traffic.
C. Clear the IP NAT translations using the reload command on the router, then replace the NAT configuration quickly, before any new NAT entries are
populated into the translation table due to active NAT traffic.
D. Clear the IP NAT translations using the clear ip nat table * " command, then replace the NAT configuration quickly, before any new NAT entries are
populated into the translation table due to active NAT traffic.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 110
Which IPv6 address type is seen as the next-hop address in the output of the show ipv6 rip RIPng database command?
A. link-local
B. global
C. site-local
D. anycast
E. multicast
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 111
Which three items can you track when you use two time stamps with IP SLAs? (Choose three.)
A. delay
B. jitter
C. packet loss
D. load
E. throughput
F. path
Explanation/Reference:
QUESTION 112
If the total bandwidth is 64 kbps and the RTT is 3 seconds, what is the bandwidth delay product?
A. 8,000 bytes
B. 16,000 bytes
C. 24,000 bytes
D. 32,000 bytes
E. 62,000 bytes
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Bandwidth delay product is defined as capacity of a pipe = bandwidth (bits/ sec) * RTT (s) where capacity is specific to TCP and is a bi-product of how the
protocol itself operates.
64 kbps = 64.000bps
1byte=8bit
64.000/8=8.000*3=24.000
Reference:
https://supportforums.cisco.com/t5/wan-routing-and-switching/tcp-performance-bandwidth-delay-product/td-p/765376
QUESTION 113
What are the default timers for RIPng?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Update Timer
The update timer controls the interval between two gratuitous Response Messages. By default the value is 30 seconds. The response message is broadcast
to all its RIP enabled interface.[8]
Invalid Timer
The invalid timer specifies how long a routing entry can be in the routing table without being updated. This is also called as expiration Timer. By default, the
value is 180 seconds. After the timer expires the hop count of the routing entry will be set to 16, marking the destination as unreachable.
Flush Timer
The flush timer controls the time between the route is invalidated or marked as unreachable and removal of entry from the routing table. By default the value
is 240 seconds. This is 60 seconds longer than Invalid timer. So for 60 seconds the router will be advertising about this unreachable route to all its
neighbours. This timer must be set to a higher value than the invalid timer.[8]
Hold-down Timer
The hold-down timer is started per route entry, when the hop count is changing from lower value to higher value. This allows the route to get stabilized.
During this time no update can be done to that routing entry. This is not part of the RFC 1058. This is Cisco's implementation. The default value of this timer
is 180 seconds.
Reference:
http://www.brocade.com/content/html/en/configuration-guide/fastiron-08030b-l3guide/GUID-97023AC1-C034-40EA-B02D-1E3E9DACCAC7.html
QUESTION 114
What is the purpose of the route-target command?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 115
A network engineer has configured a tracking object to monitor the reachability of IP SLA 1. In order to update the next hop for the interesting traffic, which
feature must be used in conjunction with the newly created tracking object to manipulate the traffic flow as required?
A. SNMP
B. PBR
C. IP SLA
D. SAA
E. ACLs
F. IGP
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 116
A route map uses an ACL, if the required matching is based on which criteria?
A. addressing information
B. route types
C. AS paths
D. metrics
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 117
Various employees in the same department report to the network engineer about slowness in the network connectivity to the Internet. They are also having
latency issues communicating to the network drives of various departments. Upon monitoring, the engineer finds traffic flood in the network. Which option is
the problem?
A. network outage
B. network switching loop
C. router configuration issue
D. wrong proxy configured
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 118
Which type of handshake does CHAP authentication use to establish a PPP link?
A. one-way
B. two-way
C. three-way
D. four-way
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 119
Which two authentication protocols does PPP support? (Choose two.)
A. WAP
B. PAP
C. CHAP
D. EAP
E. RADIUS
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 120
Which statement is a restriction for PPPoE configuration?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Restrictions for PPPoE on Ethernet
The following restrictions apply when the PPPoE on Ethernet feature is used:
• PPPoE is not supported on Frame Relay.
• PPPoE is not supported on any other LAN interfaces such as FDDI and Token Ring.
• Fast switching is supported. PPP over Ethernet over RFC 1483 fibswitching is supported for IP. All other protocols are switched over process switching.
QUESTION 121
Refer to the exhibit.
Which statement about the configuration is true?
A. This configuration is incorrect because the MTU must match the ppp-max-payload that is defined.
B. This configuration is incorrect because the dialer interface number must be the same as the dialer pool number.
C. This configuration is missing an IP address on the dialer interface.
D. This configuration represents a complete PPPoE client configuration on an Ethernet connection.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 122
A company has their headquarters located in a large city with a T3 frame relay link that connects 30 remote locations that each have T1 frame relay
connections. Which technology must be configured to prevent remote sites from getting overwhelmed with traffic and prevent packet drops from the
headquarters?
A. traffic shaping
B. IPsec VPN
C. GRE VPN
D. MPLS
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 123
On which two types of interface is Frame Relay switching supported? (Choose two.)
A. serial interfaces
B. Ethernet interfaces
C. fiber interfaces
D. ISDN interfaces
E. auxiliary interfaces
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 124
In IPv6, SLAAC provides the ability to address a host based on a network prefix that is advertised from a local network router. How is the prefix advertised?
A. routing table
B. router advertisements
C. routing protocol
D. routing type
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 125
Refer to the exhibit.
Which option prevents routing updates from being sent to the access layer switches?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 126
Refer to the exhibit.
Which option prevents routing updates from being sent to the DHCP router, while still allowing routing update messages to flow to the Internet router and the
distribution switches?
A. DHCP(config-router)# passive-interface default DHCP(config-router)# no passive-interface Gi1/0 Internet(config-router)# passive-interface Gi0/1 Internet
(config-router)# passive-interface Gi0/2
B. Core(config-router)# passive-interface Gi0/0 Core(config-router)# passive-interface Gi3/1 Core(config-router)# passive-interface Gi3/2 DHCP(config-
router)# no passive-interface Gi1/0
C. Core(config-router)# passive-interface default Core(config-router)# no passive-interface Gi0/0 Core(config-router)# no passive-interface Gi3/1 Core
(config-router)# no passive-interface Gi3/2
D. Internet(config-router)# passive-interface default Core(config-router)# passive-interface default DSW1(config-router)# passive-interface default DSW2
(config-router)# passive-interface default
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 127
A network engineer is considering enabling load balancing with EIGRP. Which consideration should be analyzed?
A. EIGRP allows a maximum of four paths across for load balancing traffic.
B. By default, EIGRP uses a default variance of 2 for load balancing.
C. EIGRP unequal path load balancing can result in routing loops.
D. By default, EIGRP performs equal cost load balancing at least across four equal cost paths.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 128
The OSPF database of a router shows LSA types 1, 2, 3, and 7 only. Which type of area is this router connected to?
A. stub area
B. totally stubby area
C. backbone area
D. not-so-stubby area
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 129
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel
from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 130
Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?
A. BGP
B. LLDP
C. EIGRP
D. NHRP
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 131
Which two routing protocols are supported by Easy Virtual Network? (Choose two.)
A. RIPv2
B. OSPFv2
C. BGP
D. EIGRP
E. IS-IS
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 132
Which statement is true?
A. RADIUS uses TCP, and TACACS+ uses UDP.
B. RADIUS encrypts the entire body of the packet.
C. TACACS+ encrypts only the password portion of a packet.
D. TACACS+ separates authentication and authorization.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 133
Which two statements about AAA implementation in a Cisco router are true? (Choose two.)
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 134
Which option is invalid when configuring Unicast Reverse Path Forwarding?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 135
Refer to the exhibit.
Which option represents the minimal configuration that allows inbound traffic from the 172.16.1.0/24 network to successfully enter router R, while also limiting
spoofed 10.0.0.0/8 hosts that could enter router R?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 136
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address
10.10.10.1?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 137
Which two statements indicate a valid association mode for NTP synchronization? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 138
Refer to the exhibit.
Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 139
Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT?
A. It allows host 192.168.1.50 to access external websites using TCP port 8080.
B. It allows external clients coming from public IP 209.165.201.1 to connect to a web server at 192.168.1.50.
C. It allows external clients to connect to a web server hosted on 192.168.1.50.
D. It represents an incorrect NAT configuration because it uses standard TCP ports.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 140
Refer to the exhibit.
Which technology can be employed to automatically detect a WAN primary link failure and failover to the secondary link?
A. HSRP
B. VRRP
C. IP SLA
D. multicast
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 141
In which two ways can NetFlow data be viewed? (Choose two.)
A. CLI
B. NetFlow
C. built-in GUI
D. syslog server interface
E. web interface
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 142
DRAG DROP
Drag and drop the Cisco Express Forwarding adjacency types from the left to the correct type of processing on the right.
Explanation/Reference:
QUESTION 143
DRAG DROP
Drag and drop the BGP states from the left to the matching definitions on the right.
Explanation/Reference:
QUESTION 144
DRAG DROP
Drag and drop the IPv6 NAT characteristic from the left to the matching IPv6 NAT category on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 145
An engineer is asked to monitor the availability of the next-hop IP address of 172.16.201.25 every 3 seconds using an ICMP echo packet via an ICMP echo
probe. Which two commands accomplish this task? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 146
What is the function of the snmp-server manager command?
A. to enable the device to send and receive SNMP requests and responses
B. to disable SNMP messages from getting to the SNMP engine
C. to enable the device to send SNMP traps to the SNMP server
D. to configure the SNMP server to store log data
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The SNMP manager process sends SNMP requests to agents and receives SNMP responses and notifications from agents. When the SNMP manager
process is enabled, the router can query other SNMP agents and process incoming SNMP traps.
Most network security policies assume that routers will be accepting SNMP requests, sending SNMP responses, and sending SNMP notifications. With the
SNMP manager functionality enabled, the router may also be sending SNMP requests, receiving SNMP responses, and receiving SNMP notifications. The
security policy implementation may need to be updated prior to enabling this functionality.
SNMP requests are typically sent to UDP port 161. SNMP responses are typically sent from UDP port 161. SNMP notifications are typically sent to UDP port
162
QUESTION 147
Refer to the following configuration command.:
A. Any packet that is received in the inside interface with a source IP port addresses of 172.16.10.8:80 is translated to 172.16.10.8:8080.
B. Any packet that is received in the inside interface with a source IP address of 172.16.10.8is redirected to port 8080 or port 80.
C. The router accepts only a TCP connection from port 8080 and port 80 on IP address 172.16.10.8.
D. Any packet that is received in the inside interface with a source IP port address of 172.16.10.8:8080 is translatedto 172.16.10.8:80.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: http://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13772-12.html#topic9
QUESTION 148
When a tunnel interface is configured in the default mode, which statement about routers and the tunnel destination address is true?
A. The router must have WCCP redirects enabled inbound from the tunnel destination.
B. The router must have redirects enabled outbound toward the tunnel destination.
C. The router must have a route installed toward the tunneldestination.
D. The router must have Cisco Discovery Protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 149
Refer to the exhibit. A network engineer has configured GRE between two IOS routers. The state of the tunnel interface is continuously oscillating between
up and down. What is the solution to this problem?
A. Create a more specific ARP entry to define how to reach the remote router.
B. Save the configuration and reload the router.
C. Create a more specific static route to define how to reach the remote router.
D. Check whether the Internet service provider link is stable,
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
References:
http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/22327-gre-flap.html
QUESTION 150
Other than a working EIGRP configuration, which option must be the same on all routers for EIGRP authentication key role over to work correctly?
A. SMTP
B. SNMP
C. passwords
D. time
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If we have option "Key-Chain", instead of "Passwords" then option C would also be correct.
References: https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html
QUESTION 151
Which two statements about NTP operation are true? (Choose two.)
Explanation/Reference:
Explanation:
NTP is designed to synchronize the time on a network of machines. NTP runs over the User Datagram Protocol (UDP), using port 123 as both the source
and destination, which in turn runs over IP. NTP Version 3 RFC 1305 leavingcisco.com is used to synchronize timekeeping among a set of distributed time
servers and clients. A set of nodes on a network are identified and configured with NTP and the nodes form a synchronization subnet, sometimes referred to
as an overlay network. While multiple masters (primary servers) may exist, there is no requirement for an election protocol.
An NTP network usually gets its time from an authoritative time source, such as a radio clock or an atomic clock attached to a time server. NTP then
distributes this time across the network. An NTP client makes a transaction with its server over its polling interval (from 64 to 1024 seconds) which
dynamically changes over time depending on the network conditions between the NTP server and the client. The other situation occurs when the router
communicates to a bad NTP server (for example, NTP server with large dispersion); the router also increases the poll interval. No more than one NTP
transaction per minute is needed to synchronize two machines. It is not possible to adjust the NTP poll interval on a router.
NTP uses the concept of a stratum to describe how many NTP hops away a machine is from an authoritative time source. For example, a stratum 1 time
server has a radio or atomic clock directly attached to it. It then sends its time to a stratum 2 time server through NTP, and so on. A machine running NTP
automatically chooses the machine with the lowest stratum number that it is configured to communicate with using NTP as its time source. This strategy
effectively builds a self-organizing tree of NTP speakers. NTP performs well over the non-deterministic path lengths of packet-switched networks, because it
makes robust estimates of the following three key variables in the relationship between a client and a time server
Reference:
http://www.cisco.com/c/en/us/support/docs/availability/high-availability/19643-ntpm.html
QUESTION 152
Which type of IPv6 address is an identifier for a single interface on a single node?
A. broadcast
B. multicast
C. anycast
D. unicast
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
An IPv6 unicast address is an identifier for a single interface,on a single node. A packet that is sent to a unicast address is delivered to the interface identified
by that address.
References:
QUESTION 153
Refer to the exhibit. Which three NTP features can be deduced on the router? (Choose three.)
Explanation/Reference:
Explanation:
The access group options are scanned in the following order, from least restrictive to most restrictive. However, if NTP matches a deny ACL rule in a
configured peer, ACL processing stops and does not continue to the next access group option.
• The peer keyword enables the device to receive time requests and NTP control queries and to synchronize itself to the servers specified in the access list.
• The serve keyword enables the device to receivetime requests and NTP control queries from the servers specified in the access list but not to synchronize
itself to the specified servers.
• The serve-only keyword enables the device to receive only time requests from servers specified in the access list.
• The query-only keyword enables the device to receive only NTP control queries from the servers specified in the access list.
QUESTION 154
What command can you enter to configure an enable password that users an encrypted password from another configuration?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
References:
QUESTION 155
A network engineer receives reports about poor voice quality issues at a remote site. The network engineer does a packet capture and sees out-of-order
packets being delivered. Which option can cause the VoIP quality to suffer?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In traditional packet forwarding systems, using different paths have varying latencies that cause out of order packets, eventually resulting in far lower
performance for the network application. Also , if some packets are process switched quickly by the routing engine of the router while others are interrupt
switched (which takes more time) then it could result in out of order packets. The other options would cause packet drops or latency, but not out of order
packets.
QUESTION 156
Refer to the exhibit. A network engineer is troubleshooting a DMVPN setup between the hub and the spoke. The engineer executes the command show
crypto isakmp sa and observes the output that is displayed. What is the problem?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html
QUESTION 157
Which two attributes describe UDP within a TCP/IP network? (Choose two.)
A. acknowledgments
B. unreliable delivery
C. connection-oriented communication
D. increased headers
E. connectionless communication
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
UDP Characteristics
presents the structure of a UDP segment header. Because UDP is considered to be an unreliable protocol, it lacks the sequence numbering, window size,
and connectionless acknowledgment numbering present in the header of a TCP segment.
Rather the UDP segment's
Because a UDP segment header is so much smaller than a TCP segment header, UDP becomes a good candidate for the transport layer protocol serving
applications that need to maximize bandwidth and do not require acknowledgments.
QUESTION 158
Which three IP SLA performance metrics can you use to monitor enterprise-class networks? (Choose three.)
A. packet loss
B. delay
C. bandwidth
D. connectivity
E. reliability
F. traps
Explanation/Reference:
Explanation:
Cisco IOS IP SLAs collects a unique subset of the following performance metrics:
• Delay (both round-trip and one-way)
• Jitter (directional)
• Packet loss (directional)
• Packet sequencing (packet ordering)
• Path(per hop)
• Connectivity (directional)
• Server or website download time
• Voice quality scores
QUESTION 159
A network administrator notices that the BGP state and logs are generated for missing BGP hello keepalives. What is the potential problem?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Introduction
This document describes how to determine if internal or external Border Gateway Protocol (BGP) neighbor flaps are caused by maximum transmission unit
(MTU) issues.
Problem
BGP neighbors form; however, at the time of prefix exchange, the BGP state drops and the logsgenerate missing BGP hello keepalives or the other peer
terminates the session.
References:
QUESTION 160
A network engineer wants to notify a manager in the event that the IP SLA connection loss threshold is reached. Which two features are needed to
implement this functionality? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
References:
QUESTION 161
Which Easy Virtual Networking configuration component significantly decreases network configuration?
A. MBGP
B. VNET tags
C. VNET Trunk List
D. VirtualNetwork Trunk
E. dot1e
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
EVN reduces network virtualization configuration significantly across the entire network infrastructure with the Virtual Network Trunk. The traditional VRF-Lite
solution requires creating one subinterface perVRF on all switches and routers involved in the data path, creating a lot of burden in configuration
management. EVN removes the need of per VRF subinterface by using “vnet trunk” command.
References:
http://www.cisco.com/c/en/us/products/ios-nx-os-software/easy-virtual-network-evn/index.html
QUESTION 162
A network engineer wants to display the statistics of an active tunnel on a DMVPN network. Which command should the administrator execute to accomplish
this task?
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Certain show commands are supported by the Output Interpreter Tool (registered customers only) , which allows you to view an analysis of show command
output.
show crypto isakmp sa—Displays the state for the ISAKMP security association (SA).
show crypto engine connections active —Displays the total encrypts/decrypts per SA.
show crypto ipsec sa—Displays the statistics on the active tunnels.
show ip route—Displays the routing table.
show ip eigrp neighbor—Displays the EIGRP neighbors.
show ip nhrp—Displays the IP Next Hop Resolution Protocol (NHRP) cache, optionally limited to dynamic or static cache entries for a specific interface.
show crypto socket—Displays the cryptosocket table between NHRP and IPSec.
References:
http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/29240-dcmvpn.html#veri
QUESTION 163
Which IP SLA operation can be used to measure round-trip delay for the full path and hop-by hop round-trip delay on the network?
A. HTTP
B. ICMP echo
C. TCP connect
D. ICMP path echo
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The ICMP Path Echo operation computes hop-by-hop response time between a Cisco router and any IP device on the network.
References:
http://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_paper09186a00802d5efe.html
QUESTION 164
In which form does PAP Authentication send the user name and password across the link?
A. clear text
B. hashed
C. encrypted
D. password protected
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 165
What is the administrative distance for EBGP?
A. 200
B. 20
C. 30
D. 70
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 166
Considering the IPv6 address independence requirement, which process do you avoid when you use NPTv6 for translation?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The IPv6-to-IPv6 Network Prefix Translation (NPTv6) serves as a useful mechanism for implementing address independence in an IPv6 environment. A
major benefit associated with NPTv6 is the fact that it avoids the requirement for an NPTv6 Translator to rewrite the transport layer headers which reduces
the load on network devices. NPTv6 also does not interfere with encryption of the full IP payload.
References:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-16/nat-xe-16-book/iadnat-asr1k-nptv6.html
QUESTION 167
What is the optimal location from which to execute a debug command that produces an excessive amount of information?
A. vty lines
B. a console port
C. SNMP commands
D. an AUX port
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Excessive debugs to the console port of a router can cause it to hang. This is because the router automatically prioritizes console output ahead of other
router functions. Hence if the router is processing a large debug outputto the console port, it may hang. Hence, if the debug output is excessive use the vty
(telnet) ports or the log buffers to obtain your debugs. More information is provided below.
References:
http://www.cisco.com/c/en/us/support/docs/dial-access/integrated-services-digital-networks-isdn-channel-associated-signaling-cas/10374-debug.html
QUESTION 168
A network engineer is configuring the router for NetFlow data exploring. What is required in order for NDE to begin exporting data?
A. destination
B. flowmask
C. source
D. traffic type
E. interface type
F. NetFlow version
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
NetFlow Multiple Export Destinations--To configure redundant NDE data streams, which improves the probability of receiving complete NetFlow data, you
can enter the ip flow-export destination command twice and configure a different destination IP address in each command. Configuring two destinations
increases the RP CPU utilization, as you are exporting the data records twice.
References:
http://www.cisco.com/en/US/docs/general/Test/dwerblo/broken_guide/nde.html#wp1139278
QUESTION 169
Refer to the exhibit. Router 1 cannot ping router 2 via the Frame Relay between them. Which two statements describe the problems? (Choose two.)
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 170
How many times was SPF alrogithm executed on R4 for Area 1?
A. 1
B. 5
C. 9
D. 20
E. 54
F. 224
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Answers vary, some answers will be 3. To find the answer, you can check the number of times the execcuted SPF algorithm ran via the “show ip
ospf”command on R4:
In this case it was 3. Again, answers will vary.
QUESTION 171
An engineer is using a network sniffer to troubleshoot DHCPv6 between a router and hosts on the LAN with the following configuration:
interface Ethernet0
ipv6 dhcp server DHCPSERVERPOOL rapid-commit
!
Which two DHCP messages will appear in the sniffer logs? (Choose two.)
A. reply
B. request
C. advertise
D. Acknowledge
E. solicit
F. accept
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The DHCPv6 client can obtain configuration parameters from a server either through a rapid two-message exchange (solicit, reply) or through a four-
message exchange (solicit, advertise, request, and reply). By default, the four-message exchange is used. When the rapid-commit option is enabled by both
the client and the server, the two-message exchange is used.
References:
QUESTION 172
At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?
A. Layer 4
B. Layer 3
C. Layer 2
D. Layer 1
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation: Adjacency table - Nodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. In addition to
the FIB, CEF uses adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB
entries.
References:
http://www.cisco.com/c/en/us/support/docs/routers/12000-series-routers/47321-ciscoef.html
QUESTION 173
A network engineer wants to ensure an optimal end-to-end delay bandwidth product. The delay is less than 64 ms. Which TCP feature ensures steady state
throughput?
A. network buffers
B. TCP acknowledgments
C. widows scaling
D. round-trip timers
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Options can be carried in a TCP header. Those relevant to TCP performance include Window- scale option : This option is intended to address the issue of
the maximum window size in the face of paths that exhibit a high-delay bandwidth product. This option allows the window size advertisement to be right-
shifted by the amount specified (in binary arithmetic, a right-shift corresponds to a multiplication by 2). Without this option, the maximum window size that can
be advertised is 65,535 bytes (the maximum value obtainable in a 16-bit field). The limit of TCP transfer speed is effectively one window size in transit
between the sender and the receiver. For high-speed, long-delay networks, this performance limitation is a significant factor, because it limits the transfer rate
to at most 65,535 bytes per round-trip interval, regardless of available network capacity. Use of the window- scale option allows the TCP sender to effectively
adapt to high-band-width, high-delay network paths, by allowing more data to be held in flight.
The maximum window size with this option.
Reference:
http://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-5/ipj-archive/article09186a00800c8417.html
QUESTION 174
DRAG DROP
Drag and drop the Challenge Handshake Authentication Protocol steps from the left into the correct order in which they occur on the right.
Correct Answer:
Explanation/Reference:
Explanation:
The Challenge Handshake Authentication Protocol (CHAP) verifies the identity of the peer by means of a three-way handshake. These are the general steps
performed in CHAP:
1. After the LCP (Link Control Protocol) phase is complete, and CHAP is negotiated between both devices,the authenticator sends a challenge message to
the peer.
2. The peer responds with a value calculated through a one-way hash function (Message Digest 5 (MD5)).
3. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is successful.
Otherwise, the connection is terminated.
References:
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html
QUESTION 175
Which two functionalities are specific to stateless NAT64? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 176
A network administrator creates a static route that points directly to a multi-access interface, instead of the next-hop IP address. The administrator notices
that Cisco Express Forwarding ARP requests are being sent to all destinations. Which issue might this configuration create?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
http://www.cisco.com/c/en/us/support/docs/ip/express-forwarding-cef/26083-trouble-cef.html
QUESTION 177
Refer to the exhibit showing complete command output. What type of OSPF router is router A?
A. internal router
B. ASBR
C. ABR
D. edge router
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
An area is interface specific. A router that has all of its interfaces within the same area is called an internal router (IR). A router that has interfaces in multiple
areas is called an area border router (ABR).
Reference:
http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html#t8
QUESTION 178
You are configuring a Microsoft client to call a PPP server using CHAP. Only the client will be authenticated, but the client’s password has expired and must
be changed. Which PPP server configuration allows the call to be completed?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 179
During which DMVPN phase is spoke-to-spoke communication enabled?
A. Phase 1
B. Phase 6
C. Phase 2
D. Phase 5
E. Phase 4
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 180
Which two tasks does a DHCP relay agent perform? (Choose two.)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/interfaces_modules/services_modules/ace/vA5_1_0/configuration/rtg_brdg/guide/rtbrgdgd/dhcp.pdfpage 3
QUESTION 181
Which command enables NAT-PT on an IPv6 interface?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/15-mt/nat-15-mt-book/ip6-natpt.html
QUESTION 182
DRAG DROP
Drag and drop the IPv6 NAT characteristic from the left onto the correct IPv6 NAT category on the right.
Correct Answer:
Explanation/Reference:
QUESTION 183
Which two address types are included in NAT? (Choose two.)
A. outside Internet
B. outside local
C. inside global
D. global outside
E. inside Internet
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/4606-8.html
QUESTION 184
A network engineer is modifying RIPng timer configuration. Which configuration mode should the engineer use?
A. router(config-if)#
B. router(config-rtr)#
C. router(config)#
D. router(config-ripng)#
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
This is how to change the timers for RIPng:
R1(config)#ipv6 router rip test
R1(config-rtr)#timers 5 15 10 30 (5: Update period; 15: Route timeout period; 10: Route holddown period; 30: Route garbage collection period)
QUESTION 185
DRAG DROP
Drag and drop the Frame Relay components from the left onto the correct descriptions on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 186
Which two statements about IP access lists are true? (Choose two.)
A. IP access lists without at least one deny statement permit all traffic by default.
B. They support wildcard masks to limit the address bits to which entries are applied.
C. Extended access lists must include port numbers.
D. They end with an implicit permit.
E. Entries are applied to traffic in the order in which they appear.
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 187
Which option is one way to mitigate asymmetric routing on an active/active firewall setup for TCP-based connections?
A. disabling asr-group commands on interfaces that are likely to receive asymmetric traffic
B. disabling stateful TCP checks
C. performing packet captures
D. replacing them with redundant routers and allowing load balancing
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 188
A network engineer executes the show ip cache flow command. Which two types of information are displayed in the report that is generated? (Choose two.)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 189
Which two statements about NetFlow version 9 are true? (Choose two.)
Explanation/Reference:
QUESTION 190
Which CLI command can you enter to permit or deny IPv6 traffic travelling through an interface?
A. ipv6 access-class
B. access-list
C. access-group
D. ipv6 traffic-filter
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 191
Which three statements about SNMP are true? (Choose three.)
Explanation/Reference:
Explanation:
"A manager can send the agent requests to get and set MIB values."
" The security features provided in SNMPv3 are as follows: Message integrity, Authentication, Encryption."
"SNMP requests typically are sent to User Datagram Protocol (UDP) port 161."
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html
QUESTION 192
Which two OSPF network types can operate without a DR/BDR relationship? (Choose two.)
A. point-to-multipoint
B. nonbroadcast multiaccess
C. nonbroadcast
D. point-to-point
E. broadcast
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 193
Which three algorithms can you configure with the ip cef load-sharing algorithm command? (Choose three.)
A. per-packet
B. include-ports
C. universal
D. per-destination
E. tunnel
F. per-source
Explanation/Reference:
Explanation:
The following load-balancing algorithms are provided for use with Cisco Express Forwarding traffic. You select a load-balancing algorithm with
the ip cef load-sharing algorithm command.
Original algorithm--The original Cisco Express Forwarding load-balancing algorithm produces distortions in load sharing across multiple routers because
the same algorithm was used on every router. Depending on your network environment, you should select either the universal algorithm (default) or the
tunnel algorithm instead.
Universal algorithm--The universal load-balancing algorithm allows each router on the network to make a different load sharing decision for each source-
destination address pair, which resolves load-sharing imbalances. The router is set to perform universal load sharing by default.
Tunnel algorithm--The tunnel algorithm is designed to balance the per-packet load when only a few source and destination pairs are involved.
Include-ports algorithm--The include-ports algorithm allows you to use the Layer 4 source and destination ports as part of the load-balancing decision.
This method benefits traffic streams running over equal cost paths that are not load shared because the majority of the traffic is between peer addresses
that use different port numbers, such as Real-Time Protocol (RTP) streams. The include-ports algorithm is available in Cisco IOS Release 12.4(11)T and
later releases.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/isw-cef-15-mt-book/isw-cef-load-balancing.html
QUESTION 194
Which interface type does a PPPoE client use to establish a session?
A. dialer
B. virtual-template
C. physical
D. loopback
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-pppoe-client.html
QUESTION 195
DHCPv6 can obtain configuration parameters from a server through rapid two-way message exchange. Which two steps are involved in this process?
(Choose two.)
A. reply
B. auth
C. advertise
D. request
E. solicit
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
When a server has IPv6 addresses and other configuration information committed to a client, the client and server may be able to complete the exchange
using only two messages, instead of four messages as described in the next section. In this case, the client sends a Solicit message to the
All_DHCP_Relay_Agents_and_Servers requesting the assignment of addresses and other configuration information.
The server that is willing to commit the assignment of addresses to the client immediately responds with a Reply message.
QUESTION 196
In a point-to-multipoint Frame Relay topology, which two methods ensure that all routing updates are received by all EIGRP routers within the Frame Relay
network? (Choose two.)
A. Use subinterfaces.
B. Create separate address families.
C. Disable EIGRP auto summary.
D. Use statically defined EIGRP neighbors on the hub site.
E. Disable split horizon.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 197
In which two areas does OSPF send a summary route by default? (Choose two.)
A. NSSA
B. totally stubby
C. normal
D. backbone
E. stub
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 198
Which DHCP options provides a TFTP server that Cisco phones can use to download a configuration?
A. DHCP Option 57
B. DHCP Option 66
C. DHCP Option 82
D. DHCP Option 68
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 199
Which two commands must you configure on a DMVPN hub to enable phase 3? (Choose two.)
A. ip nhrp map
B. ip redirects
C. ip nhrp shortcut
D. ip nhrp interest
E. ip nhrp redirect
F. ip network-id
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
DMVPN in Phase 3
--ip nhrp shortcut is require only to the Spoke,
--ip nhrp shortcut and ip nhrp redirect are both requires to the Hub
Reference: http://blog.ine.com/2008/12/23/dmvpn-phase-3/
QUESTION 200
Refer to the exhibit.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 201
By default, which type of IPv6 address is used to build the EUI-64 bit format?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
https://howdoesinternetwork.com/2013/slaac-ipv6-stateless-address-autoconfiguration
QUESTION 202
Which two statements about GRE tunnel interfaces are true? (Choose two.)
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/118361-technote-gre-00.html
QUESTION 203
DRAG DROP
Drag and drop the ACL types from the left onto the correct descriptions on the right.
Correct Answer:
Explanation/Reference:
QUESTION 204
DRAG DROP
Drag and drop the adverse network conditions from the left onto the correct descriptions on the right.
Correct Answer:
Explanation/Reference:
QUESTION 205
A network engineer executes the commands logging host 172.16.200.225 and logging trap 5. Which action results when these two commands are executed
together?
A. Logging messages that have a debugging severity level are sent to the remote server 172.16.200.225.
B. Logged information is stored locally, showing the source as 172.16.200.225.
C. Logging messages that have any severity level are sent to the remote server 172.16.200.225.
D. Logging messages that have a severity level of “notifications” and above (numerically lower) are sent to the remote server 172.16.200.225.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 206
Which problem can be caused by latency on a UDP stream?
A. The device that sends the stream is forced to hold data in the buffer for a longer period of time.
B. The device that receives the stream is forced to hold data in the buffer for a longer period of time.
C. The devices at each end of the stream are forced to negotiate a smaller windows size.
D. The overall throughput of the stream is decreased.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 207
Which Cisco Express Forwarding components maintains Layer 2 addressing information?
A. adjacency table
B. RIB
C. FIB
D. fast switching
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 208
DRAG DROP
Drag and drop the statements about authentication, authorization and accounting from the left into the correct categories on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
AAA offers different solutions that provide access control to network devices. The following services are included within its modular architectural framework:
+ Authentication – The process of validating users based on their identity and predetermined credentials, such as passwords and other mechanisms like
digital certificates. Authentication controls access by requiring valid user credentials, which are typically a username and password. With RADIUS, the ASA
supports PAP, CHAP, MS-CHAP1, MS-CHAP2, that means Authentication supports encryption.
+ Authorization – The method by which a network device assembles a set of attributes that regulates what tasks the user is authorized to perform. These
attributes are measured against a user database. The results are returned to the network device to determine the user’s qualifications and restrictions. This
database can be located locally on Cisco ASA or it can be hosted on a RADIUS or Terminal Access Controller Access-Control System Plus (TACACS+)
server. In summary, Authorization controls access per user after users authenticate.
+ Accounting – The process of gathering and sending user information to an AAA server used to track login times (when the user logged in and logged off)
and the services that users access. This information can be used for billing, auditing, and reporting purposes.
QUESTION 209
Refer to the exhibit.
Why is the default route not removed when 172.20.20.2 stops replying to ICMP echos?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 210
DRAG DROP
Drag and drop the statements from the left onto the correct uRPF modes on the right.
Correct Answer:
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/about/security-center/unicast-reverse-path-forwarding.html
QUESTION 211
In which scenario can asymmetric routing occur?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
What is Asymmetric Routing?
In Asymmetric routing, a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. This is
commonly seen in Layer-3 routed networks.
Asymmetric routing is when a packet returns on a patch that is different from a path that the traffic was sent. This can be seen in normal situations when
there are multiple paths to/from a destination. It can also be seen in misconfiguration situations such as a server having two NIC's for load balancing and it's
instead routing between them.
QUESTION 212
Which feature can mitigate fragmentation issues within network segments that are between GRE endpoints?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 213
After reviewing the EVN configuration, a network administrator notices that a predefined EVN, which is known as “vnet global”, was configured. What is the
purpose of this EVN?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.html
QUESTION 214
Which two debug commands can you use to view issues with CHAP and PAP authentication? (Choose two.)
A. debug radius
B. debug tacacs
C. debug aaa authentication
D. debug ppp negotiation
E. debug ppp authentication
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html
QUESTION 215
DRAG DROP
Drag and drop the GRE features from the left onto the correct descriptions on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 216
DRAG DROP
Drag and drop the statements from the left onto the correct IPv6 router security features on the right.
Correct Answer:
Explanation/Reference:
QUESTION 217
Which option is the minimum privilege level that allows the user to execute all user-level commands but prohibits enable-level commands by default?
A. level 0
B. level 1
C. level 14
D. level 15
E. level 16
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-access-control-system-tacacs-/23383-showrun.html#priv
QUESTION 218
Refer to the exhibit. Router DHCP is configured to lease IPv4 and IPv6 addresses to clients on ALS1 and ALS2. Clients on ALS2 receive IPv4 and IPv6
addresses. Clients on ALS1 receive IPv4 addresses. Which configuration on DSW1 allows clients on ALS1 to receive IPv6 addresses?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Specifies a destination address to which client packets are forwarded and enables DHCPv6 relay service on the interface.
ipv6 dhcp relay destination ipv6-address[interface-type interface-number]
Example:
Router(config-if) ipv6 dhcp relay destination FE80::250:A2FF:FEBF:A056 ethernet 4/3
QUESTION 219
Refer to the exhibit. Which networking challenge is the most important issue to address to enable optimal communication between the networks at company
A and company B?
A. IPv4 fragmentation
B. asymmetric routing
C. unicast flooding
D. UDP latency
E. IPV4 MTU
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 220
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 221
DRAG DROP
Drag and drop the steps in the TACACS+ authentication process from the left onto the actors that perform them on the right.
Explanation/Reference:
QUESTION 222
Which next hop is going to be used for 172.17.1.0/24 ?
A. 10.0.0.1
B. 192.168.1.2
C. 10.0.0.2
D. 192.168.3.2
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 223
Which two OSPF router types can perform summarization in an OSPF network? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 224
Which option is the minimum logging level that displays a log message when an ACL drops an incoming packet?
A. Level 5
B. Level 7
C. Level 3
D. Level 6
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
When the ACL logging feature is configured, the system monitors ACL flows and logs dropped packets and statistics for each flow that matches the deny
conditions of the ACL entry.
The log and log-input options apply to an individual ACE and cause packets that match the ACE to be logged.
The sample below illustrates the initial message and periodic updates sent by an IOS device with a default configuration using the log ACE option.
*May 1 22:12:13.243: %SEC-6-IPACCESSLOGP: list ACL-IPv4-E0/0-IN permitted tcp 192.168.1.3(1024) -> 192.168.2.1(22), 1 packet
From the example above we can see when an ACL drops a packet, it generates a level 6 Syslog (%SEC-6-)
Reference: https://www.cisco.com/c/en/us/about/security-center/access-control-list-logging.html
QUESTION 225
Which condition can cause unicast reverse path forwarding to fail?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Unicast RPF configured in strict mode may drop legitimate traffic that is received on an interface that was not the router’s choice for sending return traffic.
Dropping this legitimate traffic could occur when asymmetric routing paths are present in the network.
https://www.cisco.com/c/en/us/about/security-center/unicast-reverse-path-forwarding.html
QUESTION 226
Which two protocols can be affected by MPP? (Choose two.)
A. HTTP
B. POP
C. SFTP
D. SSH
E. SMTP
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Examples of protocols processed in the management plane are Simple Network Management Protocol (SNMP), Telnet, HTTP, Secure HTTP (HTTPS),
and SSH. These management protocols are used for monitoring and for CLI access. Restricting access to devices to internal sources (trusted networks) is
critical.
The Management Plane Protection (MPP) feature in Cisco IOS software provides the capability to restrict the interfaces on which network management
packets are allowed to enter a device. The MPP feature allows a network operator to designate one or more router interfaces as management interfaces.
Device management traffic is permitted to enter a device only through these management interfaces. After MPP is enabled, no interfaces except designated
management interfaces will accept network management traffic destined to the device.
Restricting management packets to designated interfaces provides greater control over management of a device, providing more security for that device.
Other benefits include improved performance for data packets on nonmanagement interfaces, support for network scalability, need for fewer access control
lists (ACLs) to restrict access to a device, and management packet floods on switching and routing interfaces are prevented from reaching the CPU.
QUESTION 227
How does an EVN provide end-to-end virtualization and separation for data traffic from multiple networks?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 228
When a packet is denied by an IPv6 traffic filter, which additional action does the device perform?
A. It scans the rest of the ACL for a permit entry matching the destination.
B. It generates an ICMP unreachable message for the frame.
C. It generates a TCP Fin bit and sends it to the source.
D. A creates a null route for the destination and adds it to the route table.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 229
Which two features does RADIUS combine? (Choose two.)
A. SSH
B. authorization
C. Telnet
D. authentication
E. accounting
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 230
After testing various dynamic IPv6 address assignment methods, an engineer decides that more control is needed when distributing addresses to clients.
Which two advantages does DHCPv6 have over EUI-64? (Choose two.)
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 231
What does stateful NAT64 do that stateless NAT64 does not do?
A. Stateful NAT64 maintains bindings or session state while performing translation
B. Stateful NAT64 maintains bindings of IPv4 to IPv6 link-local addresses
C. Stateful NAT64 translates IPv4 to IPv6
D. Stateful NAT64 translates IPv6 to IPv4
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/white_paper_c11-676278.html
QUESTION 232
Which version or versions of NetFlow support MPLS?
A. NetFlow version 9
B. NetFlow version 8
C. all versions of NetFlow
D. NetFlow versions 8 and 9
E. NetFlow version 5
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
MPLS-aware NetFlow uses the NetFlow Version 9 export format. MPLS-aware NetFlow exports up to three labels of interest from the incoming label stack,
the IP address associated with the top label, as well as traditional NetFlow data.
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsmnf24.html
QUESTION 233
A network engineer needs to verify IP SLA operations on an interface that shows an indication of excessive traffic. Which command should the engineer use
to complete this action?
A. show reachability
B. show threshold
C. show frequency
D. show track
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 234
Which value does a Cisco router use as its default username for CHAP authentication?
A. ppp
B. its own hostname
C. cisco
D. chap
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647-understanding-ppp-chap.html
QUESTION 235
A network engineer wants an NTP client to be able to update the local system without updating or synchronizing with the remote system. Which option for
the ntp access-group command is needed to accomplish this?
A. peer
B. query-only
C. serve-only
D. serve
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 236
Refer to the exhibit. You have correctly identified the inside and outside interfaces in the NAT configuration of this device. Which effect of this configuration is
true?
A. NAT64
B. dynamic NAT
C. PAT
D. static NAT
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 237
The Neighbor Discovery Protocol in ipv6 is replaced with which discovery protocol in ipv4?
A. ARP
B. ICMP
C. UDP
D. TCP
E. RFC
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Neighbor Discovery -- or ND -- is the protocol used by IPv6 to determine neighboring hosts, and will replace ARP which was used in IPv4. It will perform
similar tasks of the Address Resolution Protocol (ARP) and ICMP Router Discovery Protocol. It's purpose remains to get the MAC/Link Layer addresses of
available hosts, and the connection information of available routers in the network.
QUESTION 238
Fill in the Blank.
How to minimize Unicast flooding?
_________________________________
Correct Answer: By decreasing the ARP time compared to CAM table time
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 239
Which two protocols can cause TCP starvation? (Choose two)
A. TFTP
B. SNMP
C. SMTP
D. HTTPS
E. FTP
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation: TFTP (69) and SNMP (161) are UDP protocols
QUESTION 240
What is the international standard for transmitting data over a cable system?
A. PPPoE
B. DOCSIS
C. CMTS
D. AAL5
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 241
You have a router that has some interfaces configured with 10Gbps and 1Gbps interfaces. Which command you use to optimize higher bandwidth?
Explanation/Reference:
QUESTION 242
The company network is in the process of migrating the IP address scheme to use IPv6. Which of the following address types are associated with IPv6?
(Select three)
A. Unicast
B. Private
C. Broadcast
D. Public
E. Multicast
F. Anycast
Explanation/Reference:
QUESTION 243
ALWAYS block the outbound web traffic on Saturdays and Sunday between 1:00 to 23:59
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 244
What is IPv6 router solicitation?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 245
What is the default value of TCP maximum segment size?
A. 536
B. 1492
C. 1500
D. 1508
E. 3340
F. 4096
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
THE TCP MAXIMUM SEGMENT SIZE IS THE IP MAXIMUM DATAGRAM SIZE MINUS FORTY.
The default IP Maximum Datagram Size is 576.
The default TCP Maximum Segment Size is 536.
http://www.ietf.org/rfc/rfc879.txt?referring_site=bodynav
QUESTION 246
Congestion in the network. What is the effect on UDP?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 247
If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a loopback
interface?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 248
Which security feature can you enable to control access to the vty lines on a router?
A. Exec-time out
B. Logging
C. Username and password
D. Transport output
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 249
Refer to exhibit. What is indicated by the show ip cef command for an address?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Glean adjacency in short when the router is directly connected to hosts the FIB table on the router will maintain a prefix for the subnet rather than for the
individual host prefix. This subnet prefix points to a GLEAN adjacency. Punt adjacency When packets to a destination prefix can't be CEF Switched, or the
feature is not supported in the CEF Switching path, the router will then use the next slower switching mechanism configured on the router.
QUESTION 250
Which two options are causes of out-of-order packets? (Choose two.)
A. A routing loop
B. A router in the packet flow path that is intermittently dropping packets
C. High latency
D. Packets in a flow traversing multiple paths through the network.
E. Some packets in a flow being process-switched and others being interrupt-switched on a transit Router
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In traditional packet forwarding systems, using different paths have varying latencies that cause out of order packets, eventually resulting in far lower
performance for the network application. Also, if some packets are process switched quickly by the routing engine of the router while others are interrupt
switched (which takes more time) then it could result in out of order packets. The other options would cause packet drops or latency, but not out of order
packets.
QUESTION 251
A network engineer applies the command ip tcp adjust-mss <bytes> under interface configuration mode. What is the result?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 252
Which two commands do you need to implement on the CALLING router to support the PPPoE client? (choose Two)
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Configuration at Client side (PPPoE Client):
interface Dialer 2
encapsulation ppp
ip address negotiated
ppp chap hostname TUT
ppp chap password MyPPPoE
ip mtu 1492
dialer pool 1
For the above we ca see that mtu and pppoe-client dialer-pool-number are commands to pppoe CLIENT
and
peer default ip address pool, bba-group pppoe, and pppoe enable group are commands to pppoe SERVER
QUESTION 253
Which two commands must you configure in the calling router to support the PPPoE client? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 254
Frame Relay LMI autosense. Which statements are true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
LMI autosense is active in the following situations:
-The router is powered up or the interface changes state to up.
-The line protocol is down but the line is up.
-The interface is a Frame Relay DTE.
-The LMI type is not explicitly configured.
QUESTION 255
Which value does Frame Relay use to identify a connection between a DTE and DCE?
A. DLCI
B. IP address
C. MAC address
D. VLAN ID
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 256
Which two statements about configuring Frame Relay point-to-multipoint connections are true? (Choose two)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 257
Which two statements about Frame Relay Point-to-Point connections are true? (Choose two.)
A. Changing a point-to-point sub interface to a different type requires the device to be reloaded.
B. They use two DLCIs to communicate with multiple endpoints over the Frame Relay cloud.
C. The device can establish a point-to-point connection to the cloud without a DLCI.
D. They can operate normally without a DLCI map.
E. Each physical interface that extends to the Frame Relay cloud can support a single SVC.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 258
Which DSL encapsulation method requires client software running on the end-user PC that is directly connected to a DSL modem?
A. PPPoA
B. PPPoE
C. PPP
D. L2TP
E. ATM
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 259
Which cisco Express Forwarding component maintains Layer 2 addressing information?
A. dCEF
B. Adjacency table
C. FIB
D. Fast switching
E. RIB
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Adjacency TablesNodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. In addition to the FIB, CEF
uses adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB entries.
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/switch/configuration/guide/fswtch_c/xcfcef.html
QUESTION 260
What configurations does PPPoE allow? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 261
What are characteristics of PAP and CHAP? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 262
What is the purpose of configuring the router as a PPPoE client? Select the best response.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 263
In which form does PAP authentication send the username and password across the link?
A. Encrypted
B. Password protected
C. Clear text
D. Hashed
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
(Password Authentication Protocol)
PAP
In this protocol, password is sent in clear text format that makes it less secure in comparison with CHAP.
Reference:
http://www.computernetworkingnotes.com/ccna-study-guide/ppp-protocol-and-encapsulation-method-explained.html
QUESTION 264
Which command configures a PPPoE client and specifies dial-on-demand routing functionality?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 265
Which command instruct a PPPoE client to obtain its IP address from the PPPoe server?
A. Interface dialer
B. IP address negotiated
C. PPPoE enable
D. IP address DHCP
E. IP address dynamic
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 266
Refer to the exhibit. Router 1 cannot ping router 2 via the Frame Relay between them.
Which two statements describe the problems? (Chooses two.)
A. Encapsulation is mismatched.
B. Frame Relay map is configured.
C. DLCI is active.
D. DLCI is inactive or deleted.
E. An access list is needed to allow ping
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Frame Relay: Cannot ping Remote Router:
1-Encapsulation mismatch has occurred.
2-DLCI is inactive or has been deleted.
3-DLCI is assigned to the wrong subinterface.
4-An access list was misconfigured.
5-The frame-relay map command is missing.
6-No broadcast keyword is found in frame-relay map statements.
QUESTION 267
How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?
A. Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic
C. Configure many subinterfaces in the same subnet.
D. Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If you have a serial port configured with multiple DLCIs connected to multiple remote sites, split horizon rules, stop route updates received on an interface
from being sent out the same interface. By creating subinterfaces for each PVC, you can avoid the split horizon issues when using Frame Relay.
http://www.indiabix.com/networking/wide-area-networks/015004
QUESTION 268
In which two ways can split horizon issues be overcome in a Frame Relay network environment? (Choose two.)
A. Configuring one physical serial interface with Frame Relay to various remote sites.
B. Configure a loopback interface with Frame Relay to various remote sites
C. Configuring multiple subinterfaces on a single physical interface to various remote sites.
D. Enabling split horizon.
E. Disabling split horizon.
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
1/ IP split horizon checking is disabled by default for Frame Relay encapsulation to allow routing updates to go in and out of the same interface. An exception
is the Enhanced Interior Gateway Routing Protocol (EIGRP) for which split horizon must be explicitly disabled. 2/Configuring Frame Relay subinterfaces
ensures that a single physical interface is treated as multiple virtual interfaces. This capability allows you to overcome split horizon rules so packets received
on one virtual interface can be forwarded to another virtual interface, even if they are configured on the same physical interface.
Reference:
http://www.cisco.com/c/en/us/support/docs/wan/frame-relay/14168-fr-faq.html
QUESTION 269
Your network consists of a large hub-and-spoke Frame Relay network with a CIR of 56 kb/s for each spoke.
Which statement about the selection of a dynamic protocol is true? Choose the best response.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
By default, EIGRP will limit itself to using no more than 50% of the interface bandwidth. The primary benefit of controlling EIGRP's bandwidth usage is to
avoid losing EIGRP packets, which could occur when EIGRP generates data faster than the interface line can absorb it. This is of particular benefit on Frame
Relay networks, where the access interface bandwidth and the PVC capacity may be very different.
QUESTION 270
A network engineer enables OSPF on a Frame Relay WAN connection to various remote sites, but no OSPF adjacencies come up.
Which two actions are possible solutions for this issue? (Choose two)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 271
Which of the following SNMPv2 uses for authentication?
A. HMAC-MD5
B. HMAC-SHA
C. CBC-DES
D. Community strings
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 272
Which statement about stateless and stateful IPv6 autoconfiguration are true?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Stateful autoconfiguration is the IPv6 equivalent of DHCP. A new protocol, called DHCPv6 (and based closely on DHCP), is used to pass out addressing and
service information in the same way that DHCP is used in IPv4. This is called “stateful” because the DHCP server and the client must both maintain state
information to keep addresses from conflicting, to handle leases, and to renew addresses over time.
Stateless Autoconfiguration allows an interface to automatically “lease” an IPv6 address and does not require the establishment of an server to delve out
address space. Stateless autoconfiguration allows a host to propose an address which will probably be unique (based on the network prefix and its Ethernet
MAC address) and propose its use on the network. Because no server has to approve the use of the address, or pass it out, stateless autoconfiguration is
simpler. This is the default mode of operation for most IPv6 systems, including servers
QUESTION 273
In IPv6, the interfaces running OSPF can be configured with multiple address prefixes. Which statement is true about the IPv6 addresses that can be
included into the OSPF process?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 274
What is true about peer groups? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 275
IP CEF load-sharing options (Choose three.)
A. Tunnel
B. Universal
C. Include-ports
D. Source
E. Destination
Explanation/Reference:
QUESTION 276
If you want to migrate an IS-IS network to another routing protocol with _____. (Choose two)
A. UDP
B. Internal BGP
C. TCP/IP
D. EIGRP
E. OSPF
F. RIP
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 277
Refer to the exhibit. In the network diagram, Area 1 is defined as a stub area. Because redistribution is not allowed in the stub area, EIGRP routes cannot be
propagated into the OSPF domain. How does defining area 1 as a not-so-stubby area (NSSA) make it possible to inject EIGRP routes into the OSPF NSSA
domain?
A. By creating type 5 LSAs
B. By creating type 7 LSAs
C. By creating a link between the EIGRP domain and the RIP domain, and redistributing EIGRP into RIP
D. By manually changing the routing metric of EIGRP so that it matches the routing metric of OSPF
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 278
What is a valid ipv6 multicast address?
A. FF02::2
B. FFFF::FF
C. FE80::FF
D. 0::/128
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 279
What attribute is used to influce traffic form AS200 and AS300 so that it uses link1 to reach AS100?
A. MED
B. AS_path
C. Weight
D. Local preference
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 280
What is true about EIGRP's redistributed static routes and summarized routes? (Choose two.)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 281
How route tags can be set? (Choose two.)
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 282
You have a router has some interface configured with 10Gb interface and giga interface.
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 283
RIPv2 uses _____________.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 284
RIPng ____________.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 285
Which are new LSA types in OSPF for IPv6 (OSPFv3)? (Choose two.)
A. LSA Type 8
B. LSA Type 9
C. LSA Type 10
D. LSA Type 12
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 286
Which of the below mentioned conditions form a neighbor relationship in EIGRP? (Choose three.)
QUESTION 287
A network engineer is disabling split horizon on a point-to-multipoint interface that is running RIPng. Under which configuration mode can split horizon be
disabled?
A. router(config-riping)#
B. router(config-rtr)#
C. router(config-if)#
D. router(config)#
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 288
A network engineer configures two connected routers to run OSPF in Area 0; however, the routers fail to establish adjacency. Which option is one of the
caused for this issue?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 289
Which item does EIGRP IPv6 require before it can start running?
A. Router ID
B. DHCP server
C. Subnet mask
D. Default gateway
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
http://www.ciscopress.com/articles/article.asp?p=2137516&seqNum=4
QUESTION 290
An EUI-64-bit address is formed by adding a reserved 16-bit value in which position of the Mac address?
A. Between the vendor OID and the NIC-specific part of the MAC address.
B. After the NIC-specific part of the MAC address.
C. Before the vendor OID part of the MAC address.
D. Anywhere in the Mac address, because the value that is added is reserved.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 291
An EUI-64 bit address is formed by inserting which 16-bit value into the MAC address of a device?
A. 3FFE
B. FFFE
C. FF02
D. 2001
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 292
Which IPV6 address type does RIPng use for next-hop addresses?
A. Anycast
B. Global
C. Multicas
D. Site-local
E. Link-local
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 293
Which type of message does a device configured with the eigrp stub command send in response to EIGRP queries?
A. Invalid request
B. Unavailable
C. Stuck in active
D. Stub-only
E. Reject
F. Inaccessible
Correct Answer: F
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote
router as a stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes,
redistributed static routes, external routes, and internal routes with the message "inaccessible." A router that is configured as a stub will send a special peer
information packet to all neighboring routers to report its status as a stub router.
QUESTION 294
Which two statements about route targets that are configured with VRF-Lite are true? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 295
Redistributing BGP into OSPF what statement is correct?
route-map deny 10
match ip address 10
route-map permit 20
access-list 10 permit 172.16.0.0 0.0.0.255
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 296
What is the output of the following command:
show ip vrf
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 297
What command would you use to set EIGRP routes to be prioritized?
A. Distance 100
B. Distance 89
C. Distance eigrp 100
D. Distance eigrp 89
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 298
A route map was configured and it was distributing OSPF external routes __________.
A. Distributing E1 only
B. Distributing E1 and E2 using prefix list
C. Distributing E1 and E2 using access list
D. Distributing E2 routes
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Access list is for traffic filtering & prefix list is for route filtering
QUESTION 299
Which routing protocol does DMVPN support? (Choose three.)
A. ISIS
B. RIP
C. EIGRP
D. OSPF
E. BGP
Explanation/Reference:
QUESTION 300
What is used in EIGRP metric calculation?
A. Maximum delay
B. Minimum delay
C. Average delay
D. Minimum interface bandwidth
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 301
Refer to the exhibit.
Routers R1 and R2 are IPv6 BGP peers that have been configured to support a neighbor relationship over an IPv4 internet work. Which three neighbor IP
addresses are valid choices to use in the highlighted section of the exhibit? (Choose three.)
A. ::0A43:0002
B. 0A43:0002::
C. ::10.67.0.2
D. 10.67.0.2::
E. 0:0:0:0:0:0:10.67.0.2
F. 10.67.0.2:0:0:0:0:0:0
Explanation/Reference:
Explanation:
The automatic tunneling mechanism uses a special type of IPv6 address, termed an "IPv4- compatible" address. An IPv4-compatible address is identified by
an all-zeros 96-bit prefix, and holds an IPv4 address in the low-order 32-bits. IPv4-compatible addresses are structured as follows:
QUESTION 302
Refer to the exhibit. Which command would verify if PBR reacts to packets sourced from 172.16.0.0/16?
A. show ip route
B. show policy-map
C. show access-lists
D. show route-map
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The "show route-map "route-map name" displays the policy routing match counts so we can learn if PBR reacts to packets sourced from 172.16.0.0/16 or
not.
QUESTION 303
What are three reasons to control routing updates via route filtering? (Choose three).
Explanation/Reference:
Explanation:
Route filtering hide certain networks from the rest of the organization and it also controls network overhead. Not only this, it also provides security to the
routing updates.
QUESTION 304
Refer to the exhibit. Based upon the configuration, you need to understand why the policy routing match counts are not increasing. Which would be the first
logical step to take?
A. Confirm if there are other problematic route-map statements that precede divert.
B. Check the access list for log hits.
C. Check the routing table for 212.50.185.126.
D. Remove any two of the set clauses. (Multiple set clause entries will cause PBR to use the routing table.)
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
First we should check the access-list log, if the hit count does not increase then no packets are matched the access-list -> the policy based routing match
counts will not increase.
QUESTION 305
Which statement describes the difference between a manually configured IPv6 in IPv4 tunnel versus an automatic 6to4 tunnel?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
An automatic 6to4 tunnel allows isolated IPv6 domains to be connected over an IPv4 network to remote IPv6 networks. The key difference between
automatic 6to4 tunnels and manually configured tunnels is that the tunnel is not point-to-point; it is point-to-multipoint -> it allows multiple IPv4 destinations.
Manually 6to4 is point-to-point -> only allows one IPv4 destination. Configuring 6to4 (manually and automatic) requires dual-stack routers (which supports
both IPv4 & IPv6) at the tunnel endpoints because they are border routers between IPv4 & IPv6 networks.
QUESTION 306
Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? (Choose two.)
A. Hosts can be configured to receive both IPv4 and IPv6 addresses via DHCP.
B. Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned
only.
C. IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not
provide a similar capability for hosts.
D. IPv4 and IPv6 addresses can be simultaneously assigned to a host but not to a router interface.
E. IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Like DHCP in IPv4, IPv6 hosts can also be configured to acquire connectivity parameters from DHCPv6 servers. IPv4 clients use DHCP broadcasts to locate
DHCP servers, and since broadcasts are extinct in IPv6, clients use specialized multicasts to locate DHCPv6 servers. These multicasts use the reserved
address FF02::1:2. One notable difference between DHCP and DHCPv6 is that while DHCP can inform clients which node to use as the default gateway,
DHCPv6 does not do this.
QUESTION 307
To enable BGP tunneling over an IPv4 backbone, the IPv4 address 192.168.30.1 is converted into a valid IPv6 address.
Which three IPv6 addresses are acceptable formats for the IPv4 address? (Choose three.)
A. 192.168.30.1:0:0:0:0:0:0
B. 0:0:0:0:0:0:192.168.30.1
C. ::192.168.30.1
D. C0A8:1E01::
E. 192.168.30.1::
F. ::C0A8:1E01
Explanation/Reference:
QUESTION 308
Which two among the following are used to indicate external type of route in routing table? (Choose two.)
A. D EX
B. IA
C. O E2
D. R E2
E. i L2
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 309
The OSPF which type of Router CAN BE aggregated? (Choose two.)
A. the ABR
B. the ASBR
C. Backbone Router
D. Intra Router
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 310
You need the IP address of the devices with which the router has established an adjacency. Also, the retransmit interval and the queue counts for the
adjacent routers need to be checked. What command will display the required information?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 311
You get a call from a network administrator who tells you that he typed the following into his router:
Router(config)#router ospf 1
Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 312
Which is an “invalid” option when redistributing from EIGRP into OSPF?
A. ACL
B. Tag
C. Metric
D. Route map
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 313
Engineer has to enable RIP on a link. Where he will issue the command?
A. Ipv6
B. Global
C. Router sub command
D. Interface subcommand
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 314
Which two BGP neighbor states are valid? (Choose two.)
A. Established
B. Active
C. Stuck in active
D. 2-WAY
E. Unknown
F. DROTHER
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 315
What does the show ip route vrf CISCO command display?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 316
Refer to Exhibit.
R1 is unable to ping interface S0/0 of R2.
What is the issue the configuration that is shown here?
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 317
Which LSA type can exist only in an OSPF NSSA area?
A. Type 7 LSA
B. Type 1 LSA
C. Type 5 LSA
D. Type 3 LSA
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 318
Which option describes why the EIGRP neighbors of this router are not learning routes that are received from OSPF?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 319
What is the hop count that is advertised for an unreachable network by a RIP router that uses poison reverse?
A. 15
B. 255
C. 0
D. 16
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 320
By default, which statement is correct regarding the redistribution of routes from other routing protocols into OSPF? Select the best response.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Type E1 external routes calculate the cost by adding the external cost to the internal cost of each link that the packet crosses while the external cost of E2
packet routes is always the external cost only. E2 is useful if you do not want internal routing to determine the path. E1 is useful when internal routing should
be included in path selection. E2 is the default external metric when redistributing routes from other routing protocols into OSPF.
QUESTION 321
Which authentication methods are EIGRP uses?
A. sha
B. md5
C. xda
D. chap
E. cisco
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 322
Which statement about local policy routing is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 323
What appears in the other router routing table?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 324
Which three configuration parameters can a DHCPV6 pool contain? (Choose three.)
Explanation/Reference:
Explanation:
Each configuration pool can contain the following configuration parameters and operational information:
-Prefix delegation information, which includes:
-A prefix pool name and associated preferred and valid lifetimes
-A list of available prefixes for a particular client and associated preferred and valid lifetimes
-A list of IPv6 addresses of DNS servers
-A domain search list, which is a string containing domain names for the DNS resolution
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book/ip6-dhcp-prefix-xe.pdf
QUESTION 325
What are two BGP neigborship states? (Choose two.)
A. Full
B. Open Sent
C. 2WAY
D. Connect
E. DROTHER
F. Stuck in active
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 326
What is the effect of the following two commands? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 327
Which access list entry checks for an ACK within a packet TCP header?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 328
Which TCP port for BGP?
A. port 161
B. port 123
C. port 179
D. port 47
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 329
Which type of access list allows granular session filtering for upper-level protocols?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 330
Which two options are requirements for EIGRP authentication? (Choose two.)
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 331
Which command prevents routers from sending routing updates through a router interface?
A. default-metric 0
B. distribute-list in
C. passive-interface
D. distribute-list out
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
To prevent routing updates through a specified interface, use the passive-interface type number command in router configuration mode.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_pi/configuration/xe-3s/iri-xe-3s-book/iri-default-passive-interface.html
QUESTION 332
Which three options are valid DHCPv6 functions? (Choose three.)
A. Server
B. Client
C. Approver
D. Requester
E. Repeater
F. ACK
G. Relay
Explanation/Reference:
QUESTION 333
Refer to the exhibit. A network engineer executes the show ipv6 ospf database command and is presented with the output that is shown.
A. Link-local
B. Area
C. As (OSPF domain)
D. Reserved
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 334
Which ospf area prevent LSA type 4, LSA type 5? (Choose two.)
A. Not so stubby
B. Total stubby
C. Stubby area
D. Totally Not-So-Stubby Area
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Tottaly NSSA and NSSA convert LSA 7 into LSA 5 so in this case LSA 5 is permitting
Tottaly Stub and Stub DO NOT allow LSA 4,5 instead they inject default route
Reference:
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13703-8.html#anc2
QUESTION 335
Which type of address does OSPFv3 use to form neighbor adjacencies and to send LSAs?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 336
What following parameters for the EIGRP authentication need to match in order for EIGRP neighbors to establish a neighbor relationship?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 337
Which value does GRE tunnel use to identify the end points or destination?
A. IP address
B. MAC address
C. DLCI
D. Tunnel
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
For Frame Relay the answer would be DLCI but here it is asking about GRE tunnel so the best choice here is “IP address”.
QUESTION 338
FILL BLANK
What is the function of the command redistribute ospf 1 match internal?
Correct Answer: Redistribute ospf 1 match internal means that just inter and intra will be redistributed
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Router(config-router)#redistribute ospf 1 match internal external 1 external 2
Redistributes routes learned from OSPF process ID 1. The keywords match internal external 1 and external 2 instruct EIGRP to only redistribute internal,
external type 1 and type 2 OSPF routes.
NOTE: The default behavior when redistributing OSPF routes is to redistribute all routes—internal, external 1, and external 2. The keywords match internal
external 1 and external 2 are required only if router behavior is to be modified.
QUESTION 339
Which the Valid range for BGP private ASNs?
A. 64512-65535
B. 62464-65024
C. 64512-65024
D. 62464-64511
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 340
OSPF chooses routes in which order, regardless of route's administrative distance and metric? (Choose all that apply.)
A. Intra-Area (O)
B. Inter-Area (O IA)
C. External Type 1 (E1)
D. External Type 2 (E2)
E. NSSA Type 1 (N1)
F. NSSA Type 2 (N2)
Explanation/Reference:
Explanation:
Regardless of a route’s metric or administrative distance, OSPF will choose routes in the following order:
Intra-Area (O)
Inter-Area (O IA)
External Type 1 (E1)
External Type 2 (E2)
NSSA Type 1 (N1)
NSSA Type 2 (N2)
QUESTION 341
When ospf is forming an adjacency, in which state does the actual exchange of information in the link-state database occur?
A. INIT
B. Loading
C. Exstart
D. Exchange
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Down
This is the first OSPF neighbor state. It means that no information (hellos) has been received from this neighbor, but hello packets can still be sent to the
neighbor in this state.
During the fully adjacent neighbor state, if a router doesn't receive hello packet from a neighbor within the RouterDeadInterval time (RouterDeadInterval =
4*HelloInterval by default) or if the manually configured neighbor is being removed from the configuration, then the neighbor state changes from Full to Down.
Attempt
This state is only valid for manually configured neighbors in an NBMA environment. In Attempt state, the router sends unicast hello packets every poll interval
to the neighbor, from which hellos have not been received within the dead interval.
Init
This state specifies that the router has received a hello packet from its neighbor, but the receiving router's ID was not included in the hello packet. When a
router receives a hello packet from a neighbor, it should list the sender's router ID in its hello packet as an acknowledgment that it received a valid hello
packet.
2-Way
This state designates that bi-directional communication has been established between two routers. Bi-directional means that each router has seen the other's
hello packet. This state is attained when the router receiving the hello packet sees its own Router ID within the received hello packet's neighbor field. At this
state, a router decides whether to become adjacent with this neighbor. On broadcast media and non-broadcast multiaccess networks, a router becomes full
only with the designated router (DR) and the backup designated router (BDR); it stays in the 2-way state with all other neighbors. On Point-to-point and Point-
to-multipoint networks, a router becomes full with all connected routers.
At the end of this stage, the DR and BDR for broadcast and non-broadcast multi-acess networks are elected. For more information on the DR election
process, refer to DR Election.
Note: Receiving a Database Descriptor (DBD) packet from a neighbor in the init state will also a cause a transition to 2-way state.
Exstart
Once the DR and BDR are elected, the actual process of exchanging link state information can start between the routers and their DR and BDR.
In this state, the routers and their DR and BDR establish a master-slave relationship and choose the initial sequence number for adjacency formation. The
router with the higher router ID becomes the master and starts the exchange, and as such, is the only router that can increment the sequence number. Note
that one would logically conclude that the DR/BDR with the highest router ID will become the master during this process of master-slave relation. Remember
that the DR/BDR election might be purely by virtue of a higher priority configured on the router instead of highest router ID. Thus, it is possible that a DR plays
the role of slave. And also note that master/slave election is on a per-neighbor basis.
Exchange
In the exchange state, OSPF routers exchange database descriptor (DBD) packets. Database descriptors contain link-state advertisement (LSA) headers
only and describe the contents of the entire link-state database. Each DBD packet has a sequence number which can be incremented only by master which
is explicitly acknowledged by slave. Routers also send link-state request packets and link-state update packets (which contain the entire LSA) in this state.
The contents of the DBD received are compared to the information contained in the routers link-state database to check if new or more current link-state
information is available with the neighbor.
Loading
In this state, the actual exchange of link state information occurs. Based on the information provided by the DBDs, routers send link-state request packets.
The neighbor then provides the requested link-state information in link-state update packets. During the adjacency, if a router receives an outdated or
missing LSA, it requests that LSA by sending a link-state request packet. All link-state update packets are acknowledged.
Full
In this state, routers are fully adjacent with each other. All the router and network LSAs are exchanged and the routers' databases are fully synchronized.
Full is the normal state for an OSPF router. If a router is stuck in another state, it is an indication that there are problems in forming adjacencies. The only
exception to this is the 2-way state, which is normal in a broadcast network. Routers achieve the FULL state with their DR and BDR in NBMA/broadcast
media and FULL state with every neighbor in the remaining media such as point-to-point and point-to-multipoint.
Note: The DR and BDR that achieve FULL state with every router on the segment will display FULL/DROTHER when you enter the show ip ospf neighbor
command on either a DR or BDR. This simply means that the neighbor is not a DR or BDR, but since the router on which the command was entered is either
a DR or BDR, this shows the neighbor as FULL/DROTHER.
QUESTION 342
Using new backup router in spite of faulty one in ospf domain but relationship with neighbor in one interface only not working, what is the reason of this
problem? (Choose two)
A. area Id match
B. authentication mismatch
C. process id of ospf not match
D. ospf timers not match
E. MTU mismatch
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 343
Which two statements are true of the OSPF link-state routing protocol? (Choose two.)
A. Using the Bellman-Ford algorithm, each OSPF router independently calculates its best paths to all destinations in the network.
B. Using the DUAL algorithm, each OSPF router independently calculates its best paths to all destinations in the network.
C. OSPF sends summaries of individual link-state entries every 30 minutes to ensure LSDB synchronization.
D. OSPF sends triggered updates when a network change occurs.
E. OSPF sends updates every 10 seconds.
F. When a link changes state, the router that detected the change creates a link-state advertisement (LSA) and propagates it to all OSPF devices using the
224.0.0.6 multicast address.
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The point of this question is the basis of OSPF.
Incorrect answer A. OSPF send hello packets every 10 seconds, not the updates, OSPF sends triggered updates when a network change occurs. For OSPF,
D Rother use the multicast address 224.0.0.6 to send packets to DR and BDR, only DR and BDR can get the information from this multicast address.
QUESTION 344
What type of IPv6 packet will indicate traffic from single host and single node?
A. Multicast
B. Unicast
C. Broadcast
D. Anycast
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
IPv6 has three types of addresses, which can be categorized by type and scope:
Unicast addresses. A packet is delivered to one interface Multicast addresses. A packet is delivered to multiple interfaces. Anycast addresses. A packet is
delivered to the nearest of multiple interfaces (in terms of routing distance).
QUESTION 345
A network administrator notices that the BGP state drops and logs are generated for missing BGP hello keepalives. What is the potential problem?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
BGP neighbors form; however, at the time of prefix exchange, the BGP state drops and the logs generate missing BGP hello keepalives or the other peer
terminates the session.
Here are some possible causes:
*The interface MTU on both routers do not match.
*The interface MTU on both routers match, but the Layer 2 domain over which the BGP session is formed does not match.
*Path MTU discovery determined the incorrect max datasize for the TCP BGP session. *The BGP Path Maximum Transmission Unit Discovery (PMTUD)
could be failing due to PMTUD ICMP packets blocked (firewall or ACL)
http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116377-troubleshoot-bgp-mtu.html
QUESTION 346
Which BGP option is required when load sharing over multiple equal-bandwidth parallel links from a single CE router to a single ISP router over eBGP?
Select the best response.
A. eBGP Multipath
B. eBGP Multihop
C. BGP Synchronization
D. Public AS numbers
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 347
During a recent OSPF election among three routers, RTA was elected the DR and RTB was elected the BDR, as seen in the graphic. Assume that RTA fails,
and that RTB takes the place of the DR while RTC becomes the new BDR. What will happen when RTA comes back online?
A. RTA will take the place of DR immediately upon establishing its adjacencies
B. RTA will take the place of DR only if RTB fails.
C. RTA will take the place of DR only if both RTB and RTC fail.
D. A new election will take place establishing an all new DR and BDR based on configured priority levels and MAC addresses.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If a router with a higher priority value gets added to the network, it does not preempt the DR and BDR. The only time a DR and BDR changes is if one of
them is out of service. If the DR is out of service, the BDR becomes the DR, and a new BDR is selected. If the BDR is out of service, a new BDR is elected.
In a multi-access network, the router that is powered on first will generally become the DR, since the DR/BDR process is not pre-emptive.
QUESTION 348
What is the IPv6 address FF02::2 used for? Select the best response.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
To identify all nodes for the node-local and link-local scopes, the following multicast addresses are defined:
· FF01::1 (node-local scope all-nodes address)
· FF02::1 (link-local scope all-nodes address)
To identify all routers for the node-local, link-local, and site-local scopes, the following multicast addresses are defined:
· FF01::2 (node-local scope all-routers address)
· FF02::2 (link-local scope all-routers address)
· FF05::2 (site-local scope all-routers address)
QUESTION 349
When an IPv6 enabled host boots, it sends a router solicitation (RS) message. An IPv6 router responds with a router advertisement (RA). Which two items
are contained in the RA? (Choose two.)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In IP Version 6, Router Advertisements have the following attributes:
QUESTION 350
Refer to the exhibit. EIGRP is configured on all routers in the network. On a basis of the show ip eigrp topology output provided, what conclusion can be
derived? Select the best response.
A. Router R1 can send traffic destined for network 10.6.1.0/24 out of interface FastEthernet0/0.
B. Router R1 is waiting for a reply from the neighbor 10.1.2.1 to the hello message sent out before it declares the neighbor unreachable.
C. Router R1 is waiting for a reply from the neighbor 10.1.2.1 to the hello message sent out inquiring for a second successor to network 10.6.1.0/24.
D. Router R1 is waiting for a reply from the neighbor 10.1.2.1 in response to the query sent out about network 10.6.1.0/24.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 351
An administrator types in the command router ospf 1 and receives the error message:
What should be done to correctly set up OSPF? Select the best response.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 352
The following exhibit shows ipv6 route output. What would the metric be for a summary route that summarizes all three OSPFv3 routes displayed?
A. 160
B. 140
C. 120
D. 100
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 353
The Dev-1 and Dev-3 routers are OSPF neighbors over the Ethernet 0/0 connection. Based on the show ip ospf neighbor output from the Dev-1 and Dev-3
routers, which statement is true? Select the best response.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 354
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map? (Choose three.)
A. The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set.
B. The map prohibits the redistribution of all type 2 external OSPF routes.
C. The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values 40000, 1000, 255, 1, and 1500.
D. The map prohibits the redistribution of all external OSPF routes with tag 6 set.
E. All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8.
F. The map permits the redistribution of all type 1 external OSPF routes.
Explanation/Reference:
Explanation:
In the route-map:
The deny clause rejects route matches from redistribution. If several match commands are present in a clause, all must succeed for a given route in order for
that route to match the clause (in other words, the logical AND algorithm is applied for multiple match commands). In this question, both the “match tag 6”
and “match route-type external type-2” must be matched for this route to be denied -> A is correct.
If a match command is not present, all routes match the clause. In this question, all routes that reach clause 30 match and their tags are set to 8 -> E is
correct.
If a route is not matched with clause 10 or 20 then it will be matched with clause 30 for sure -> F is correct.
Option C is incorrect because it says the route will be redistributed if it matches the prefix-list pfx AND the metric values. This is not true.
The route-map statement 20 SETS the seed metric for the prefixes identified by the prefix-list pfx. So the statement in option C is missing the "SET" keyword.
Option F is correct because the only deny statement in route-map is statement 10 which only denies Type-2 External routes that have a tag value of 6. This
means all Type-1 External routes will be redistributed because they will match either permit statement 20 or 30.
Note: Route-maps that are applied to redistribution behave the same way as ACLs: if the route does not match any clause in a route-map then the route
redistribution is denied, as if the route-map contained deny statement at the end.
Reference:
http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008047915d.shtml
QUESTION 355
Which IPv4-mapped IPv6 address is equivalent to IPv6 address ::ffff:AC11:AC11? Choose the best response.
A. ::ffff:10.12.10.12
B. ::ffff:10.14.10.14
C. ::ffff44.49.44.49
D. ::ffff161.193.161.193
E. ::ffff 172.17.172.17
F. ::ffff193.11.193.11
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 356
What are three key concepts that apply when configuring the EIGRP stub routing feature in a hub and spoke network? (Choose three.)
A. A hub router prevents routes from being advertised to the remote router.
B. Only remote routers are configured as stubs.
C. Stub routers are not queried for routes.
D. Spoke routers connected to hub routers answer the route queries for the stub router.
E. A stub router should have only EIGRP hub routers as neighbors.
F. EIGRP stub routing should be used on hub routers only.
Explanation/Reference:
QUESTION 357
What is the difference between the IPv6 addresses ::/0 and ::/128? Choose the best response.
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 358
Which statement is true about IPv6? Choose the best response.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 359
Using the rules for IPv6 addressing, how can the address 2031:0000:240F:0000:0000:09C0:123A:121B be rewritten? Select the best response.
A. 2031:0:240F::09C0:123A:121B
B. 2031::240F::09C0:123A:121B
C. 2031::240F:9C0::123A:121B
D. 2031::240F:::09C0:123A:121B
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Leading zeros can be truncated.
For example "0000" can be be just written as empty. In the above example :: indicates that it has multiple 0's in that location.
Typically the IPv6 format can be written down in three ways 1) compressed, 2) uncompressed and 3) fully uncompressed as shown below. All of the following
are the same:
QUESTION 360
Which statement is true about EBGP? Select the best response.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 361
Which three are characteristics of IPv6? (Choose three.)
Explanation/Reference:
Explanation:
All IPv6 addresses are 128 bits long to accommodate a far larger number of stations than what was possible with the 32 bit IPv4 addresses.
The following displays the IPv6 header field in detail:
IPv6 header:
QUESTION 362
Instructions:
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on icon or the tab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Topology:
Areas of Router 5 and Router 6 are not normal areas. Which statement is true based on their routing tables?
A. R5’s Loopback and R6’s Loopback are both present in R5’s Routing table.
B. R5’s Loopback and R6’s Loopback are both present in R6’s Routing table.
C. Only R5’s Loopback is present in R5’s Routing table.
D. Only R6’s Loopback is present in R5’s Routing table.
E. Only R5’s Loopback is present in R6’s Routing table.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Here are the routing tables of R5 and R6:
QUESTION 363
Refer to the exhibit.
EIGRP has been configured on all routers in the network. What additional configuration statement should be included on router R4 to advertise a default
route to its neighbors?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The “ip default-network ” command will direct other routers to send its unknown traffic to this network. Other router (R1,R2,R3) will indicate this network as
the “Gateway of last resort”.
There is another way to route unknown traffic to 10.1.1.0/24 network: create a static route using “ip route 0.0.0.0 0.0.0.0 10.1.1.2” command then inject this
route using the “network 0.0.0.0” command, or using “redistribute static” command.
Note: In EIGRP, default routes cannot be directly injected (as they can in OSPF with the default-information originate command. Also, EIGRP does not have
the “default-information originate” command).
QUESTION 364
Which two statements are true about 6to4 tunnels? (Choose two.)
A. In a 6to4 tunnel, the first two bytes of the IPv6 address will be 2002 and the next four bytes will be the hexadecimal equivalent of the IPv4 address.
B. In a 6to4 tunnel, the first two bytes of the IPv6 address will be locally derived and the next two bytes will be the hexadecimal equivalent of the IPv4
address.
C. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/48 IPv6 address.
D. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/16 IPv6 address.
E. In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:1315:4463:1::/64 IPv6 address.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In a 6to4 tunnel, the first two bytes of the IPv6 address will be 0x2002 and the next four bytes will be the hexadecimal equivalent of the IPv4 address. The
IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/48 IPv6 address.
QUESTION 365
What does the command clear ipv6 ospf process accomplish? Select the best response.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The command "clear ipv6 ospf" will clear the present routing table and force the OSPFv3 process to build a new one. This command is often used when
something in the network was changed or for debugging purpose.
When the "process" keyword is added, which means "clear ipv6 ospf process", the OSPF database is cleared and repopulated then the SPF algorithm is
performed.
QUESTION 366
When implementing OSPFv3, which statement describes the configuration of OSPF areas? Select the best response.
A. In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B. In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C. In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D. In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 367
How is authentication handled with OSPFv3? Select the best response.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 368
You have implemented mutual route redistribution between OSPF and EIGRP on a border router. When checking the routing table on one of the OSPF
routers within the OSPF routing domain, you are seeing some, but not all of the expected routes. Which two things should you verify to troubleshoot this
problem? (Choose two.)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
We are checking the routing table on EIGRP routers not OSPF so we don’t need to check the seed metric for OSPF. Besides OSPF doesn’t need to specify
seed metric as all external routes get a default metric of 20 (except for BGP, which is 1) -> A is not correct.
We must specify seed metrics when redistributing into EIGRP (and RIP). If not all the redistributed routes will not be seen but the question says only some
routes are missing -> B is not correct.
The default administrative distance for external routes redistributed into EIGRP is 170 so we don’t need to set it -> C is not correct.
We should check the routing table of the border router to see the missing OSPF routes are there or not. An incorrect distribute-list can block some routes and
we can’t see it in other EIGRP routers -> D is correct.
--------------------------------------------------------
Answer D is obvious that we should check all the routes we want to redistribute are present in the routing table of the border router. Let’s discuss about
answer E.
A rule of thumb when redistributing into OSPF is we should always include the “subnets” keyword after the redistributed route. For example:
router ospf 1
redistribute eigrp 100 subnets
This keyword makes sure all of the routes, including subnets are redistributed correctly into OSPF. For example these routes are learned via EIGRP:
+ 192.168.1.0/24
+ 192.168.2.0/25
+ 192.168.3.0/26
Then without the keyword “subnets”, only 192.168.1.0/24 network is redistributed into OSPF.
QUESTION 369
Which three restrictions apply to OSPF stub areas? (Choose three)
Explanation/Reference:
QUESTION 370
What is EIGRP Summary Route Administrative Distance?
A. 90
B. 170
C. 5
D. 110
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 371
What is the NHRP role in DMVPN? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 372
How does an EVN provide end-to-end virtualization and separation of data traffic from multiple networks?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 373
Which two statements about EVNs are true? (Choose two.)
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 374
Which two protocols are required for DMVPN? (Choose two.)
A. IPsec
B. PPTP
C. mGRE
D. NHRP
E. Open VPN
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
IPsec in DMVPN is Optional
required are mGRE and NHRP
DMVPN combines multiple GRE (mGRE) Tunnels, IPSec encryption and NHRP (Next Hop Resolution Protocol) to perform its job and save the administrator
the need to define multiple static crypto maps and dynamic discovery of tunnel endpoints.
QUESTION 375
A network administrator uses GRE over IPSec to connect two branches together via VPN tunnel. Which one of the following is the reason for using GRE over
IPSec?
A. GRE over IPSec provides better QoS mechanism and is faster than other WAN technologies
B. GRE over IPSec decreases the overhead of the header.
C. GRE supports use of routing protocol, while IPSec supports encryption.
D. GRE supports encryption, while IPSec supports use of routing protocol.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Following are the management protocols that the MPP feature supports.
These management protocols are also the only protocols affected when MPP is enabled.
QUESTION 376
Which statement is true about an IPsec/GRE tunnel?
A. The GRE tunnel source and destination addresses are specified within the IPsec transform set.
B. An IPsec/GRE tunnel must use IPsec tunnel mode.
C. GRE encapsulation occurs before the IPsec encryption process.
D. Crypto map ACL is not needed to match which traffic will be protected.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 377
For a GRE tunnel to be up between two routers, which of the following must be configured?
A. Loopback Interface
B. IP reachability between the loopback interfaces
C. Dynamic Routing between routers.
D. Tunnel interfaces must be in the same subnet.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 378
Which values identifies VPNs in an EVN environment?
A. DLCI
B. Route target
C. Virtual network tag
D. VLAN ID
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/layer-3-vpns-l3vpn/whitepaper_c11-638769.html
QUESTION 379
What are the four main steps in configuring a GRE tunnel over IPsec on Cisco routers? (Choose four.)
A. Configure a physical interface or create a loopback interface to use as the tunnel endpoint.
B. Create the GRE tunnel interfaces.
C. Add the tunnel interfaces to the routing process so that it exchanges routing updates across that interface.
D. Add the tunnel subnet to the routing process so that it exchanges routing updates across that interface.
E. Add all subnets to the crypto access-list, so that IPsec encrypts the GRE tunnel traffic.
F. Add GRE traffic to the crypto access-list, so that IPsec encrypts the GRE tunnel traffic.
Explanation/Reference:
Explanation:
Four steps to configure GRE tunnel over IPsec are:
1. Create a physical or loopback interface to use as the tunnel endpoint. Using a loopback rather than a physical interface adds stability to the configuration.
2. Create the GRE tunnel interfaces.
3. Add the tunnel subnet to the routing process so that it exchanges routing updates across that interface.
4. Add GRE traffic to the crypto access list, so that IPsec encrypts the GRE tunnel traffic.
interface Tunnel0
ip address 192.168.16.2 255.255.255.0
tunnel source FastEthernet1/0
tunnel destination 14.38.88.10
tunnel mode gre ip
Note: The last command is enabled by default so we can ignore it in the configuration)
QUESTION 380
Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The address of the crypto isakmp key should be 192.168.1.2, not 172.16.1.2 -> A is correct.
QUESTION 381
Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The access-list must also support GRE traffic with the “access-list 102 permit gre host 192.168.1.1 host 192.168.2.1” command -> B is correct.
Below is the correct configuration for GRE over IPsec on router B1 along with descriptions.
QUESTION 382
Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The “tunnel destination” in interface tunnel should be 192.168.1.2, not 172.16.1.2 -> D is correct.
QUESTION 383
Refer to exhibit. A user calls from another branch office with a request to establish a simple VPN tunnel to test a new router's tunneling capability Based on
the configuration in the exhibit, which type of tunnel was configured?
A. PPTP
B. IPsec site-to-site
C. 6to4
D. EZVPN
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 384
What two features are benefits of using GRE tunnels with IPsec over using an IPsec tunnel alone in building-to-building site-to-site VPNs? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
A drawback of IPSec is it does not support multicast traffic. But most popular routing protocols nowadays rely on multicast (like OSPF, EIGRP, RIP… except
BGP) to send their routing updates. A popular solution to this is using GRE tunnels. GRE tunnels do support transporting IP multicast and broadcast packets
to the other end of the GRE tunnel -> A is correct.
Non-IP traffic (such as IPX, AppleTalk) can be wrapped inside GRE encapsulation and then this packet is subjected to IPSec encapsulation so all traffic can
be routed -> D is correct.
QUESTION 385
Which of the following is a GRE Tunnel characteristic?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If you run an IPsec tunnel through a GRE tunnel, then we call it as "IPsec over GRE"
QUESTION 386
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for
an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to
the packet?
A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel gre acl command under the incoming interface
B. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interface
C. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interface
D. When permitted by an ACL that was referenced in the associated crypto map
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
As for the correct answer: the process of routing a packet out a GRE tunnel interface triggers the GRE encapsulation action.
As for the incorrect answers: There is no tunnel gre acl command. There is no IPsec tunnel interface. Finally, one answer refers to logic that would describe a
router's logic when determining whether to encapsulate a packet into an IPsec tunnel.
QUESTION 387
What is a key benefit of using a GRE tunnel to provide connectivity between branch offices and headquarters?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Generic routing encapsulation. Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating
a virtual point-to-point link to Cisco routers at remote points over an IP internetwork.
QUESTION 388
Which two statement about GRE tunnel interface are true? (Choose two.)
A. A tunnel can be established when a source the source interface is in the up/down state
B. A tunnel Destination must be Routable, but it can be unreachable
C. To establish a tunnel the source interface must be a loopback
D. To Establish a tunnel the source interface must be up/up state
E. A tunnel destination must be a physical interface that is on up/up state
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/118361-technote-gre-00.html
QUESTION 389
Which two statements about EVN are true? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 390
A network engineer recently deployed Easy Virtual Networking in the enterprise network.
Which feature improves shared services support?
A. Route replication
B. Edge interfacing
C. Tunnel feedback
D. Route distinguishers
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Route Replication. It allows shared services between VRF in a more powerful way than BGP. It allows routes to be shared between the Global route table
and other VRFs without limitations. BGP can only share 5 VRFs with 1000 routes per VRF in this situation.
QUESTION 391
Which two phases of DMVPN allow to spoke sites to create dynamic tunnels to one another? (Choose two.)
A. Phase1
B. Phase 2
C. Phase 3
D. Phase 4
E. Phase 5
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 392
Which two GRE features can you configure to prevent fragmentation? (Choose two.)
A. TCP MSS
B. DF Bit Clear
C. IP MTU
D. PMTUD
E. MTU ignore
F. UDP windows sizes
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/25885-pmtud-ipfrag.html
QUESTION 393
When the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true?
A. The router must have a route installed towards the tunnel destination
B. The router must have wccp redirects enabled inbound from the tunnel destination
C. The router must have cisco discovery protocol enabled on the tunnel to form a CDP neigborship with the tunnel destination
D. The router must have redirects enabled outbound towards the tunnel destination
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 394
One of the AAA Authentication PPP Methods if PAP used ____.
A. krb5
B. ssl
C. transliteration methods
D. UPN
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Uses Kerberos 5 for authentication (can only be used for PAP authentication)
QUESTION 395
What to configure on routes if TACACS+ authentication fails? (Choose two.)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
device(config)#enable telnet authentication
device(config)#aaa authentication login default tacacs local
The commands above cause TACACS/TACACS+ to be the primary authentication method for securing Telnet/SSH access to the CLI. If TACACS/TACACS+
authentication fails due to an error with the server, authentication is performed using local user accounts instead.
Reference:
http://www.brocade.com/content/html/en/configuration-guide/FI_08030_SECURITY/GUID-162894DA-A189-4A10-AE28-BD31214D62BA.html
QUESTION 396
Which two statements about password-protecting device access are true? (Choose two.)
A. The more system: running-config command displays encrypted passwords in clear text
B. The service password-encryption command forces a remote device to encrypt the password before transmitting it
C. A network administrator can recover an encrypted password
D. The privilege level command controls the commands a specific user can execute
E. The password can be encrypted in the running configuration
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 397
What is the minimum privilege level to enter all commands in user mode?
A. Level14
B. Level0
C. Level1
D. Level15
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 398
Instructions:
- Enter IOS commands on the device to verify network operation and answer for multiple-choice questions.
- THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
- Click on icon or the tab at the bottom of the screen to gain access to the console for each device.
- No console or enable passwords are required.
- To access the multiple-choice questions, click on the numbered boxes on the left of the top panel.
- There are four multiple-choice questions with this task. Be sure to answer all four questions before selecting the Next button.
Scenario
You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has
disabled your access to the show running-config command.
Topology:
How many times was SPF algorithm executed on R4 for Area 1?
A. 1
B. 5
C. 9
D. 20
E. 54
F. 224
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
This can be found using the “show ip ospf” command on R4. Look for the Area 1 stats which shows this:
QUESTION 399
The Cisco SA 500 Series Security Appliances are built specifically for businesses with less than 100 employees. What are three important benefits of this
device? (Choose three.)
A. Business-grade firewall
B. Premium support via SMART net
C. Site-to-site VPN for remote offices
D. Cisco IOS software-based
E. Email security
F. XML support
QUESTION 400
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The Dynamic Multipoint VPN (DMVPN) feature allows users to better scale large and small IPSec VPNs by combining generic routing encapsulation (GRE)
tunnels, IPSec encryption, and Next Hop Resolution Protocol (NHRP) to provide users with easy configuration through crypto profiles, which override the
requirement for defining static crypto maps, and dynamic discovery of tunnel endpoints.
The use of VTI greatly simplifies the configuration process when you need to configure IPsec. A major benefit associated with IPsec VTIs is that the
configuration does not require a static mapping of IPsec sessions to a physical interface.
Reference:
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008014bcd7.shtml
QUESTION 401
What is the command to enable IPv6 access list?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 402
When unicast reverse path forwarding is configured on an interface, which action does the interface take first when it receives a packet?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 403
What are 2 protocols used for user with authentication on network device?
A. CHAP
B. Radius
C. 802.1x
D. PAP
E. TACACS+
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 404
Other than a working EIGRP configuration, which components must be the same on all routers for EIGRP authentication key rollover to work correctly?
A. SMTP
B. time
C. SNMP
D. passwords
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 405
Which of the following are characteristics of TACACS+? (Choose two.)
A. Uses UDP
B. Encrypts an entire packet
C. Offers robust accounting
D. Cisco-proprietary
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
CHARACTERISTICS O TACACS+
1-TACACS+ encrypts the entire body of the packet
2- TACACS+ uses TCP
3-TACACS+ uses the AAA architecture, which separates AAA 4-TACACS+ offers multiprotocol support.
5-TACACS+ is Cisco proprietary protocol
6-TACACS+ is a heavy-weight protocol consuming more resources 7-TACACS+ uses TCP port 8-Mainly used for Device Administration
9-TACACS+ supports 15 privilege levels
Reference:
http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html
QUESTION 406
Which command sequence can you enter a router to configure Unicast Reverse Path Forwarding in loose mode?
A. interface GigabitEthernet0/0
ip verify unicast source reachable-via loose.
B. interface GigabitEthernet0/0
ip verify unicast source reachable-via all.
C. interface GigabitEthernet0/0
ip verify unicast source reachable-via any.
D. interface GigabitEthernet0/0
ip verify unicast source reachable-via rx.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 407
Which mode of uRPF causes a router interface to accept a packet, if the network to which the packet's source IP address belongs is found in the router's
FIB?
A. Strict mode
B. Loose mode
C. Auto mode
D. Desirable mode
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
A number of common types of DoS attacks take advantage of forged or rapidly changing source IP addresses, allowing attackers to thwart efforts by ISPs to
locate or filter these attacks. Unicast RPF was originally created to help mitigate such attacks by providing an automated, scalable mechanism to implement
the Internet Engineering Task Force (IETF) Best Common Practices 38/Request for Comments 2827 (BCP 38/RFC 2827) anti-spoofing filtering on the
customer-to- ISP network edge. By taking advantage of the information stored in the Forwarding Information Base (FIB) that is created by the Unicast RPF
can determine whether IP packets are spoofed or malformed by CEF switching process matching the IP source address and ingress interface against the
FIB entry that reaches back to this source (a so-called reverse lookup). Packets that are received from one of the best reverse path routes back out of the
same interface are forwarded as normal. If there is no reverse path route on the same interface from which the packet was received, it might mean that the
source address was modified, and the packet is dropped (by default).
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_urpf/configuration/xe-3s/sec-data-urpf-xe-3s-book/sec-unicast-rpf-loose-mode.html?
referring_site=RE&pos=1&page=http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/srpf_gsr.html#GUID-FFFA94D5-EEFB-4215-9EE1-
DB37CD01C2CA
QUESTION 408
Which access list used to filter upper layer protocol?
A. Extended acl
B. Standart acl
C. Reflexive acl
D. Time based acl
E. Dynamic acl
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Remember the three Ps Per protocol, Per direction, and Per interface
One ACL per protocol- To control traffic flow on an interface an ACL must be defined for each protocol enabled on the interface (example IP, IPX, AppleTalk)
One ACL per direction- ACLs control traffic in one direction at one time on an interface. You must create two separate ACLs to control traffic in both inbound
and outbound connections.
One ACL per interface- ACLs control traffic for an interface such as Fast Ethernet.
Dynamic ACLs
Dynamic or lock-and-key ACLs are available for Internet Protocol traffic only. Dynamic ACLs starts with the application of an extended ACL to block traffic
through the router.
When you want a specific remote user or group of remote users to access a host within your network.
Connecting to the outside of your network (Internet) Lock-and-key authenticates the user and then permits limited access through your firewall router.
You want a subset of hosts on a local network to access a host from a remote network that is protected by a firewall.
Lock-and-key requires users to authenticate through an AAA, TACACS server or other security server before it allows access.
Reflexive ACLs
Reflexive ACLs allow IP packets to be filtered based on upper-layer session information. Generally are used to allow outbound traffic and to limit inbound
traffic by using sessions that originate inside the router. When a router sees a new outbound connection it adds an entry to a temporary ACL to allow replies
back into the network. Reflexive ACLs can be defined only with an extended named IP ACL. They cannot be defined with numbered or standard named
ACLs or with other protocols.
Time-Based ACLs
Time-Based ACLs are like extended ACLs in function, but they allow access control based on time. To use time-based ACLs you create a time range that
defines specific times of the day and days of the week. You use the time range with a name and then refer to it by a function. The time range relies on the
router system clock. This feature works with NTP (Network Time Protocol) synchronization, but the router clock can also be used.
Numbered ACL
You can assign a number based on whether your ACL is standard or extended
Named ACL
QUESTION 409
Which option is one way to mitigate symmetric routing on an active/active firewall setup for TCP-based connections?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 410
Which allowing website access between certain times?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 411
Which configuration is applied to a device so that it blocks outbound web traffic on Saturdays and Sundays between the hours of 1:00 AM and 11:59 PM?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 412
Which two different configurations can you apply to a device to block incoming SSH access? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 413
Refer to Exhibit.
Which two reasons for IP SLA tracking failure are likely true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 414
What is the minimum level that displays a log message when an ACL drops an incoming packet?
A. 4
B. 5
C. 3
D. 7
E. 6
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 415
Which Netflow version supports MPLS?
A. None
B. All of them
C. Version 8 and 9
D. Version 9
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
MPLS-aware NetFlow uses the NetFlow Version 9 export format. If you are exporting MPLS data to a NetFlow collector or a data analyzer, the collector must
support NetFlow Version 9 flow export format, and you must configure NetFlow export in Version 9 format on the router.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsmnf25.html
QUESTION 416
Which option is a prerequisite for stateful NAT64?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 417
Which of the following are features of Netflow version 9?
A. Cisco proprietary
B. IEEE standard
C. IETF standard
D. ingress
E. egress
F. ingress/egress
Correct Answer: CF
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 418
What do we prioritize with LLQ?
A. Voice
B. Data
C. Video
D. Queues
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Low Latency Queueing with Priority Percentage Support
Router> enable
Router# configure terminal
Router(config)# policy-map policy1
Router(config-pmap)# class voice-percent
Router(config-pmap-c)# priority percent 10
Router(config-pmap-c)# class data1
Router(config-pmap-c)# bandwidth remaining percent 30
Router(config-pmap-c)# class data2
Router(config-pmap-c)# bandwidth remaining percent 20
Router(config-pmap-c)# end
As a result of this configuration, 10 percent of the interface bandwidth is guaranteed for the class called voice-percent. The classes called data1 and data2
get 30 percent and 20 percent of the remaining bandwidth, respectively.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12sllqpc.html
QUESTION 419
Refer to the exhibit.
configure terminal
ip flow-export destination 192.168.10.1 9991
ip flow-export version 9
How can you configure a second export destination for IP address 192.168.10.1?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Note Do not enter the same ip address twice. However, entering two different ip addresses with the same udp port number is configurable
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_mdnf.html
QUESTION 420
Which two statements about VRRP object tracking are true? (Choose two.)
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 421
If you configure one router in your network with the auto-cost reference bandwidth 100 command, which effect on the data path is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 422
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the
core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in the Internet over this same DSL connection.
Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the
Internet-directed traffic?
A. By not enabling NAT on the IPsec tunnel interface
B. By not enabling NAT on the GRE tunnel interface
C. By configuring the NAT-referenced ACL to not permit the Enterprise traffic
D. By asking the ISP to perform NAT in the cloud
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The NAT configuration acts only on packets permitted by a referenced ACL. As a result, the ACL can permit packets destined for the Internet, performing
NAT on those packets. The ACL also denies packets going to the Enterprise, meaning that the router does not apply NAT to those packets.
QUESTION 423
Which two addresses types are included in NAT?
A. Inside global
B. Global outside
C. Outside internet
D. Inside internet
E. Outside local
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 424
Which two statements about NetFlow templates are true? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
https://www.cisco.com/en/US/technologies/tk648/tk362/technologies_white_paper09186a00800a3db9.html
QUESTION 425
Refer to the exhibit. Given the partial configuration in the exhibit, which IPv6 statement is true?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 426
Refer to the exhibit.
Which statement is correct regarding the operation of NAT-PT between the IPv4 and IPv6 networks shown?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 427
The network engineer types the follow commands in a router:
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 428
A packet capture indicates that the router is not forwarding the DHCP packets that it receives on interface FastEthernet0/0.
Which command needs to be entered in global configuration mode to resolve this issue?
A. ip helper-address
B. ip DHCP relay
C. service DHCP
D. ip forward-protocol
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 429
Which SNMP version provides both encryption and authentication?
A. SNMPv4
B. SNMPv2c
C. SNMPv3
D. SNMPv1
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 430
A network engineer wants to verify the status of a recently configured NTP setup on one of the routers. The engineer executes the show ntp associations
command.
What does the output indicate?
A. The synchronized NTP servers that are configured on the device.
B. The authentication mode that is used with the NTP server.
C. The security key value for the configured NTP server.
D. The facility that is configured for the NTP server.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 431
Refer to the Exhibit.
A. The router sends only NTP traffic using the loopback interface, and it disables eth0/0 from sending NTP traffic.
B. Eth0/0 sends NTP traffic on behalf of the loopback interface
C. The router sends only NTP traffic, using the eth0/0 interface, and it disables loopback0 from sending NTP traffic.
D. The router never sends NTP traffic, as using the loopback interface for NTP traffic is not supported on IOS routers.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 432
Which option to the command service timestamps debug enables the logging server to capture the greatest amount of information from the router?
A. Uptime
B. Show-timezone
C. Year
D. msec
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The “msec” keyword enables millisecond (msec) timestamps for the debug, which indicates the date and time according to the system clock in the format
MMM DD HH:MM:SS.
Reference:
https://www.cisco.com/c/en/us/support/docs/dial-access/integrated-services-digital-networks-isdn-channel-associated-signaling-cas/10374-debug.html
QUESTION 433
NPTv6 restrictions? (Choose all that apply.)
Explanation/Reference:
Explanation:
Restrictions for NPTv6 support on ASR1k/CSR1k/ISR4k
Virtual Routing and Forwarding (VRF) is not supported by NPTv6 support on ASR1k/CSR1k/ISR4k feature.
NPTv6 support on ASR1k/CSR1k/ISR4k does not support configuring NAT64 on the same interface.
Multicast is not supported.
Firewall is not supported.
Application Level Gateways (ALG) is not supported by NPTv6 support on ASR1k/CSR1k/ISR4k feature. Payload address or port translation is not supported.
High Speed Logging (HSL) and syslog is not supported.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-16/nat-xe-16-book/iadnat-asr1k-nptv6.html
QUESTION 434
Which option can you use to monitor voice traffic when configuring an IP SLA?
A. udp-jitter
B. tcp-jitter
C. ip sla logging traps
D. ip sla reaction-configuration
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 435
Technologies used in preparing Service Provider IPv6? (Choose two.)
A. 6ND
B. 6RD
C. 6VPE
D. VRF-Lite
E. DS-Lite
F. Dual-stackA
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 436
What show command is used here?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The following example shows the IP activity and the addresses in DNS hostname format.
The following example shows the IP activity by using the numeric keyword to display the addresses in IP format.
QUESTION 437
Under which circumstance will a branch ISR router contain interface vlan configurations?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In smaller offices, a single ISR may be used for a both remote connectivity and inter-VLAN routing. In that case, know that an Ethernet Switch Module would
be required for the ISR router
QUESTION 438
A Network engineer wants to configure logging to compile and send information to an external server. Which type of logging must be configured?
A. Terminal
B. Syslog
C. Buffer
D. Console
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 439
How to set up IP SLA to monitor Bandwidth between the certain limits?
A. Timer
B. Frequency
C. Threshold
D. Queue-limit
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 440
Which location is traffic from IP SLAs?
A. Core edge
B. Access edge
C. WAN edge
D. Distribution edge
E. User edge
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Maybe this question wants to ask “which location IP SLAs are usually used to monitor the traffic?” then the answer should be WAN edge as IP SLA is usually
used to track a remote device or service (usually via ping).
QUESTION 441
What is the reasons of command:
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 442
Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?
A. Show track
B. Show threshold
C. Show timer
D. Show delay
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 443
Where the output will be shown of the command debug condition interface fa0/1?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The command “debug condition interface <interface>” command is used to disable debugging messages for all interfaces except the specified interface so in
this case the debug output will be shown on Fa0/1 interface only.
Note: If in this question there was another “debug condition interface fa0/0” command configured then the answer should be C (both interfaces will show
debugging ouput).
QUESTION 444
A network engineer executes the show ip sla statistics command.
What does the output of this command show?
A. Operation availability
B. Device CPU utilization
C. Interface packet statistics
D. Packet sequencing
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 445
What is the most security snmp version?
A. v2c auth
B. v2c
C. v3
D. v1
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 446
Which alerts will be seen on the console when running the command: logging console warnings?
A. Warnings only
B. Warnings, notifications, error, debugging, informational
C. Warnings, errors, critical, alerts, emergencies
D. Notifications, warnings, errors
E. Warnings, errors, critical, alerts
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 447
A network engineer is asked to create an SNMP-enabled proactive monitoring solution to ensure that jitter levels remain between particular boundaries.
Which IP SLA option should the engineer use?
A. Threshold
B. Frequency
C. Verify-data
D. Timeout
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 448
Which IP SLA operation requires Cisco endpoints?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
With the addition of real-time traffic (ie: VoIP), the focus shifts not just in the reliability of the network, but also on the delays involved in transmitting the data.
Real-time traffic is delay sensitive. For Voice data, packet loss is manageable to some extent, but frequent losses impair communication between endpoints.
The UDP jitter operation is the most popular operation because the user can obtain packet loss, jitter and latency from one operation. This also includes
unidirectional measurements as well. The Jitter operation is designed to measure the delay, delay variance and packet loss in IP networks by generating
active UDP traffic. It sends N packets, each of size S, from source router to a target router (which requires Cisco IOS IP SLAs responder enabled) each T
milliseconds apart. All these parameters are user configurable.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_udp_jitter.pdf
QUESTION 449
IP SLA network with a configuration snippet
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/813-cisco-router-ipsla-basic.html
QUESTION 450
Given ((diagram with R1 SLA config)) with configuration written on Picture as
R(Config)#ip sla 1
R1(Config-ip-sla)#icmp-echo 172.20.20.2 source-interface f1/0
R1(Config-ip-sla)#frequency 10
R1(Config-ip-sla)#threshold 100
R1(Config)#ip sla schedule 1 start-time now life forever
R1(Config)#track 10 ip sla ???-
R1(Config)#ip route 0.0.0.0.0 0.0.0.0 172.20.20.2
What make default route not removed when SLA state down or failed?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Remember: If you want to use the “state”, remember that the “track state” will be down also if the the threshold is reached.
Note: with Cisco IOS Release 12.4(20)T, 12.2(33)SXI1, 12.2(33)SRE and Cisco IOS XE Release 2.4, the track rtr command is replaced by the track ip sla
command. See the track ip sla command for more information.
Reference:
http://www.ciscozine.com/using-ip-sla-to-change-routing/
QUESTION 451
Which option must be configured on a target device to use time stamping to accurately represent response times using IP SLA?
A. Responder
B. Jitter value
C. TCP Connect
D. ICMP Echo
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 452
Refer to the exhibit.
A network engineer receives a command output from a customer that indicates an issue with. What are two reasons for the output? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
NTP uses a value, called a stratum value, to indicate the believability of a time source.
Valid stratum values are in the range 0-15, with a value of 16 being used to indicate that a device does not have its time synchronized. However, Cisco IOS
only permits you to set stratum values in the range 1-15.
QUESTION 453
Which type of information is displayed when a network engineer executes the show track 1 command on the router?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 454
A network engineer is notified that several employees are experiencing network performance related issues, and bandwidth-intensive applications are
identified as the root cause. In order to identify which specific type of traffic is causing this slowness, information such as the source/destination IP and Layer
4 port numbers is required. Which feature should the engineer use to gather the required information?
A. SNMP
B. Cisco IOS EEM
C. NetFlow
D. Syslog
E. WCCP
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
NetFlow Flows Key Fields
A network flow is identified as a unidirectional stream of packets between a given source and destination--both are defined by a network-layer IP address and
transport-layer source and des--nation port numbers. Specifically, a flow is identified as the combination of the following key fields: http://www.cisco.com/en/
US/docs/ios-xml/ios/netflow/configuration/12-4t/cfg-nflow-data-expt.html
QUESTION 455
Where can NetFlow export data for long term storage and analysis?
A. Syslog
B. Collector
C. Another network device
D. Flat file
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 456
What is the viable successor of NAT_PT?
A. NAT44
B. NAT64
C. NPTv6
D. NATng
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 457
Which three functionalities are specific to stateful NAT64? (Choose three.)
A. 1:N translation
B. Conserves IPv4 address
C. Uses address overloading, hence lacks in end-to-end address transparency
D. No state or bindings created on the translation
E. Requires IPv4-translatable IPv6 addresses assignment (mandatory requirement)
F. Requires either manual or DHCPv6 based address assignment for IPv6 hosts
Explanation/Reference:
Explanation:
QUESTION 458
Which option is the first task that a device that is configured with NAT64 performs when it receives an incoming IPv6 packet that matches the stateful NAT64
prefix?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 459
When use NPTv6 for IPV6 to IPV6 Address translation? (Choose two.)
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 460
Which command do you enter to display log messages with a timestamp that includes the length of time since the device was last rebooted?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 461
Which SNMP verification command shows the encryption and authentication protocols that are used in SNMPV3?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 462
A network engineer enables a trunk port and encounters the following message:%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet 1/1,
changed state to up. What is the severity level of this message?
A. Alert
B. Critical
C. Notification
D. Informational
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 463
Up/down interface... what is the log severity level?
A. Level 3
B. Level 4
C. Level 5
D. Level 0
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 464
Which NAT Command do you enter to disable dynamic ARP learning on an interface?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 465
Your company uses Voice over IP (VoIP). The system sends UDP datagrams containing the voice data between communicating hosts. When areas of the
network become busy, some of the datagrams arrive at their destination out of order. What happens when this occurs?
A. UDP will send an ICMP Information request message to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order in which they arrive.
C. UDP will drop the datagrams that arrive out of order.
D. UDP will use the sequence numbers in the datagram headers to reassemble the data into the correct order.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 466
Which command will display all the EIGRP feasible successor routes known to a router?
A. Show ip routes
B. Show ip eigrp summary
C. Show ip eigrp topology
D. Show ip eigrp adjacencies
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 467
Where are EIGRP successor routes stored?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 468
A network engineer is troubleshooting connectivity issues with a directly connected RIPng neighbor. Which command should directly connected RIPng
neighbor adjacencies only?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 469
Which three NTP operating modes must the trusted-Key command be configured on for authentication to operate properly? (Choose three.)
A. Interface
B. Client
C. Peer
D. Server
E. Broadcast
F. Stratum
Explanation/Reference:
Explanation:
Client/Server Mode
Configuring an association in client mode, usually indicated by a server declaration in the configuration file, indicates that one wishes to obtain time from the
remote server, but that one is not willing to provide time to the remote server.
QUESTION 470
Which two types of threshold can you configure for tracking objects? (Choose two.)
A. Percentage
B. MTU
C. Bandwidth
D. Weight
E. Delay
F. Administrative distance
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Object Track List
An object track list allows you to track the combined states of multiple objects. Object track lists support the following capabilities:
-Boolean "and" function — Each object defined within the track list must be in an up state so that the track list object can become up.
-Boolean "or" function — At least one object defined within the track list must be in an up state so that the tracked object can become up.
-Threshold percentage — The percentage of up objects in the tracked list must be greater than the configured up threshold for the tracked list to be in the
up state. If the percentage of down objects in the tracked list is above the configured track list down threshold, the tracked list is marked as down.
-Threshold weight — Assign a weight value to each object in the tracked list, and a weight threshold for the track list. If the combined weights of all up
objects exceeds the track list weight up threshold, the track list is in an up state. If the combined weights of all the down objects exceeds the track list weight
down threshold, the track list is in the down state.
QUESTION 471
A router was configured with the eigrp stub command.
The router advertises which types of routes?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 472
Consider this scenario. TCP traffic is blocked on port 547 between a DHCPv6 relay agent and a DHCPv6 server that is configured for prefix delegation.
Which two outcomes will result when the relay agent is rebooted? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The DHCPv6 use UDP protocol for distribution IPv6 addresses and prefixes. The routers dont need in the DHCPv6 prefixes from DHCPv6 server, its work for
network administrator. DHCPv6 messages are exchanged over UDP port 546 and 547. Clients listen for DHCP messages on UDP port 546 while servers
and relay agents listen for DHCP messages on UDP port 547.
DHCPv6 messages are exchanged over UDP port 546 and 547. Clients listen for DHCP messages on UDP port 546 while servers and relay agents listen for
DHCP messages on UDP port 547. The basic message format is as follows:
SOLICIT (1)
A DHCPv6 client sends a Solicit message to locate DHCPv6 servers.
ADVERTISE (2)
A server sends an Advertise message to indicate that it is available for DHCP service, in response to a Solicit message received from a client.
REQUEST (3)
A client sends a Request message to request configuration parameters, including IP addresses or delegated prefixes, from a specific server.
CONFIRM (4)
A client sends a Confirm message to any available server to determine whether the addresses it was assigned are still appropriate to the link to which the
client is connected. This could happen when the client detects either a link-layer connectivity change or if it is powered on and one or more leases are still
valid. The confirm message is used to confirm whether the client is still on the same link or whether it has been moved. The actual lease(s) are not validated;
just the prefix portion of the addresses or delegated prefixes.
RENEW (5)
A client sends a Renew message to the server that originally provided the client's addresses and configuration parameters to extend the lifetimes on the
addresses assigned to the client and to update other configuration parameters.
REBIND (6)
A client sends a Rebind message to any available server to extend the lifetimes on the addresses assigned to the client and to update other configuration
parameters; this message is sent after a client receives no response to a Renew message.
REPLY (7)
A server sends a Reply message containing assigned addresses and configuration parameters in response to a Solicit, Request, Renew, Rebind message
received from a client. A server sends a Reply message containing configuration parameters in response to an Information-request message. A server sends
a Reply message in response to a Confirm message confirming or denying that the addresses assigned to the client are appropriate to the link to which the
client is connected. A server sends a Reply message to acknowledge receipt of a Release or Decline message.
RELEASE (8)
A client sends a Release message to the server that assigned addresses to the client to indicate that the client will no longer use one or more of the assigned
addresses.
DECLINE (9)
A client sends a Decline message to a server to indicate that the client has determined that one or more addresses assigned by the server are already in use
on the link to which the client is connected.
RECONFIGURE (10)
A server sends a Reconfigure message to a client to inform the client that the server has new or updated configuration parameters, and that the client is to
initiate a Renew/Reply or Information-request/Reply transaction with the server in order to receive the updated information.
INFORMATION-REQUEST (11)
A client sends an Information-request message to a server to request configuration parameters without the assignment of any IP addresses to the client.
RELAY-FORW (12)
A relay agent sends a Relay-forward message to relay messages to servers, either directly or through another relay agent. The received message, either a
client message or a Relay-forward message from another relay agent, is encapsulated in an option in the Relay-forward message.
RELAY-REPL (13)
A server sends a Relay-reply message to a relay agent containing a message that the relay agent delivers to a client. The Relay-reply message may be
relayed by other relay agents for delivery to the destination relay agent. The server encapsulates the client message as an option in the Relay-reply message,
which the relay agent extracts and relays to the client.
QUESTION 473
When policy-based routing (PBR) is being configured, which three criteria can the set command specify? (Choose three.)
Explanation/Reference:
Explanation:
The set command specifies the action(s) to take on the packets that match the criteria. You can specify any or all of the following:
* precedence: Sets precedence value in the IP header. You can specify either the precedence number or name.
* df: Sets the “Don’t Fragment” (DF) bit in the ip header.
* vrf: Sets the VPN Routing and Forwarding (VRF) instance.
* next-hop: Sets next hop to which to route the packet.
* next-hop recursive: Sets next hop to which to route the packet if the hop is to a router which is not adjacent.
* interface: Sets output interface for the packet.
* default next-hop: Sets next hop to which to route the packet if there is no explicit route for this destination.
* default interface: Sets output interface for the packet if there is no explicit route for this destination.
Reference:
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpbr_ps1835_TSD_Products_Configuration_Guide_Chapter.html
QUESTION 474
DRAG DROP
Drag each OSPF state to the correct definition.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 475
QUESTION NO: 483 DRAG DROP
Drag each OSPF router type to the approximate description on the left. Not all types are used.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 476
DRAG DROP
Click and drag the associated EIGRP functionality on the left corresponding topology characteristic on the right.
Correct Answer:
Explanation/Reference:
QUESTION 477
DRAG DROP
Click and drag the command on the left to the associated tack on the right.
Correct Answer:
Explanation/Reference:
QUESTION 478
DRAG DROP
Click and drag the associated set of OSPF LEAs on the left of the corresponding area type on the right where this set of LEAs may be seen.
Explanation/Reference:
QUESTION 479
DRAG DROP
Click the resources on the left that you need to create an implementation plan for an OSPF project and drag them to the target zone on the right.
Explanation/Reference:
QUESTION 480
DRAG DROP
Place the BGP attributes in the correct order used for determining a route.
Select and Place:
Correct Answer:
Explanation/Reference:
QUESTION 481
DRAG DROP
Place the BGP commands to the proper locations.
Explanation/Reference:
QUESTION 482
DRAG DROP
Click and drag the BGP attribute characterization on the left to the correct BGP attribute on the right.
Explanation/Reference:
QUESTION 483
DRAG DROP
Click and drag the correct techniques for transitioning networks or devices from IPv4 to IPv6 from the left to the target zone on the right.
Explanation/Reference:
QUESTION 484
DRAG DROP
Explanation/Reference:
QUESTION 485
DRAG DROP
Explanation/Reference:
QUESTION 486
DRAG DROP
Drag each statement about authentication mechanisms on the left to the matching authentication type on the right.
Explanation/Reference:
QUESTION 487
DRAG DROP
Explanation/Reference:
Explanation:
CoPP and MPP
https://www.cisco.com/c/en/us/about/security-center/copp-best-practices.html
Control Plane Policing (CoPP) – CoPP is the Cisco IOS-wide route processor protection mechanism. As illustrated in Figure 2, and similar to rACLs, CoPP is
deployed once to the punt path of the router. However, unlike rACLs that only apply to receive destination IP packets, CoPP applies to all packets that punt to
the route processor for handling. CoPP therefore covers not only receive destination IP packets, it also exceptions IP packets and non-IP packets. In
addition, CoPP is implemented using the Modular QoS CLI (MQC) framework for policy construction. In this way, in addition to simply permit and deny
functions, specific packets may be permitted but rate-limited. This behavior substantially improves the ability to define an effective CoPP policy. (Note: that
“Control Plane Policing” is something of a misnomer because CoPP generally protects the punt path to the route processor and not solely the control plane.)
Before describing the details of CoPP policy construction and deployment, some of the important details related to MQC and its operation, especially within
the context of CoPP are discussed.
In MQC, the class-map command is used to define a traffic class. A traffic class contains three major elements: a name, one or a series of match
commands, and an instruction on how to evaluate these match commands. Match commands are used to specify various criteria for classifying packets.
Packets are checked to see whether they match the criteria specified in the match commands. If a packet matches the specified criteria, that packet is
considered a member of the class and is treated according to the QoS specifications set in the service policy. Packets that fail to meet any of the matching
criteria are classified as members of the default class.
The instruction for evaluating match commands is specified as either match-any or match-all. When more than one match statement is included, match-any
requires that a packet match at least one of the statements to be included in the class. If match-all is used, a packet must match all of the statements to be
included in the class.
The policy-map command is used to associate a traffic class, defined by the class-map command, with one or more QoS policies. The result of this
association is called a service policy. A service policy contains three elements: a name, a traffic class (specified with the class command), and the QoS
policies. The purpose of the service policy is to associate a traffic class with one or more QoS policies. Classes included within policy maps are processed
top-down. When a packet is found to match a class, no further processing is performed. That is, a packet can only belong to a single class, and it is the first
one to which a match occurs. When a packet does not match any of the defined classes, it is automatically placed in the class class-default. The default
class is always applied, whether it is explicitly configured or not.
The service-policy command is used to attach the service policy, as specified with the policy-map command, to an interface. In the case of CoPP, this is the
control-plane interface. Because the elements of the service policy can be applied to packets entering, or in some versions of CoPP, leaving the interface,
users are required to specify whether the service policy characteristics should be applied to incoming or outgoing packets.
It is important to note that MQC is a general framework used for enabling all QoS throughout Cisco IOS, and not exclusively for CoPP. Not all features
available within the MQC framework are available or applicable to CoPP policies. For example, only certain classification (match) criteria are applicable to
CoPP. In some instances, there are MQC platform and/or IOS-dependencies that may apply to CoPP. Consult the appropriate product references and
configuration guides for any CoPP-specific dependencies.
https://www.cisco.com/c/en/us/td/docs/ios/12_4t/12_4t11/htsecmpp.html#wp1049321
Management Plane
The management plane is the logical path of all traffic related to the management of a routing platform. One of three planes in a communication architecture
that is structured in layers and planes, the management plane performs management functions for a network and coordinates functions among all the planes
(management, control, data). The management plane also is used to manage a device through its connection to the network.
Examples of protocols processed in the management plane are Simple Network Management Protocol (SNMP), Telnet, HTTP, Secure HTTP (HTTPS), and
SSH. These management protocols are used for monitoring and for CLI access. Restricting access to devices to internal sources (trusted networks) is
critical.
-Greater access control for managing a device than allowing management protocols on all interfaces
-Simplifies the task of using per-interface ACLs to restrict management access to the device
-Management packet floods on switching and routing interfaces are prevented from reaching the CPU
QUESTION 488
DRAG DROP
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 489
DRAG DROP
How to configure IPv6 DHCP Relay?
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 490
498 DRAG DROP
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 491
DRAG DROP
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reflexive ACLs allow IP packets to be filtered based on upper-layer session information. They are generally used to allow outbound traffic and to limit
inbound traffic in response to sessions that originate inside the router. Reflexive ACLs can be defined only with extended named IP ACLs. They cannot be
defined with numbered or standard named IP ACLs, or with other protocol ACLs. Reflexive ACLs can be used in conjunction with other standard and static
extended ACLs. Outbound ACL will have the ‘reflect’ keyword. It is the ACL that matches the originating traffic. Inbound ACL will have the ‘evaluate’ keyword.
It is the ACL that matches the returning traffic.
Lock and key, also known as dynamic ACLs, was introduced in Cisco IOS Software Release 11.1. This feature is dependent on Telnet, authentication (local
or remote), and extended ACLs.
Lock and key configuration starts with the application of an extended ACL to block traffic through the router. Users that want to traverse the router are
blocked by the extended ACL until they Telnet to the router and are authenticated. The Telnet connection then drops and a single-entry dynamic ACL is
added to the extended ACL that exists. This permits traffic for a particular time period; idle and absolute timeouts are possible.
Reference:
https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html
QUESTION 492
DRAG DROP
Drag and drop the steps in the NAT process for IPv4-initiated packets from the left into the correct sequence on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-2/nat-xe-2-book/iadnat-stateful-nat64.html
QUESTION 493
Case study.
You have been asked to evaluate an OSPF network and to answer questions a customer has about its operation. Note: You are not allowed to use the show
running-config command.
Although in this sim we are not allowed to use “show running-config” command but we post the configuration here so that you can understand more about
the topology.
R1
interface Loopback0
ip address 1.1.1.1 255.255.255.255
no shut
interface Serial0/0
ip address 192.168.13.1 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 1.1.1.1 0.0.0.0 area 0
_______________________________________
R2
interface Loopback 0
ip address 2.2.2.2 255.255.255.255
no shut
interface S0/0
ip address 192.168.23.2 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.23.0 0.0.0.255 area 0
network 2.2.2.2 0.0.0.0 area 0
neighbor 192.168.23.3
_________________________________________________
R3
interface Loopback 0
ip address 3.3.3.3 255.255.255.255
no shut
interface fa0/0
ip address 192.168.34.3 255.255.255.0
no shut
interface S0/1
ip address 192.168.23.3 255.255.255.0
ip ospf network non-broadcast
no shut
interface S0/0
ip address 192.168.13.3 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
network 192.168.34.0 0.0.0.255 area 1
network 3.3.3.3 0.0.0.0 area 0
area 1 virtual-link 4.4.4.4
neighbor 192.168.23.2
_______________________________________________________________
R4
interface Loopback 0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet0/0
ip address 192.168.34.4 255.255.255.0
interface Fa0/1
ip address 192.168.45.4 255.255.255.0
no shut
interface Fa1/0
ip address 192.168.46.4 255.255.255.0
no shut
router ospf 1
network 192.168.34.0 0.0.0.255 area 1
network 192.168.45.0 0.0.0.255 area 2
network 192.168.46.0 0.0.0.255 area 3
network 4.4.4.4 0.0.0.0 area 1
area 1 virtual-link 3.3.3.3
area 2 nssa
area 3 stub no-summary
_________________________________________________________________
R5
interface Loopback0
ip address 5.5.5.5 255.255.255.255
interface Loopback1
ip address 5.5.1.1 255.255.255.255
interface Loopback2
ip address 5.5.2.1 255.255.255.255
interface Loopback3
ip address 5.5.3.1 255.255.255.255
interface Loopback4
ip address 5.5.4.1 255.255.255.255
no shut
interface Fa0/0
ip address 192.168.45.5 255.255.255.0
no shut
router ospf 1
network 192.168.45.0 0.0.0.255 area 2
network 5.5.0.0 0.0.255.255 area 2
area 2 nssa
_______________________________________________
R6
interface Fa0/0
ip address 192.168.46.6 255.255.255.0
no shut
interface Loopback 0
ip address 6.6.6.6 255.255.255.255
no shut
router ospf 1
network 192.168.46.0 0.0.0.255 area 3
network 6.6.6.6 0.0.0.0 area 3
area 3 stub
How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output you have examined?
A. 1858
B. 1601
C. 600
D. 1569
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation
To check OSPF LSA we should use the “show ip ospf database” command on R5:
In this sim there is no LSA Type 4 because there is no ASBR so maybe this question wants to ask about LSA Type 3 (Summary Net Link States).
Note: LSA Type 4 is generated by ABR, not ASBR but without ASBR inside the network there are no LSA Type 4 generated. For more information about
OSPF LSA Types please read our OSPF LSA Types Lab tutorial.
R3 advertises LSA Type 1 to R4 then R4 converts it into Type 3 and sends to R5 (because R4 is the ABR) so we see the “Link ID” 3.3.3.3 of R3 is advertising
by R4 (4.4.4.4). According to the “Age” column, this LSA was advertised 1858 seconds ago.
QUESTION 494
Case study.
You have been asked to evaluate an OSPF network and to answer questions a customer has about its operation. Note: You are not allowed to use the show
running-config command.
Although in this sim we are not allowed to use “show running-config” command but we post the configuration here so that you can understand more about
the topology.
R1
interface Loopback0
ip address 1.1.1.1 255.255.255.255
no shut
interface Serial0/0
ip address 192.168.13.1 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 1.1.1.1 0.0.0.0 area 0
_______________________________________
R2
interface Loopback 0
ip address 2.2.2.2 255.255.255.255
no shut
interface S0/0
ip address 192.168.23.2 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.23.0 0.0.0.255 area 0
network 2.2.2.2 0.0.0.0 area 0
neighbor 192.168.23.3
_________________________________________________
R3
interface Loopback 0
ip address 3.3.3.3 255.255.255.255
no shut
interface fa0/0
ip address 192.168.34.3 255.255.255.0
no shut
interface S0/1
ip address 192.168.23.3 255.255.255.0
ip ospf network non-broadcast
no shut
interface S0/0
ip address 192.168.13.3 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
network 192.168.34.0 0.0.0.255 area 1
network 3.3.3.3 0.0.0.0 area 0
area 1 virtual-link 4.4.4.4
neighbor 192.168.23.2
_______________________________________________________________
R4
interface Loopback 0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet0/0
ip address 192.168.34.4 255.255.255.0
interface Fa0/1
ip address 192.168.45.4 255.255.255.0
no shut
interface Fa1/0
ip address 192.168.46.4 255.255.255.0
no shut
router ospf 1
network 192.168.34.0 0.0.0.255 area 1
network 192.168.45.0 0.0.0.255 area 2
network 192.168.46.0 0.0.0.255 area 3
network 4.4.4.4 0.0.0.0 area 1
area 1 virtual-link 3.3.3.3
area 2 nssa
area 3 stub no-summary
_________________________________________________________________
R5
interface Loopback0
ip address 5.5.5.5 255.255.255.255
interface Loopback1
ip address 5.5.1.1 255.255.255.255
interface Loopback2
ip address 5.5.2.1 255.255.255.255
interface Loopback3
ip address 5.5.3.1 255.255.255.255
interface Loopback4
ip address 5.5.4.1 255.255.255.255
no shut
interface Fa0/0
ip address 192.168.45.5 255.255.255.0
no shut
router ospf 1
network 192.168.45.0 0.0.0.255 area 2
network 5.5.0.0 0.0.255.255 area 2
area 2 nssa
_______________________________________________
R6
interface Fa0/0
ip address 192.168.46.6 255.255.255.0
no shut
interface Loopback 0
ip address 6.6.6.6 255.255.255.255
no shut
router ospf 1
network 192.168.46.0 0.0.0.255 area 3
network 6.6.6.6 0.0.0.0 area 3
area 3 stub
Which of the following statements is true about the serial links that terminate in R3?
A. The R1-R3 link needs the neighbor command for the adjacency to stay up
B. The R2-R3 link OSPF timer values are 30, 120, 120
C. The R1-R3 link OSPF timer values should be 10,40,40
D. R3 is responsible for flooding LSUs to all the routers on the network.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Check the Serial1/0 interface of R3 which is connected to R2 with the “show ip ospf interface serial 1/0” command:
There are two things we should notice from the output above:
+ The “network type” connection between R2-R3 is “NON_BROADCAST” (usually we have “BROADCAST”). OSPF neighbors are discovered using multicast
Hello packets. In non broadcast environment, multicast (and broadcast) messages are not allowed so OSPF neighborship cannot be formed automatically.
Therefore we have to establish OSPF neighborship manually by using “neighbor ” command under OSPF process (OSPF will send unicast Hello message to
this address). For example on R2 we have to use these commands:
router ospf 1
neighbor 192.168.23.3
And on R3:
router ospf 1
neighbor 192.168.23.2
+ For non broadcast environment the default Hello timer is 30 seconds; Dead timer (time to wait before declaring a neighbor dead) is 120 seconds and Wait
timer (causes the interface to exit out of the wait period and select a DR on a broadcast network. This timer is always equal to the dead timer interval) is 120
seconds. In the output we also see the default timers for non broadcast network.
QUESTION 495
FILL BLANK
Case study.
Some notices from above configuration:
+The OSPF network type berween R2&R3 is non broadcast.
You have been asked to evaluate an OSPF network and to answer questions a customer has about its operation. Note: You are not allowed to use the show
running-config command.
Although in this sim we are not allowed to use “show running-config” command but we post the configuration here so that you can understand more about
the topology.
R1
interface Loopback0
ip address 1.1.1.1 255.255.255.255
no shut
interface Serial0/0
ip address 192.168.13.1 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 1.1.1.1 0.0.0.0 area 0
_______________________________________
R2
interface Loopback 0
ip address 2.2.2.2 255.255.255.255
no shut
interface S0/0
ip address 192.168.23.2 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.23.0 0.0.0.255 area 0
network 2.2.2.2 0.0.0.0 area 0
neighbor 192.168.23.3
_________________________________________________
R3
interface Loopback 0
ip address 3.3.3.3 255.255.255.255
no shut
interface fa0/0
ip address 192.168.34.3 255.255.255.0
no shut
interface S0/1
ip address 192.168.23.3 255.255.255.0
ip ospf network non-broadcast
no shut
interface S0/0
ip address 192.168.13.3 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
network 192.168.34.0 0.0.0.255 area 1
network 3.3.3.3 0.0.0.0 area 0
area 1 virtual-link 4.4.4.4
neighbor 192.168.23.2
_______________________________________________________________
R4
interface Loopback 0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet0/0
ip address 192.168.34.4 255.255.255.0
interface Fa0/1
ip address 192.168.45.4 255.255.255.0
no shut
interface Fa1/0
ip address 192.168.46.4 255.255.255.0
no shut
router ospf 1
network 192.168.34.0 0.0.0.255 area 1
network 192.168.45.0 0.0.0.255 area 2
network 192.168.46.0 0.0.0.255 area 3
network 4.4.4.4 0.0.0.0 area 1
area 1 virtual-link 3.3.3.3
area 2 nssa
area 3 stub no-summary
_________________________________________________________________
R5
interface Loopback0
ip address 5.5.5.5 255.255.255.255
interface Loopback1
ip address 5.5.1.1 255.255.255.255
interface Loopback2
ip address 5.5.2.1 255.255.255.255
interface Loopback3
ip address 5.5.3.1 255.255.255.255
interface Loopback4
ip address 5.5.4.1 255.255.255.255
no shut
interface Fa0/0
ip address 192.168.45.5 255.255.255.0
no shut
router ospf 1
network 192.168.45.0 0.0.0.255 area 2
network 5.5.0.0 0.0.255.255 area 2
area 2 nssa
_______________________________________________
R6
interface Fa0/0
ip address 192.168.46.6 255.255.255.0
no shut
interface Loopback 0
ip address 6.6.6.6 255.255.255.255
no shut
router ospf 1
network 192.168.46.0 0.0.0.255 area 3
network 6.6.6.6 0.0.0.0 area 3
area 3 stub
Explanation/Reference:
Explanation:
We can check the number of executed SPF algorithm via the “show ip ospf” command on R4:
In the output above we can see SPF has been executed 9 times.
QUESTION 496
Case study.
You have been asked to evaluate an OSPF network and to answer questions a customer has about its operation. Note: You are not allowed to use the show
running-config command.
Although in this sim we are not allowed to use “show running-config” command but we post the configuration here so that you can understand more about
the topology.
R1
interface Loopback0
ip address 1.1.1.1 255.255.255.255
no shut
interface Serial0/0
ip address 192.168.13.1 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 1.1.1.1 0.0.0.0 area 0
_______________________________________
R2
interface Loopback 0
ip address 2.2.2.2 255.255.255.255
no shut
interface S0/0
ip address 192.168.23.2 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.23.0 0.0.0.255 area 0
network 2.2.2.2 0.0.0.0 area 0
neighbor 192.168.23.3
_________________________________________________
R3
interface Loopback 0
ip address 3.3.3.3 255.255.255.255
no shut
interface fa0/0
ip address 192.168.34.3 255.255.255.0
no shut
interface S0/1
ip address 192.168.23.3 255.255.255.0
ip ospf network non-broadcast
no shut
interface S0/0
ip address 192.168.13.3 255.255.255.0
ip ospf network non-broadcast
no shut
router ospf 1
network 192.168.13.0 0.0.0.255 area 0
network 192.168.23.0 0.0.0.255 area 0
network 192.168.34.0 0.0.0.255 area 1
network 3.3.3.3 0.0.0.0 area 0
area 1 virtual-link 4.4.4.4
neighbor 192.168.23.2
_______________________________________________________________
R4
interface Loopback 0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet0/0
ip address 192.168.34.4 255.255.255.0
interface Fa0/1
ip address 192.168.45.4 255.255.255.0
no shut
interface Fa1/0
ip address 192.168.46.4 255.255.255.0
no shut
router ospf 1
network 192.168.34.0 0.0.0.255 area 1
network 192.168.45.0 0.0.0.255 area 2
network 192.168.46.0 0.0.0.255 area 3
network 4.4.4.4 0.0.0.0 area 1
area 1 virtual-link 3.3.3.3
area 2 nssa
area 3 stub no-summary
_________________________________________________________________
R5
interface Loopback0
ip address 5.5.5.5 255.255.255.255
interface Loopback1
ip address 5.5.1.1 255.255.255.255
interface Loopback2
ip address 5.5.2.1 255.255.255.255
interface Loopback3
ip address 5.5.3.1 255.255.255.255
interface Loopback4
ip address 5.5.4.1 255.255.255.255
no shut
interface Fa0/0
ip address 192.168.45.5 255.255.255.0
no shut
router ospf 1
network 192.168.45.0 0.0.0.255 area 2
network 5.5.0.0 0.0.255.255 area 2
area 2 nssa
_______________________________________________
R6
interface Fa0/0
ip address 192.168.46.6 255.255.255.0
no shut
interface Loopback 0
ip address 6.6.6.6 255.255.255.255
no shut
router ospf 1
network 192.168.46.0 0.0.0.255 area 3
network 6.6.6.6 0.0.0.0 area 3
area 3 stub
Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is true?
A. R5′s Loopback and R6′s Loopback are both present in R5′s Routing table
B. R5′s Loopback and R6′s Loopback are both present in R6′s Routing table
C. Only R5′s loopback is present in R5′s Routing table
D. Only R6′s loopback is present in R5′s Routing table
E. Only R5′s loopback is present in R6′s Routing table
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Area 2 (of R5) is a Not-so-Stubby area (NSSA). You can check it by the “show ip ospf” command on R4 or R5 (in Area 2 section). For example, below is the
output of “show ip ospf” command on R5:
In general, NSSA is same as normal area except that it can generate LSA Type 7 (redistribute from another domain) so we can see both Loopback interfaces
of R5 & R6 in the routing table of R5.
Note: NSSA does not receive a default route by default so you will not see a default route on R5.
Area 3 (of R6) is a Totally-Stubby area so R6 only has one default route to outside world. You can check with the “show ip ospf” command on R4 and R6
(area 3 section):
Notice that on R4 you will get more detail (shows “stub area, no summary LSA”) than on R6 (only shows “stub area”).
R6 is in a totally-stubby area so we will not see any R5’s Loopback interfaces in R6 routing table:
Note: You can see a default (summary) route to the outside (O*IA 0.0.0.0/0 …)
Even though this exercise looks complicated, it can be solve with simple commands:
Q1: show ip ospf database
Q2: show ip ospf database int s0/1
Q3: Show ip ospf
Q4: show ip ospf and show ip route
QUESTION 497
The configuration of R1 to R6 are posted below for your reference, useless lines are omitted:
Traffic from R1 to R61 s Loopback address is load shared between R1-R2-R4-R6 and R1- R3-R5-R6 paths. What is the ratio of traffic over each path?
A. 1:1
B. 1:5
C. 6:8
D. 19:80
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
First we need to get the IP address of R6’s loopback address by “show ip interface brief” command on R6:
Now we learned the R6’s loopback address is 150.1.6.6. To see the ratio of traffic that is load shared between paths, use the “show ip route 150.1.6.6”
command on R1:
This means that after 19 packets are sent to 192.168.13.3, R1 will send 80 packets to 192.168.12.2 (ratio 19:80). This is unequal cost path Load balancing
(configured with “variance” command).
QUESTION 498
The configuration of R1 to R6 are posted below for your reference, useless lines are omitted:
What type of route filtering is occurring on R6?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Use the “show running-config” on R6 we will see a distribute-list applying under EIGRP:
With this distribute-list, only networks 192.168.46.0; 192.168.56.0 and 150.1.6.6 are advertised out by R6.
QUESTION 499
The configuration of R1 to R6 are posted below for your reference, useless lines are omitted:
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?
A. CISCO
B. EIGRP
C. key
D. MD5
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
To successfully authenticate between two EIGRP neighbors, the key number and key-string must match. The key chain name is only for local use. In this
case we have key number “1” and key-string “CISCO” and they match so EIGRP neighbor relationship is formed.
QUESTION 500
The configuration of R1 to R6 are posted below for your reference, useless lines are omitted:
A. 333056
B. 1938688
C. 1810944
D. 307456
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
To check the advertised distance for a prefix we cannot use the “show ip route” command because it only shows the metric (also known as Feasible
Distance). Therefore we have to use the “show ip eigrp topology” command:
Update: Although the “show ip eigrp topology” does not work in the exam but the “show ip eigrp 1 topology” does work so please use this command instead
and we will find out the advertised distance on R1.
There are two parameters in the brackets of 192.168.46.0/24 prefix: (1810944/333056). The first one “1810944” is the Feasible Distance (FD) and the
second “333056” is the Advertised Distance (AD) of that route -> A is correct.
Just for your reference, this is the output of the “show ip route” command on R1:
In the first line:
QUESTION 501
The configuration of R1 to R6 are posted below for your reference, useless lines are omitted:
How much bandwidth is available for use by EIGRP on the R1 Ethernet 0/0 interface?
A. 1
B. 10
C. 20
D. 100
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In the “ip bandwitdh-percent eigrp 1 20” command, “1” is the EIGRP AS number while “20” is the percent of interface’s bandwidth that EIGRP is allowed to
use.
QUESTION 502
SIMULATION
Policy Based Routing Sim
Company A can has two links which can take it to the Internet. The company policy demands that you use web traffic to be forwarded only to Frame Relay
link if available and other traffic can go through any links. No static or default routing is allowed.
BorderRouter#show route-map
Explanation/Reference:
Explanation:
All the HTTP traffic from the EIGRP Network should go through Frame Relay link if available and all the other traffic should go through either link. The only
router you are able to administrate is the Border Router, from the EIGRP Network you may only send HTTP traffic. As the other people mentioned, actually it
is not a BGP lab. You are not able to execute the command “router bgp 65001″
1) Access list that catches the HTTP traffic:
BorderRouter#access-list 101 permit tcp any any eq www
Note that the server was not directly connected to the Border Router. There were a lot of EIGRP routes on it. In the real exam you do not know the exact IP
address of the server in the EIGRP network so we have to use the source as “any” to catch all the source addresses.
2) Route map that sets the next hop address to be ISP1 and permits the rest of the traffic:
BorderRouter(config)#route-map pbr permit 10
BorderRouter(config-route-map)#match ip address 101
BorderRouter(config-route-map)#set ip next-hop 10.1.101.1
BorderRouter(config-route-map)#exit
“If the packets do not meet any of the defined match criteria (that is, if the packets fall off the end of a route map), then those packets are routed through the
normal destination-based routing process. If it is desired not to revert to normal forwarding and to drop the packets that do not match the specified criteria,
then interface Null 0 should be specified as the last interface in the list by using the set clause.”
Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a4409.shtml)
3) Apply the route-map on the interface to the server in the EIGRP Network:
BorderRouter(config-route-map)#exit
BorderRouter(config)#int fa0/0
BorderRouter(config-if)#ip policy route-map pbr
BorderRouter(config-if)#exit
BorderRouter(config)#exit
4) There is a “Host for Testing”, click on this host to open a box in which there is a button named “Generate HTTP traffic”. Click on this button to generate
some packets for HTTP traffic. Jump back to the BorderRouter and type the command “show route-map”.
BorderRouter#show route-map
In the output you will see the line “Policy routing matches: 9 packets…”. It means that the route-map we configured is working properly.
QUESTION 503
SIMULATION
EIGRP OSPF Redistribution Sim
You are a network engineer with ROUTE.com, a small IT company. They have recently merged two organizations and now need to merge their networks as
shown in the topology exhibit. One network is using OSPF as its IGP and the other is using EIGRP as its IGP. R4 has been added to the existing OSPF
network to provide the interconnect between the OSPF and EIGRP networks. Two links have been added that will provide redundancy.
The network requirements state that you must be able to ping and telnet from loopback 101 on R1 to the OPSF domain test address of 172.16.1.100. All
traffic must use the shortest path that provides the greatest bandwidth. The redundant paths from the OSPF network to the EIGRP network must be available
in case of a link failure. No static or default routing is allowed in either network.
A previous network engineer has started the merger implementation and has successfully assigned and verified all IP addressing and basic IGP routing. You
have been tasked with completing the implementation and ensuring that the network requirements are met. You may not remove or change any of the
configuration commands currently on any of the routers. You may add new commands or change default values.
Explanation/Reference:
Explanation:
R2#show interface s0/0/0
Bandwidth=1544 Kbit, Delay=20000 us, Reliability=255, Load=1, MTU=1500 bytes
R2#config terminal
R2(config)# router ospf 1
R2(config-router)# redistribute eigrp 100 metric-type 1 subnets
R2(config-router)#exit
R2(config-router)#router eigrp 100
R2(config-router)#redistribute ospf 1 metric 1544 2000 255 1 1500
QUESTION 504
SIMULATION
OSPF Sim
OSPF is configured on routers Amani and Lynaic. Amani’s S0/0 interface and Lynaic‘s S0/1 interface are in Area 0. Lynaic‘s Loopback0 interface is in Area 2.
Your task is to configure the following:
Portland’s S0/0 interface in Area 1 Amani’s S0/1 interface in Area 1 Use the appropriate mask such that ONLY Portland’s S0/0 and Amnani’s S0/1 could be
in Area 1. Area 1 should not receive any external or inter-area routes (except the default route).
Explanation/Reference:
Explanation:
+ Configure Portland router as a stub:
Portland#configure terminal
Portland(config)#router ospf 1
Allow network 192.168.4.4/30 to join Area 1, notice that you have to convert subnet mask into wildcard mask:
Portland(config-router)#network 192.168.4.4 0.0.0.3 area 1
Configure Portland as a stub:
Portland(config-router)#area 1 stub
Portland#copy running-config startup-config
QUESTION 505
SIMULATION
IPv6 OSPF Virtual Link
Acme is a small export company that has an existing enterprise network that is running IPv6 OSPFv3. Currently OSPF is configured on all routers. However,
R4‘s loopback address (FEC0:4:4) cannot be seen in R1‘s IPv6 routing table. You are tasked with identifying the cause of this fault and implementing the
needed corrective actions that uses OSPF features and does no change the current area assignments. You will know that you have corrected the fault when
R4‘s loopback address (FEC0:4:4) can be seen in the routing table of R1.
Explanation/Reference:
Explanation:
R2>enable
R2#configure terminal
R2(config)#ipv6 router ospf 1
R2(config-rtr)#area 11 virtual-link 3.3.3.3
(Notice that we have to use neighbor router-id 3.3.3.3, not R2’s router-id 2.2.2.2)
+ Configure virtual link on R3 (from the second output above, we learned that the OSPF process ID of R3 is 1 and we have to disable the wrong configuration
of “area 54 virtual-link 4.4.4.4”):
R3>enable
R3#configure terminal
R3(config)#ipv6 router ospf 1
R3(config-rtr)#no area 54 virtual-link 4.4.4.4
R3(config-rtr)#area 11 virtual-link 2.2.2.2
We should check the configuration on R4:
R4>enable
R4#show running-config
You will see a wrongly configured virtual-link command. To get full mark we have to disable this command:
R4#configure terminal
R4(config)#ipv6 router ospf 1
R4(config-rtr)#no area 54 virtual-link 3.3.3.3
QUESTION 506
SIMULATION
EIGRP Stub Sim
By increasing the first distant office, JS manufactures has extended their business. They configured the remote office router (R3) from which they can reach
all Corporate subnets. In order to raise network stableness and lower the memory usage and broadband utilization to R3, JS manufactures makes use of
route summarization together with the EIGRP Stub Routing feature. Another network engineer is responsible for the implementing of this solution. However,
in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been missing.
Presently JS has configured EIGRP on all routers in the network R2, R3, and R4. Your duty is to find and solve the connectivity failure problem with the
remote office router R3. You should then configure route summarization only to the distant office router R3 to complete the task after the problem has been
solved.
The success of pings from R4 to the R3 LAN interface proves that the fault has been corrected and the R3 IP routing table only contains two 10.0.0.0
subnets.
Explanation/Reference:
Explanation:
Notice that R3 is configured as a stub receive-only router. The receive-only keyword will restrict the router from sharing any of its routes with any other router
in that EIGRP autonomous system. This keyword will also prevent any type of route from being sent.
Therefore, we will remove this command and replace it with the eigrp stub command:
R3#configure terminal
R3(config)#router eigrp 123
R3(config-router)#no eigrp stub receive-only
R3(config-router)#eigrp stub
R3(config-router)#end
Because we want the routing table of R3 only have 2 subnets so we have to summary sub-networks at the interface which is connected with R3, the s0/0
interface of R4.
R4>enable
R4#configure terminal
R4(config)#interface s0/0
R4(config-if)#ip summary-address eigrp 123 10.2.0.0 255.255.0.0
Now we jump back to R3 and use the show ip route command to verify the effect
But in your real exam, if you see the line “10.0.0.0/8 is a summary,….Null0” then you need to summary using the network 10.0.0.0/8 with the command “ip
summary-address eigrp 123 10.0.0.0 255.0.0.0” . This configuration is less optimize than the first but it summaries into 2 subnets as the question requires
(maybe you will not see this case, don’t worry!).
QUESTION 507
What command allows permit or deny IPv6 traffic?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The command “ipv6 traffic-filter access-list-name { in | out }” applies the access list to incoming or outgoing traffic on the interface.
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/swv6acl.html
QUESTION 508
Refer to the exhibit. A network engineer is working on the network topology and executes the command no ip split-horizon on interface SO/0 of the hub
router. What is the result of this command?
A. The spoke routers can see the routers are advertised by the hub router.
B. Each of the spoke routers can see the routers that are advertised from the other spoke routers.
C. A routing loop is created.
D. The hub router can see the routes that are advertised by the spoke routers.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 509
Which technology uses the many-to-one method of mapping IP addresses?
A. dynamic NAT
B. PAT
C. NAT-PT
D. static NAT
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Overloading--Maps multiple unregistered IP addresses to a single registered IP address (many to one) using different ports.
This method is also known as Port Address Translation (PAT).
By using overloading, thousands of users can be connected to the Internet by using only one real global IP address
QUESTION 510
Refer to the exhibit. After you apply this configuration to router R1, it fails to establish an eBGP neighbor relationship with R2. Which action do you take to
correct the problem?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 511
Refer to the exhibit. All interfaces on each router are participating in the EIGRP 100 process. Interface Loopback 2 on NQ-R2 is currently in shutdown mode.
An engineer issues the eigrp stub command on router BR1. Which statement about the query messages sent from router HQ-R2 for a route to reach the
12.12.12.12/32 network is true?
A. Router HQ-R1 receives query messages from HQ-R2 for a route to 12.12.12.12/32 network.
B. Router HQ-R1 and BR1 receives query massages from HQ-R2 for a route 12.12.12.12/32 network.
C. Router HQ-R2 sends a query message to the feasible successor for a route to 12.12.12.12/32 network
D. BR1 receives query messages from HQ-R2 for route to 12.12.12.12/32 network
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 512
A network engineer executes the command show ip eigrp vrf purple topology. Which type of information is displayed as a result?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 513
DRAG DROP
Drag and drop the Frame Relay LMI extensions from the left onto the correct descriptions on the right.
Explanation/Reference:
Explanation:
LMI Extensions
In addition to the basic Frame Relay protocol functions for transferring data, the consortium Frame Relay specification includes LMI extensions that make
supporting large, complex internetworks easier. Some LMI extensions are referred to as "common" and are expected to be implemented by everyone who
adopts the specification. Other LMI functions are referred to as "optional." A summary of the LMI extensions follows:
• Virtual circuit status messages (common)—Provide communication and synchronization between the network and the user device, periodically
reporting the existence of new PVCs and the deletion of already existing PVCs, and generally provide information about PVC integrity. Virtual circuit status
messages prevent the sending of data into black holes—that is, over PVCs that no longer exist.
• Multicasting (optional)—Allows a sender to transmit a single frame but have it delivered by the network to multiple recipients. Thus, multicasting
supports the efficient conveyance of routing protocol messages and address resolution procedures that typically must be sent to many destinations
simultaneously.
• Global addressing (optional)—Gives connection identifiers global rather than local significance, allowing them to be used to identify a specific interface
to the Frame Relay network. Global addressing makes the Frame Relay network resemble a local-area network (LAN) in terms of addressing; Address
Resolution Protocols, therefore, perform over Frame Relay exactly as they do over a LAN.
• Simple flow control (optional)—Provides for an XON/XOFF flow control mechanism that applies to the entire Frame Relay interface. It is intended for
devices whose higher layers cannot use the congestion notification bits and that need some level of flow control.
Reference: https://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1918.html
QUESTION 514
Refer to the exhibit. Which option prevents routing updates for 10.255.255.0/30 from being sent to the DHCP router, while still allowing all other routing
update messages?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 515
A network engineer configured an IOS router to send syslog messages to a Window syslog server. Several events occurred on the IOS router, and the
network engineer noticed that Windows syslog server had not received any messages from the IOS router. What is the reason for this?
A. Either a firewall between the two devices or an ACL on the router is blocking TCP port 514.
B. Either a firewall between the two devices or an ACL on the router is blocking UDP port 514.
C. Either a firewall between the two devices or an ACL on the router is blocking IP protocol number 514.
D. Either a firewall between the two devices or an ACL on the router is blocking UDP port 512.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 516
Which two configurations can a PPPoE client support? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Restrictions for PPP over Ethernet Client
The PPPoE client does not support the following:
• More than ten clients per customer premises equipment (CPE)
• Quality of service (QoS) transmission with queueing on the dialer interface
• Dial-on-demand
• Easy VPN
• Native IPv6
• PPPoE client over ATM permanent virtual circuit (PVC)
• Coexistence of the PPPoE client and server on the same device
• Multilink PPP (MLP) on dialer interfaces
• Nonstop forwarding (NSF) with stateful switchover (SSO)
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-3s/bba-xe-3s-book/bba-pppoe-client-xe.pdf
QUESTION 517
Which Cisco Express Forwarding table or tables hold forwarding information?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Information conventionally stored in a route cache is stored in several data structures for Cisco Express Forwarding switching.
The data structures provide optimized lookup for efficient packet forwarding. The two main components of Cisco Express Forwarding operation are the
forwarding information base (FIB) and the adjacency tables.
The FIB is conceptually similar to a routing table or information base. A router uses this lookup table to make destination-based switching decisions during
Cisco Express Forwarding operation. The FIB is updated when changes occur in the network and contains all routes known at the time. For more
information, see the FIB Overview section.
Adjacency tables maintain Layer 2 next-hop addresses for all FIB entries. For more information, see the CEF Adjacency Tables Overview section.
This separation of the reachability information (in the Cisco Express Forwarding table) and the forwarding information (in the adjacency table), provides a
number of benefits:
The adjacency table can be built separately from the Cisco Express Forwarding table, allowing both to be built without any packets being process-switched.
The MAC header rewrite used to forward a packet is not stored in cache entries, so changes in a MAC header rewrite string do not require validation of
cache entries.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/isw-cef-15-mt-book/isw-cef-overview.html
QUESTION 518
A network engineer is configuring a DHCP server to support a specialized application. Which additional DHCP feature must be enabled to support the
delivery of various additional parameters to DHCP clients?
A. vendor extensions
B. modules
C. options
D. scopes
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 519
Which two statements about Frame Relay LMI autosense are true on a Router? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/wan/configuration/guide/fwan_c/wcffrely.html
QUESTION 520
What does the number 16 in the following command represent?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 521
What is the function of the snmp-server enable traps and snmp-server host 192.168.1.3 traps version 2c public commands?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 522
Which two options for authenticating a user who is attempting to access a network device are true? (Choose two.)
A. PAP
B. 802.1x
C. CHAP
D. TACACS+
E. RADIUS
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 523
Which three statements about IPv6 EIGRP are true? (Choose three.)
A. EIGRP neighbor relationships can be formed only on the configured IPv6 address.
B. It supports EUI-64 addresses only.
C. EIGRP route advertisement is configured under the interface configuration.
D. EIGRP neighbor relationships are formed using the link-local address.
E. EIGRP route advertisement is configured under the ipv6 router eigrp configuration.
F. An IPv6 EIGRP router ID is required.
Explanation/Reference:
QUESTION 524
DRAG DROP
Drag and drop the Cisco IOS DHCP relay agent configuration commands from the left onto the correct effects on the right.
Explanation/Reference:
Explanation:
QUESTION 525
The Neighbor Discovery Protocol in IPv6 replaces which protocol in IPv4?
A. ICMP
B. CDP
C. ARP
D. IGMP
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 526
Which two options are components of a dual stack? (Choose two.)
A. Layer 2 switch
B. IPv6 traffic
C. OSPF
D. Layer 3 switch
E. IPv4 traffic
F. EIGRP
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 527
If you convert a WAN connection with OSPF from T1 to a Frame relay circuit, which two actions must you take to enable the connection? (Choose two.)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Frame Relay is a non-broadcast multi-access (NBMA) environment so when migrating to a Frame Relay circuit we must change the OSPF network to non-
broadcast. This type of network does not accept broadcast and muticast packets so we must manually configure neighbors for OSPF.
QUESTION 528
Which keyword of the aaa authentication ppp command applies to PAP only?
A. local
B. local-case
C. krb5
D. enable
E. Line
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 529
Which two statements about uRPF are true? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 530
Which three functionalities are specific to stateful NAT64? (Choose three.)
Explanation/Reference:
Explanation:
Differences Between Stateless NAT64 and Stateful NAT64
Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/white_paper_c11-676277.html
QUESTION 531
In SNMP v3, which security level provides encryption of the data?
A. noAuthNoPriv
B. authPriv
C. authMember
D. authNoPriv
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.pdf
QUESTION 532
Which technology does Easy Virtual Network use?
A. MP-BGP
B. MPLS
C. DMVPN
D. VRF-Lite
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 533
Refer to exhibit. A network engineer is unable to make VRF lite EIGRP adjacency work. There is nothing wrong with communication between R1 and R2.
What command will eliminate the issue when executed on both routers?
A. (config-router-af)#network 209.165.202.128.0.0.0.31
B. (config)#ip multicast-routing
C. (config-router-af)#autonomous-system 100
D. (config-vrf)#route target both 100:1
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
To configure the autonomous-system number for EIGRP to run within a VPN routing and forwarding (VRF) instance, use the “autonomous-system”
command in address-family configuration mode. In particular:
QUESTION 534
Which value does a point-to-point GRE tunnel use to identity a peer?
A. VC ID
B. DLCI
C. IP address
D. configured multicast address
E. Mac address
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 535
Which type of NetFlow information is displayed when the show ip flow export command is executed?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 536
Which technology is required on an EVN trunk interface?
A. VRF-Lite
B. 802.1q
C. IS-IS
D. NAT
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
An EVN trunk is allowed on any interface that supports 802.1q encapsulation, such as Fast Ethernet, Gigabit Ethernet, and port channels.
Reference:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.pdf
QUESTION 537
A network engineer wants to baseline the network to determine suitability for real-time voice applications. Which IP SLA operation is best suited for this task?
A. ICMP -echo
B. UDP -connect
C. TCP -connect
D. ICMP -jitter
E. UDP -jitter
F. UDP -echo
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The IP SLAs VoIP UDP jitter operation accurately simulates VoIP traffic using common codecs and calculates consistent voice quality scores (MOS and
ICPIF) between Cisco devices in the network.
Note:
+ UDP Jitter: generates UDP traffic and measures Round-trip Delay, One-way Delay, One-way Jitter, One-way Packet Loss, and overall Connectivity.
+ UDP-echo: measures Round-trip Delay for UDP traffic.
There is also a special “UDP Jitter for VoIP” which can simulate various codecs and spits out voice quality scores (MOS, and ICPIF)
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_udp_jitter_voip.html
QUESTION 538
Refer to the exhibit.
If this configuration is applied to a device that redistributes EIGRP routes into OSPF, which two statements about the behavior of the device are true?
(Choose two.)
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 539
DRAG DROP
Refer to the exhibit. You are configuring the R1 Serial0 interface for a multipoint connection. Drag and drop the required configuration statements from the
left onto the corresponding locations from the diagram on the right.
Select and Place:
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
A - Interface serial 0
B - Encapsulation frame-relay
C – Interface serial 0.1 multipoint
D – frame-relay map ip 192.168.1.1 100 broadcast
QUESTION 540
DRAG DROP
Drag and drop the methods supported by the aaa authorization command from the left into the correct descriptions on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 541
Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT?
A. It allows host 192.168.1.50 to access external websites using TCP port 8080.
B. It represents an incorrect NAT configuration because it uses standard TCP ports.
C. It allows external clients to connect to a web server hosted on 192.168.1.50.
D. It allows external clients coming from public IP 209.165.201.1 to connect to a web server at 192.168.1.50.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 542
Which command denies the default route?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 543
Refer to the exhibit. A network engineer has configured NTP on a Cisco router, but the time on the router us still incorrect. What is the reason for this
problem?
A. The router is not syncing with the peer, and the NTP request and response packets are not being exchanged.
B. The router is not syncing with the peer, even though the NTP request and response packets are being exchanged.
C. The router is syncing with the peer, and the NTP request and response packets are being exchanged.
D. The router is dropping all NTP packets.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
A pound sign (#) displayed next to a configured peer in the show ntp associations command output indicates that the router isn't syncing with the peer even
though NTP request and response packets are being exchanged.
Reference: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc.html
QUESTION 544
Refer to the exhibit.
After configuring the rotes, the network engineer executes the show ip route command. What is the expected result?
A. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 2 subbnetsC 10.0.2.0 is directly connected, FastEthernet0/0C 10.0.1.0 is
directly connected, FastEthernet0/1S” 0.0.0.0/0[1/0] via 10.0.2.1 [1/0] via 10.0.1.1Router #
B. Gateway of last resort is 10.0.1.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.1.0 is directly connected, FastEthernet0/1 S” 0.0.0.0/0 [1/0]
via 10.0.1.1 Router #
C. Gateway of last resort is not set Router #
D. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.2.0 is directly connected, FastEthernet0/0 S”0.0.0.0/0 [1/0]
via 10.0.2.1 Router #
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The show ip route command shows the global routing table routes, not the VRF routes.
QUESTION 545
Based on the configuration command below, which statement is true?
A. All syslog messages that are generated will indicate the date and time when the event occurred.
B. All high-priority syslog messages that are generated will indicate the data and time when the event occurred.
C. All IOS services will indicate the data and time when the service was last used.
D. All IOS services will indicate the data and time when the service was started.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html#wp1055126
QUESTION 546
Which two options can you use to configure an EIGRP stub router? (Choose two.)
A. not-so-stubby
B. receive-only
C. totally-stubby
D. external
E. summary-only
F. summary
Correct Answer: BF
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
eigrp stub [ [receive-only] || [connected] [static] [summary] [redistributed] ] The following options are available:
Receive-only: router only accepts, but does not explicitly advertise, any routes. This option may not be used in combination with any other options.
Connected: router advertises directly-connected networks
Static: router advertises any configured static routes
Summary: router advertises any configured summarized routes
Redistributed: router advertises any routes learned from another protocol, such as OSPF The eigrp stub configuration need only be entered on the spoke
routers. The hub routers determine that they are talking to a stub router by examining the TLV in the HELLO packet.
Reference: https://www.cisco.com/en/US/technologies/tk648/tk365/technologies_white_paper0900aecd8023df6f.html
QUESTION 547
Which Cisco Express Forwarding component(s) contain forwarding information?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 548
Which command is needed to get the ip address assigned from the PPPOE server?
A. Interface dialer
B. pppoe enable
C. ip address negotiated
D. ip address auto negotiated
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 549
Which security level is supported throughout all SNMP versions?
A. authPriv
B. authNoPriv
C. noAuthNoPriv
D. noAuthoPriv
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 550
An administrator needs to setup an NTP client to provide updates to local without synchronizing to server. What is the command?
A. Serve
B. Serve-only
C. peer
D. query
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Serve:
--Permits router to reply NTP request;
--Reject NTP updates;
--NTP queries are Accepted.
Serve-Only:
--Permits router to respond to NTP request ONLY;
--Reject to synchronize local time;
--Not access control queries
QUESTION 551
Which three protocols are supported with EVN? (Choose three.)
A. IS-IS
B. EIGRP
C. RIP
D. OSPFv2
E. BFD
F. BGP
Explanation/Reference:
Explanation:
An EVN trunk is allowed on any interface that supports 802.1q encapsulation, such as Fast Ethernet, Gigabit Ethernet, and port channels.
There are additional platform and line-card restrictions for an EVN trunk. Check Cisco Feature Navigator, www.cisco.com/go/cfn for supported platforms and
line cards.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.html
QUESTION 552
Which two statements about PAP and CHAP authentication are true? (Choose two)
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 553
Refer to the exhibit.
An engineer is enabling VPN service for a customer and notices this output when placing the customer-facing interface into a VRF. Which action corrects the
issue?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 554
Which two reductions are the correct reductions if the IPv6 address 2001:0d02:0000:0000:0014:0000:0000:0095? (Choose two)
A. 2001:0d02:::0014:::0095
B. 2001:d02::14::95
C. 2001:d02:0:0:14::95
D. 2001:d02::14:0:0:95
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
We can't use triple colons (:::) in IPv6 presentation. Also we can't use double colons (::) twice. You can use it only once in any address because if two double
colons are placed in the same address, there will be no way to identify the size of each block of 0s.
So
2001:0d02:0000:0000:0014:0000:0000:0095 can be compressed to
2001:d02:0:0:14::95
OR
2001:d02::14:0:0:95
QUESTION 555
Refer to the exhibit.
The 6to4 overlay tunnel configuration has been applied on each router to join isolated IPv6 networks over a IPv4 network.
Which statements regarding the 6to4 overlay tunnel is true?
A. The least significant 32 bits in the address referenced by the ipv6 route 2002::/16 Tunnel0 command will correspond to the interface E0/0 IPv4 address
B. The least significant 32 bits in the address referenced by the ipv6 route 2002::/16 Tunnel0 command will correspond to the IPv4 address assigned to the
tunnel source
C. The configuration is invalid since the tunnel source command must be configured with an IPv6 address
D. This is actually a configuration example of an IPv4-compatible tunnel and not a 6to4 tunnel
E. This is actually a configuration example of an ISATAP overlay tunnel and not a 6to4 tunnel
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
6to4 tunnels use IPv6 addresses that concatenate 2002::/16 with the 32-bit IPv4 address of the edge router, creating a 48-bit prefix.
The tunnel interface on R1 has an IPv6 prefix of 2002:4065:4001:1::/64, where 4065:4001 is the hexadecimal equivalent of 64.101.64.1, the IPv4 address of
its interface in the IPv4 network.
The tunnel interface on R2 has an IPv6 prefix of 2002:4065:4101:1::/64, where 4065:4101 is the hexadecimal equivalent of 64.101.65.1, the IPv4 address of
its interface in the IPv4 network.
When R1 receives a packet with IPv6 destination address of 2002:4065:4101:1:: (from the left IPv6 network, for example) R1 will:
* Take the IPv6 destination address of that packet (2002:4065:4101:1::) and convert it into an IPv4 address. In this case, the IPv4 address is 40.65.41.01 in
hexa, which is 64.101.65.1 in decimal format.
* R1 encapsulates the IPv6 packet in an IPv4 packet with a destination address of 64.101.65.1; the packet is routed normally through the IPv4 network to R2
* R2 receives the IPv4 packet, decapsulates and routes it normally to its final IPv6 destination.
QUESTION 556
What happens when an IPv6 enabled router running 6to4 must send a packet to a remote destination and the next hop is the address of 2002::/16?
A. The IPv6 packet has its header removed and replaced with an IPv4 header
B. The IPv6 packet is encapsulated in an IPv4 packet using an IPv4 protocol type of 41
C. The IPv6 packet is dropped because that destination is unable to route IPv6 packets
D. The packet is tagged with an IPv6 header and the IPv6 prefix is included
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
6to4 and Teredo are dynamic tunneling techniques used by desktop operating systems to help their users gain access to the IPv6 Internet. These techniques
tunnel the IPv6 packets within IPv4 packets.
The 6to4 method places the IPv6 packets within IPv4 protocol 41 packets.
The Teredo method places the IPv6 packets within IPv4 packets with a UDP 3544 header.
QUESTION 557
What are three IPv6 transition mechanisms? (Choose three)
A. 6to4 tunneling
B. VPN tunneling
C. GRE tunneling
D. ISATAP tunneling
E. PPP tunneling
F. Teredo tunneling
Explanation/Reference:
Explanation:
6 to 4 tunneling: This mechanism allows IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup. The main advantage
of this technology is that it requires no end-node reconfiguration and minimal router configuration but it is not intended as a permanent solution.
ISATAP tunneling (Intra-Site Automatic Tunnel Addressing Protocol): is a mechanism for transmitting IPv6 packets over IPv4 network. The word "automatic"
means that once an ISATAP server/router has been set up, only the clients must be configured to connect to it.
Teredo tunneling: This mechanism tunnels IPv6 datagrams within IPv4 UDP datagrams, allowing private IPv4 address and IPv4 NAT traversal to be used.
In fact, GRE tunneling is also a IPv6 transition mechanism but is not mentioned in BSCI so we shouldn't choose it (there are 4 types of IPv6 transition
mechanisms mentioned in BSCI; they are manual, 6-to-4, Teredo and ISATAP).
QUESTION 558
What are two rules for compacting IPv6 addresses? (Choose two.)
A. Every 16-bit segment that consists of all zeroes can be represented with a single colon.
B. The trailing zeroes in any 16-bit segment do not have to be written.
C. The leading zeroes in any 16-bit segment do not have to be written.
D. Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon.
E. The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two.
F. Two zeroes in the middle of any 16-bit segment do not have to be written.
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 559
Refer to the exhibit.
A. Interface authentication must be configured.
B. The routing processes must be configured with an area ID.
C. IP unicast routing must be enabled.
D. IPv4 addresses must be applied to the interfaces.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 560
Which functionality is required within an IP router that is situated at the boundary of an IPv4 network and an IPv6 network to allow communication between
IPv6-only and IPv4-only nodes?
A. Autoconfiguration
B. Automatic 6to4 Tunnel
C. Automatic 6to4 Relay
D. Network Address Translator-Protocol Translator (NAT-PT)
E. Intrasite Automatic Tunnel Address Protocol (ISATAP)
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
NAT-PT provides IPv4/IPv6 protocol translation. It resides within an IP router, situated at the boundary of an IPv4 network and an IPv6 network. By installing
NAT-PT between an IPv4 and IPv6 network, all IPv4 users are given access to the IPv6 network without modification in the local IPv4-hosts (and vice versa).
Equally, all hosts on the IPv6 network are given access to the IPv4 hosts without modification to the local IPv6-hosts. This is accomplished with a pool of IPv4
addresses for assignment to IPv6 nodes on a dynamic basis as sessions are initiated across IPv4-IPv6 boundaries.
QUESTION 561
During the IPv6 auto configuration, what does the device append to the 64-bit prefix that it receives from the router to create its IPv6 address?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The automatic configuration is a great feature of IPv6. Imagine you have to manually configure an IPv6 address with 128-bit long, what a pain!
With this feature, it is no longer necessary to configure each host manually. But notice that host only autonomously configures its own Link- local address (the
IP address used on a LAN). The Link-local address can be created automatically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based
on 48-bit MAC address).
For example, if your MAC address is 00:12:34:56:78:9a, your 64-bit interface identifier is 0012:34FF:FE56:789a (16-bit FFFE is inserted in the middle). And
notice that the notation has been changed because IPv6 addresses require 16-bit pieces to be separated by ":".
Then, according to the RFC 3513 we need to invert the Universal/Local bit ("U/L" bit) in the 7th position of the first octet (start counting from 0). The "u" bit is
set to 1 to indicate Universal, and it is set to zero (0) to indicate local scope. In this case we set this bit to 1 because the MAC address is universally unique.
Thus the result is: 0212:34FF:FE56:789a.
Finally, add the link-local prefix FE80 to create the full IPv6 address: FE80:0:0:0:0212:34FF:FE56:789a (or FE80::212:34FF:FE56:789a in short form)
Note: The reason for inverting the "U/L" bit is to allow ignoring it for short values in the manual configuration case. For example, you can manually assign the
short address fc80::1 instead of the long fc80:0:0:0:0200::1
QUESTION 562
Refer to the exhibit.
A. OSPFv3 adjacency has been lost, which causes the neighbor to be considered Stale.
B. Aggregate global addresses are always used between IPv6 neighbors.
C. OSPFv3 adjacency will not work between link-local addresses.
D. R1 used ICMP to learn about this neighbor.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
ICMP is a ping echo. IPv6 uses ICMP to learn about its neighbor.
QUESTION 563
Which IPv6 address correctly compresses the IPv6 unicast address 2001:0:0:0:0DB8:0:0:417A?
A. 2001:0DB8:417A
B. 2001::0DB8::417A
C. 2001:::0DB8::417A
D. 2001:0DB8:0:0:417A
E. 2001::DB8:0:0:417A
F. 2001:::0DB8:0:0:417A
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The point of this question is the about the different form of Ipv6 address.
The IPv6 address is 128 bits long, written as eight 16-bit pieces, separated by colons.
Each piece is represented by four hexadecimal digits. You can compact multiple contiguous fields of zero even further. This is the exception to the rule that at
least one digit must be present in every field. You can replace multiple fields of zeros with double colons (::).
Note that :: can replace only one set of contiguous zero fields.
Multiple ::s would make the address ambiguous.
QUESTION 564
Refer to the exhibit. What two statements are true? (Choose two)
A. Interface FastEthernet 0/0 was configured with the ipv6 ospf 1 area 1 command.
B. OSPF version 2 has been enabled to support IPv6.
C. The IP address of the backup designated router (BDR) is FE80::100:AABB:1731:5808.
D. The output was generated by the show ip interface command.
E. The router was configured with the commands: router ospf 1 network 172.16.6.0 0.0.0.255 area 1
F. This is the designated router (DR) on the FastEtheroet 0/0 link.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
For example, instead of using the network area command to identify networks that are part of the OSPFv3 network, the interfaces are directly configured to
specify that IPv6 networks are part of the OSPFv3 network.
There are several commonly used OSPFv3 show commands, including the show ipv6 ospf [process-id] [area-id] interface [interface] command.
QUESTION 565
Which two statements about the enable secret and enable password commands are true? (Choose two.)
A. If both commands are missing from the global configuration, vty lines use the console password.
B. The enable secret and enable password command overrides enable password.
C. The enable secret command overrides enable password.
D. The enable secret command is backwards-compatible with more versions of IOS.
E. The enable password command has a stronger encryption algorithm than enable secret.
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 566
Which statement is true about the command ipv6 ospf 1 area 0?
A. It must be issued in router global configuration mode to enable the OSPF process for IPv6.
B. It must be issued in interface configuration mode to enable the OSPF process for IPv6.
C. It must be issued before the network command to enable the OSPF process for IPv6.
D. It must be issued after the network command to enable the OSPF process for IPv6.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 567
Refer to the exhibit. Which interoperability technique implemented on the dual-stack routers would allow connectivity between IPv6 sites across automatic
created tunnels using the 2002::/16 prefix?
A. Dual Stack
B. NAT-PT
C. 6to4 tunnel
D. GRE tunnel
E. ISATAP tunnel
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 568
Refer to the exhibit. Based on the output from the show command on RT1 which statement is true?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
OSPFv3 is an updated version of OSPF designed to accommodate IPv6 natively. OSPFv3 uses the multicast address FF02::5 and FF02::6, but like EIGRP it
uses its link-local address as the source address in advertisements.
QUESTION 569
Your Company trainee asks you, in the context of IPv6 and OSPF, what best describes a type 9 LSA?
A. Link LSA
B. Interarea prefix LSA for ABRs
C. Router LSA
D. Switch LSA
E. Intra-area prefix LSA
F. None of the above
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 570
Company plans on migrating their network from IPv4 to IPv6 in the near future. Which three techniques can be used to transition from IPv4 to IPv6? (Select
three.)
A. Dual stack
B. NAT
C. Flow label
D. Mobile IP
E. 6to4 tunneling
F. Anycast
G. MBGP
Correct Answer: ABE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 571
Which command must be globally enabled on a Cisco router to support IPv6?
A. ip routing ipv6
B. ipv6 unicast-routing
C. ipv6 routing
D. ip classless
E. ipv6 cef
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 572
What number is a valid representation for the 200F:0000:AB00:0000:0000:0000:0000/56 IPv6 prefix?
A. 200F:0:0:AB/56
B. 200F:0:AB00::/56
C. 200F::AB00/56
D. 200F:AB/56
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 573
Company has migrated to IPv6 in their network.
Which three IPv6 notations represent the same address? (Select three.)
A. 2031::130F::9C0:876A:130B
B. 2031:0000:130F:0000:0000:09C0:876A:130B
C. 2031:0:130F:::9C0:876A:130B
D. 2031::130F:0::9C0:876A:130B
E. 2031:0:130F:0:0:09C0:876A:130B
F. 2031:0:130F::9C0:876A:130B
Explanation/Reference:
Explanation:
With IP version 6, octets containing all zero's can be simply represented as :, while consecutive zero fields can be represented as ::.
ANSWER choices E and F are simply the shorthand version of the fully written IPv6 address shown in choice.
QUESTION 574
Which statement is true about 6to4 tunneling?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
6to4 tunnel is a technique which relies on reserved address space 2002::/16 (you must remember this range).
These tunnels determine the appropriate destination address by combining the IPv6 prefix with the globally unique destination 6to4 border router’s IPv4
address, beginning with the 2002::/16 prefix, in this format:
2002:border-router-IPv4-address::/48
Because the border-router-IPv4-address is added, we will have a /48 prefix (we all know an IPv4 address consists of 32 bits).
An example of a 6to4 address with the border-router-IPv4-address of 192.168.1.2 is 2002:C0A8:01:02::/48.
QUESTION 575
In a comparison of an IPv4 header with an IPv6 header, which three statements are true? (Choose three)
A. An IPv4 header includes a checksum. However, an IPv6 header does not include one.
B. A router has to recompute the checksum of an IPv6 packet when decrementing the TTL.
C. An IPv6 header is half the size of an IPv4 header.
D. An IPv6 header has twice as many octets as an IPv4 header.
E. An IPv6 header is simpler and more efficient than an IPv4 header.
F. The 128-bit IPv6 address makes the IPv6 header more complicated than an IPv4 header.
Explanation/Reference:
Explanation:
The image below shows the differences between an IPv4 header and an IPv6 header:
Reference:
https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-13/ipv6-internals.html
QUESTION 576
Which statement about conditional debugging is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 577
Refer to the exhibit.
How would you confirm on R1 that load balancing is actually occurring on default-network (0.0.0.0)?
A. Use ping and the show ip route command to confirm the timers for each default network resets to 0
B. Load balancing does not occur over default networks; the second route will only be used for failover.
C. Use an extended ping along with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.
D. Use the traceroute command to an address that is not explicitly in the routing table.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The simplest method to test load balancing is to use the "traceroute" command. If load balancing is working correctly, we will see different paths to reach the
destination each time we use that command.
Unknown address will be routed via the default-network 0.0.0.0 so we must use an address that is not explicitly in the routing table.
QUESTION 578
An IPv6 overlay tunnel is required to communicate with isolated IPv6 networks across an IPv4 infrastructure. There are currently five IPv6 overlay tunnel
types. Which three IPv6 overlay tunnel statements are true? (Choose three)
A. Overlay tunnels can only be configured between border routers capable of supporting IPv4 and IPv6.
B. Overlay tunnels can be configured between border routers or between a border router and a host capable of supporting IPv4 and IPv6.
C. Cisco IOS supports manual, generic, routing encapsulation (GRE), IPv6-compatible, 4to6, and multiprotocol Label Switching (MPLS) Overlay tunneling
mechanism.
D. Cisco IOS supports manual, generic routing encapsulation (GRE), IPv4-compatible, 6to4, and IntraSite Automatic Tunnel Addressing Protocol (ISATAP)
overlay tunneling mechanisms.
E. A manual overlay tunnel supports point-to-multipoint tunnels capable of carrying IPv6 and Connectionless Network Service (CLNS) packets.
F. Overlay tunneling encapsulates IPv6 packets in IPv4 packets for delivery across an IPv4 infrastructure.
Explanation/Reference:
Explanation:
B: Overlay tunnels can be configured between border routers or between a border router and a host capable of supporting IPv4 and IPv6.
D. Cisco IOS supports manual, generic routing encapsulation (GRE), IPv4-compatible, 6to4, and IntraSite Automatic Tunnel Addressing Protocol (ISATAP)
overlay tunneling mechanisms.
F: Overlay tunneling encapsulates IPv6 packets in IPv4 packets for delivery across an IPv4 infrastructure.
QUESTION 579
What would you configure on SNMPv3 to allow authentication?
A. Authpriv
B. authnopriv
C. noauthnopriv
D. authmember
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 580
Which of the following NSAP addresses is a private, locally administered address?
A. 39.0f01.0002.0000.0c00.1111.00
B. 48.0f01.0002.0000.0c00.1111.00
C. 49.0004.30ac.0000.3090.c7df.00
D. 52.0f01.0002.0000.0c00.1111.00
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 581
A policy needs to be implemented on Router B so that any traffic sourced from 172.16.10.0/24 will be forwarded to Router C.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 582
Which address would successfully summarize only the networks seen?
A. 192.168.0.0/24
B. 192.168.8.0/20
C. 192.168.8.0/21
D. 192.168.12.0/20
E. 192.168.16.0/21
F. These networks cannot be summarized.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Let's suppose it is a /20 then we would have addresses from 192.168.0.1 to 192.168.15.255
Now let's suppose it is a /21 then we would have addresses from 192.168.8.1 to 192.168.15.255
So both summaries encompass the networks we want to summarize but the second one is the most
restrictive one as it only encompasses the networks we were asked to summarize and not others so it is the correct summary.
In fact just count the number if subnets which is 8 and find the exponent of 2 which is 8, that gives you 3 and to find out the summary mask just do /24 - 3
= /21.
8 00001 000
9 00001 001
10 00001 010
11 00001 011
12 00001 100
13 00001 101
14 00001 110
15 00001 111
I've bolded the bits in common there are 5 so 16+5=21 which is mask and address is 192.168.8.0
QUESTION 583
What is the correct configuration to enable router P4 to exchange RIP routing updates with router P1 but not with router P3?
A. P4(Config)# interface fa0/0
P4(Config-if)# neighbor 192.168.10.3
P4(config-if)# passive-interface fa0/0
B. P4(config)# router rip
P4(config-router)# neighbor 192.168.10.3
P4(Config-router)# passive-interface fa0/0
C. P4(config)# interface fa0/0
P4(config-if)# neighbor 192.168.10.3
P4(config-if)# passive interface 192.168.10.34
D. P4(config)# router rip
P4(config-router)# neighbor 192.168.10.34 no broadcast
P4(config-router)# passive-interface fa0/0
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
When you configure router P1 to be the neighbor of P4 with a passive interface, the RIP routing updates will be exchanged with the neighbor ONLY.
QUESTION 584
Which two statements about 6to4 tunneling are accurate? (Choose two)
A. Prepending a reserved IPv6 code to the hexadecimal representation of 192.168.0.1 facilitates 6to4 tunneling.
B. Each 6to4 site receives a /48 prefix in a 6to4 tunnel.
C. 2002::/48 is the address range specifically assigned to 6to4.
D. Prepending 0x2002 with the IPv4 address creates an IPv6 address that is used in 6to4 tunneling.
E. 6to4 is a manual tunnel method.
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 585
Which interoperability technique implemented on the router would allow Host-1 to communicate with Host-2?
A. Dual Stack
B. NAT-PT
C. 6to4 tunnel
D. GRE tunnel
E. ISATAP tunnel
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 586
Refer to the exhibit.
Which statement is true?
A. RTA will redistribute the RIP routers into the NSSA as type 7 LSAs.
RTB will translate the type 7 LSAs into type LSAs and flood them throughout the OSPF backbone.
B. RTA will redistribute the RIP routers into the NSSA as type 7 LSAs.
RTB will flood the type 7 LSAs throughout the backbone.
C. RTA will redistribute the RIP routers into the NSSA as type 5 LSAs.
RTB will flood the type 5 LSAs throughout the backbone.
D. RTA will redistribute the RIP routers into the NSSA as type 5 LSAs.
RTB will translate the type of 5 LSAs unto type 7 LSAs and flood them throughout the OSPF backbone.
E. RTA will not redistribute the RIP routers into the NSSA.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 587
To configure 6to4 tunneling on a dual-stack edge router. Which three of the following are valid components in 6to4 Tunneling configuration? (Choose Three)
Explanation/Reference:
QUESTION 588
Which three statements about configuring OSPF in a IPv6 network are true? (Choose three)
Explanation/Reference:
QUESTION 589
Refer to the exhibit.
Which two statements are true about the router configuration? (Choose two)
A. This configuration allows applications on the same segment to communicate via IPv4 or IPv6.
B. This configuration is referred to as a dual-stack 6to4 tunnel.
C. This configuration is referred to as a dual stack.
D. This configuration will attempt to route packets using IPv4 first, and if that fails, then IPv6.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Dual stack (Figure 1 below) runs both IPv4 and IPv6 protocol stacks on a router in parallel, making it similar to the multiprotocol network environments of the
past, which often ran Internetwork Packet Exchange (IPX), AppleTalk, IP, and other protocols concurrently.
The technique of deploying IPv6 using dual-stack backbones allows IPv4 and IPv6 applications to coexist in a dual IP layer routing backbone.
The IPv4 communication uses the IPv4 protocol stack, and the IPv6 communication uses the IPv6 stack.
As a transition strategy, dual stack is ideal for campus networks with a mixture of IPv4 and IPv6 applications.
QUESTION 590
When implementing a 6to4 tunnel, which IPv6 address is the correct translation of the IPv4 address 192.168.99.1?
A. c0a8:6301:2002::/48
B. 2002:c0a8:6301::/48
C. 2002:c0a8:6301::/8
D. 2002::/16
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
16 bits for the most significant 6to4 reserved bits (2002::/16) + 32 bits source ipv4 address (traslated in HEX format) = 48 bits.
QUESTION 591
Refer to the exhibit. Will redistributed RIP routes from OSPF Area 2 be allowed in Area 1?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Area 1 is a NSSA so we can inject EIGRP routes into this area with Type 7 LSAs. Notice that Type 7 LSAs can only be existed in a NSSA. The NSSA ABR of
area 1 must converted it into LSA Type 5 before flooding to the whole OSPF domain.
When redistribute RIP into area 2, LSA Type 5 will be created an sent through area 0. But a NSSA is an extension of a stub area. The stub area
characteristics still exist, which includes no type 5 LSAs allowed.
Note: A stub area only allows LSA Type 1, 2 and 3.
QUESTION 592
Study this exhibit below carefully.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The command “distribute-list 10 in Serial0” will create an incoming distribute list for interface serial 0 and refers to access list 10.
So it will permit routing updates from 10.0.x.x network while other entries (in this case the 10.1.0.0/24 and 172.24.1.0/24 networks) will be filtered out from
the routing update received on interface S0.
QUESTION 593
Which three route filtering statements are true? (Choose three)
A. After the router rip and passive-interface s0/0 commands have been issued, the s0/0 interface will not send any RIP updates, but will receive routing
updates on that interface.
B. After the router eigrp 10 and passive-interface s0/0 commands have been issued, the s0/0 interface will not send any EIGRP updates, but will receive
routing updates on that interface
C. After the router ospf 10 and passive-interface s0/0 commands have been issued , the s0/0 interface will not send any OSPF updates, but will receive
routing updates on that interface
D. When you use the passive-interface command with RIPv2, multicasts are sent out the specified interface
E. When you use the passive-interface command with EIGRP, hello messages are not sent out the specified interface
F. When you use the passive-interface command with OSPF, hello messages are not sent out the specified interface
Explanation/Reference:
Explanation:
Passive-interface command is used in all routing protocols to disable sending updates out from a specific interface. However the command behavior varies
from one protocol to another”
-- In RIP, this command will not allow sending multicast updates via a specific interface but will allow listening to incoming updates from other RIP speaking
neighbors. This means that the router will still be able to receive updates on that passive interface and use them in its routing table.
-- In EIGRP and OSPF the passive-interface command stops sending outgoing hello packets, hence the router can not form any neighbor relationship via the
passive interface. This behavior stops both outgoing and incoming routing updates.
QUESTION 594
Router RTA is configured as follows:
A. no routing updates will be sent from router RTA on interface BRIO to router RTX
B. router RTA will not advertise the 10.0.0.0 network to router RTX
C. the route to network 172.16.1.0 will not be entered into the routing table on router RTA
D. user traffic from the 172.16.1.0 network is denied by access-list 44
E. the routing table on router RTA will be updated with the route to router RTW
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Distribute list are used to filter routing updates and they are based on access lists. In this case, an access list of 44 was created to deny the route from
network 172.16.1.0/24 so this route will not be entered into the routing table of RTA.
But the route from RTW can be entered because it is not filtered by the access list.
A and B are not correct because the distribute list is applied to the inbound direction of interface BRIO so outgoing routing updated will not be filtered.
D is not correct because distribute list just filters routing updates so user traffic from network 172.16.1.0 will not be denied.
QUESTION 595
Refer to the exhibit.
Which two statements are correct regarding the routes to be redistributed into OSPF? (Choose two)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 596
Into which two types of areas would an area border router (ABR) inject a default route? (Choose two)
A. stub
B. the autonomous system of an exterior gateway protocol (EGP)
C. NSSA
D. totally stubby
E. the autonomous system of a different interior gateway protocol (IGP)
F. area 0
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Both stub area & totally stubby area allow an ABR to inject a default route. The main difference between these 2 types of areas is:
+ Stub area replaces LSA Type 5 (External LSA – created by an ASBR to advertise network from another autonomous system) with a default route
+ Totally stubby area replaces both LSA Type 5 and LSA Type 3 (Summary LSA – created by an ABR to advertise network from other areas, but still within
the AS, sometimes called interarea routes) with a default route.
Below summarizes the LSA Types allowed and not allowed in area types:
QUESTION 597
What two situations could require the use of multiple routing protocols? (Choose two)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Simple routing protocols work well for simple networks, but networks grow and become more complex.
While running a single routing protocol throughout your entire IP internetwork is desirable, multiprotocol routing is common for a number of reasons, including
company mergers, multiple departments managed by multiple network administrators, multivendor environments, or simply because the original routing
protocol is no longer the best choice.
Often, the multiple protocols are redistributed into each other during a migration period from one protocol to the other.
QUESTION 598
Refer to the exhibit. Why is the 140.140.0.0 network not used as the gateway of last resort even though it is configured first?
A. The last default-network statement will always be preferred.
B. A route to the 140.140.0.0 network does not exist in the routing table.
C. Default-network selection will always prefer the statement with the lowest IP address.
D. A router will load balance across multiple default-networks; repeatedly issuing the show ip route command would show the gateway of last resort
changing between the two networks.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In the routing table of R3, we can only see the route 130.130.0.0/16 is learned via EIGRP (marked with D) and is being chosen as the “Gateway of last
resort”.
The route to 140.140.0.0 is not present in the routing table so the command “ip default-network 140.140.0.0” has no effect.
Remember that a route must appear in the routing table (via static route or learned via a routing protocol before it can be set as “Gateway of last resort” by
the “ip default-network” command.
QUESTION 599
How is network layer addressing accomplished in the OSI protocol suite?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
OSI network-layer addressing is implemented by using two types of hierarchical addresses: network service access-point addresses and network-entity titles.
A network service-access point (NSAP) is a conceptual point on the boundary between the network and the transport layers.
The NSAP is the location at which OSI network services are provided to the transport layer.
Each transport-layer entity is assigned a single NSAP, which is individually addressed in an OSI internetwork using NSAP addresses.
Network Service Address Point (NSAP) address is the equivalent of an IP address for an OSI network; A NSAP address is a hexadecimal address with a
length of up to 40 hexadecimal digits.
NSAP addresses are used in ATM and IS-IS.
QUESTION 600
Refer to the exhibit.
On the basis of the partial configuration, which two statements are correct? (Choose two)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In this case, the following algorithm is used when multiple distribute-lists are used:
1. First check which interface is being sent out. If it is Ethernet 0, distribute-list 2 is applied first. If the network is denied then no further checking is done for
this network. But if distribute-list 2 permits that network then distribute-list 1 is also checked. If both distribute-lists allow that network then it will be sent out.
Note: It is possible to define one interface-specific distribute-list per interface and one protocol-specific distribute-list for each process/autonomous-system.
QUESTION 601
Which routing protocol will continue to receive and process routing updates from neighbors after the passive interface router configuration command is
entered?
A. EIGRP
B. RIP
C. OSPF
D. IS-IS
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 602
Which three statements are true when configuring redistribution for OSPF? (Choose three)
Explanation/Reference:
QUESTION 603
What is the benefit of deploying IPv6 in a campus network using dual stack mode?
A. Dual Stack Mode takes advantage of IPv6 over IPv4 tunnel within a network.
B. IPv4 and IPv6 run alongside one another and have no dependency on each other to function
C. IPv4 and IPv6 share network resources.
D. IPv6 can depend on existing IPv4 routing, QoS, security, and multicast policies.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Deploying IPv6 in the campus using the dual-stack model offers several advantages over the hybrid and service block models.
The primary advantage of a dual stack model is that it does not require tunneling within the campus network.
The dual stack model runs the two protocols as ships in the night, meaning that IPv4 and IPv6 run alongside one another and have no dependency on each
other to function except that they share network resources. Both have independent routing.
QUESTION 604
To configure 6to4 on a dual-stack edge router. Which three of the following are valid in 6to4 Tunneling configuration? (Choose three)
A. IPv4 Tunnel IP address
B. Tunnel mode (6to4)
C. Tunnel Keepalives
D. IPv4 Tunnel Destination
E. IPv4 Tunnel Source.
F. 6to4 IPv6 address (within 2002::/16)
Explanation/Reference:
QUESTION 605
A network administrator is troubleshooting a redistribution of OSPF routes into EIGRP.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
By default, all routes redistributed into OSPF will be tagged as external type 2 (E2) with a metric of 20, except for BGP routes (with a metric of 1).
Note:
The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route.
A type 1 cost is the addition of the external cost and the internal cost used to reach that route.
QUESTION 606
Which three steps are most helpful in verifying proper route redistribution? (Choose three)
A. On the routers not performing the route redistribution, use the show ip route command to see if the redistributed routes show up.
B. On the ASBR router performing the route redistribution, use the show ip protocol command to verify the redistribution configurations.
C. On the ASBR router performing the route redistribution, use the show ip route command to verify that the proper routes from each routing protocol are
there.
D. On the routers not performing the route redistribution, use the show ip protocols command to verify the routing information sources.
E. On the routers not performing the route redistribution, use the debug ip routing command to verify the routing updates from the ASBR.
Explanation/Reference:
Explanation:
In order to verify proper route redistribution, use the "show ip route" command on all routers within the network, as well as the ABSR, to verify that the routes
are properly being advertised to all routers.
In addition, issuing the "show ip protocol" can be used on the router performing the redistribution to verify that routes are being redistributed into each other.
QUESTION 607
A router is configured for redistribution to advertise EIGRP routes into OSPF on a boundary router.
Given the configuration:
router ospf 1
redistribute eigrp 1 metric 25 subnets
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 608
Refer to the exhibit.
R1 and R2 belong to the RIP routing domain that includes the networks 10.20.0.0/16 and 10.21.0.0/16.
R3 and R4 are performing two-way route redistribution between OSPF and RIP.
A network administrator has discovered that R2 is receiving OSPF routes for the networks 10.20.0.0/16 and 10.21.0.0/16 and a routing loop has occurred.
Which action will correct this problem?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Distribute List is Like an access-list, use to deny or permit the routing update to pass through a router/interface.
Distribute List allow you apply an access list to a routing updates.
It can be applied on in or out bond of an interface under a routing process. e.g in fig.
R1 want to send a routing update to it neighbor, this update will go through from interface S0/0, router will check, is there some Distribute List apply to this
interface. If there is a Distribute List which would contain the allow route to pass through this interface.
QUESTION 609
Observe the exhibit.
If the command variance 3 were added to RTE, which path or paths would be chosen to route traffic to network X?
A. E-B-A
B. E-B-A and E-C-A
C. E-C-A and E-D-A
D. E-B-A, E-C-A and E-D-A
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Advertised distance of RTD is greater than FD of RTE-RTC-RTA, so the route through D will not be used.
Please notice that routes must first satisfy the feasible condition to be considered for “variance” command:
The feasible condition states:
“To qualify as a feasible successor, a router must have an AD less than the FD of the current successor route”.
In this case, the current successor route is E -> C -> A and the FD of this successor route is 20. But the AD of route E-D-A is 25 which is bigger than the FD
of the successor route -> It will not be put into the routing table even if the “variance 3” command is used.
QUESTION 610
Which command should be added to RTB under router bgp 100 to allow only the external OSPF routes to be redistributed to RTC?
A. redistribute ospf 1
B. redistribute ospf 1 match external 1
C. redistribute ospf 1 match external 2
D. redistribute ospf 1 match external 1 external 2
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Use the external keyword along with the redistribute command under router bgp to redistribute OSPF external routes into BGP.
QUESTION 611
Router E is configured with the EIGRP variance 2 command.
What path will Router E take to reach Router A?
A. only E-D-A
B. only E-B-A
C. only E-C-A
D. both E-B-A and E-C-A
E. both E-B-A and E-D-A
F. all available paths.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
By using the "variance 2" command we can share traffic to other feasible successor routes.
But by default, EIGRP only shares traffic to 4 paths. So we need to use the "maximum-paths 6" to make sure all of these routes are used.
QUESTION 612
A network administrator recently redistributed RIP routes into an OSPF domain.
However, the administrator wants to configure the network so that instead of 32 external type-5 LSAs flooding into the OSPF network, there is only one.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In many cases, the router doesn't even need specific routes to each and every subnet (for example, 172.16.1.0/24).
It would be just as happy if it knew how to get to the major network (for example, 172.16.0.0/16) and let another router take it from there.
In our telephone network example, the local telephone switch should only need to know to route a phone call to the switch for the called area code.
Similarly, a router's ability to take a group of subnetworks and summarize them as one network (in other words, one advertisement) is called route
summarization.
Besides reducing the number of routing entries that a router must keep track of, route summarization can also help protect an external router from making
multiple changes to its routing table due to instability within a particular subnet.
For example, let's say that we were working on a router that connected to 172.16.2.0/24. As we were working on the router, we rebooted it several times. If
we were not summarizing our routes, an external router would see each time 172.16.2.0/24 went away and came back. Each time, it would have to modify its
own routing table. However, if our external router were receiving only a summary route (i.e., 172.16.0.0/16), then it wouldn't have to be concerned with our
work on one particular subnet. This is especially a problem for EIGRP, which can create stuck in active (SIA) routes that can lead to a network melt-down.
Summarization Example We have the following networks that we want to advertise as a single summary route:
* 172.16.100.0/24 * 172.16.101.0/24 * 172.16.102.0/24 * 172.16.103.0/24 * 172.16.104.0/24 * 172.16.105.0/24 * 172.16.106.0/24
QUESTION 613
Under which circumstance can TCP starvation occur?
A. when HTTP and HTTPS traffic are transmitted on the same link
B. when TCP and UDP traffic are mixed in the same class of service
C. when DNS TFTP traffic are transmitted on the same link
D. when UDP traffic is processed in a policy-map before TCP traffic
E. when TCP traffic is blocked by an ACL
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 614
Refer to the exhibit.
If R1 is configured for 6to4 tunneling, what will the prefix of its IPv6 network be?
A. 1723:1100:1::/48
B. FFFF:AC1F:6401::/16
C. AC1F:6401::/32
D. 2002:AC1F:6401::/48
E. 3FFE:AC1F:6401::/32
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 615
Which protocols support DMVPN?
A. EIGRP
B. RIP2
C. OSPF
D. BGP
E. ISIS
Explanation/Reference:
Explanation:
Some documents say RIPv2 also supports DMVPN but, EIGPR, OSPF and BGP are the better choices, so we should choose them.
https://www.cisco.com/c/dam/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/dmvpn_design_guide.pdf#wp37674
https://www.networkcomputing.com/networking/cisco-dmvpn-choosing-right-routing-protocol/1432661326
QUESTION 616
An EUl-64 bit address is formed by adding a reserved 16-bit value, in which position of the Mac address?
A. between the vendor OID and the NIC-specific part of the MAC address.
B. after the NIC-specific part of the MAC address.
C. before the vendor OID part of the MAC address.
D. anywhere in the Mac address, because the value that is added is reserved.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 617
An EUl-64 bit address is formed by inserting which 16-bit value into the MAC address of a device?
A. 3FFE
B. FFFE
C. FF02
D. 2001
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 618
By default, which type of IPv6 address is used to build the EUl-64 bit format?
A. unique-local address
B. IPv4-compatible IPv6 address
C. link-local address
D. aggregatable-local address
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
https://howdoesinternetwork.com/2013/slaac-ipv6-stateless-address-autoconfiguration
QUESTION 619
What is the minimum privilege level to enter all commands in usermode?
A. Level 1
B. Level 0
C. Level 14
D. Level 15
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 620
Refer to exhibit. If the IGP in AS65000 is RIPv2, which networks are displayed when you enter show ip route on router R2?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 621
Which of the following situations results in a routing loop?
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 622
Which two options are limitations of stateful NAT64? (Choose Two)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
• Applications without a corresponding application-level gateway(ALG) may not work properly with the Stateful NAT64 translator.
• IP Multicast is not supported.
• The translation of IPv4 options,IPv6 routing headers,hop-by-hop extension headers,destination option headers,and source routing headers is not
supported.
• Virtual routing and forwarding(VRF)-aware NAT64 is not supported.
• When traffic flows from IPv6 to IPv4,the destination IP address that you have configured mustmatch a stateful prefix to prevent hairpinning
loops.However,the source IPaddress (source address of the IPv6 host) must not match the stateful prefix.If the source IP address matches the stateful
prefix,packets are dropped. Hair pinning allows two endpoints inside Network Address Translation(NAT) to communicate with each other,even when the
endpoints use only each other's external IPaddresses and ports for communication.
• Only TCP and UDP Layer4 protocols are supported for header translation.
• Route maps are not supported.
• Application-level gateways (ALGs) FTP and ICMP are not supported.
• In the absence of apre-existing state in NAT64,stateful translation only supports IPv6-initiated sessions.
• If a static mapping host-binding entry exists for an IPv6 host,the IPv4 nodes can initiate communication. In dynamic mapping,IPv4 nodes can initiate
communication only if a host-binding entry is created for the IPv6 host through a previously established connection to the same or a different IPv4 host.
Dynamic mapping rules that use Port-Address Translation(PAT),host-binding entries cannot be created because IPv4-initiated communication not possible
through PAT.
• Both NAT44 (static,dynamic and PAT)configuration and stateful NAT64 configuration are not supported on the same interface.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/nat-xe-3s-book/iadnat-stateful-nat64.pdf
QUESTION 623
Which next hop is going to be used for 172.17.1.0/24 ?
A. 10.0.0.1
B. 192.168.1.2
C. 10.0.0.2
D. 192.168.3.2
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The > indicates the best route to the destination 172.17.1.0/24
Reference: https://www.cisco.com/c/en/us/td/docs/ios/iproute_bgp/command/reference/irg_book/irg_bgp5.html#wp1156281
QUESTION 624
What are two limitations when in use of NPTv6 for IPV6 vs IPV6 Address translation?
Correct Answer: CF
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
So what is NPTv6? NPTv6 is simply rewriting IPv6 prefixes. If your current IPv6 prefix is 2001:db8:cafe::/48 then using NPTv6 it would allow you to change it
to 2001:db8:fea7::/48 – that is it.
It is a one for one prefix rewrite – you can’t overload it, have mismatching prefix allocations sizes, re-write ports or anything else. Importantly, it doesn’t touch
anything other than the prefix. Your network/host portion remains intact with no changes.
http://www.howfunky.com/2012/02/ipv6-to-ipv6-network-prefix-translation.html
QUESTION 625
Which two statements about NHRP in a DMVPN environment are true? (Choose two)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 626
Which set of actions does a network engineer perform to set the IPv6 address of a DHCP relay server at the VLAN interface level?
A. Enter the VLAN interface configuration mode and define the IPv6 address of a DHCP relay server
B. Enter the global configuration mode and enable the IPv6 DHCP relay
C. Enter the global configuration mode, enable IPv6 DHCP relay from interface configuration mode and define the IPv6 address of a DHCP relay server
D. Enter the VLAN interface configuration mode, enable IPv6 DHCP relay, and define the IPv6 address of a DHCP relay server
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
You can accept DHCP requests from clients on the associated context or VLAN interface and enable the DHCP relay agent by using the ipv6 dhcp relay
enable command (for IPv6) or the ip dhcp relay enable command (for IPv4).
The DHCP relay starts forwarding packets to the DHCP server address specified in the ipv6 dhcp relay server command or the ip dhcp relay server
command for the associated context or VLAN interface.
An example of how to set the IPv6 address of a DHCP relay server at the VLAN interface level:
Reference: https://www.cisco.com/c/en/us/td/docs/interfaces_modules/services_modules/ace/vA5_1_0/command/reference/ACE_cr/if.html
QUESTION 627
Which two types of authentication does EIGRP offer? (Choose two)
A. TKIP
B. MD5
C. WPA
D. Plain text
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If the service password-encryption command is not used when implementing EIGRP authentication, the key-string will be stored as plain text in the router
configuration. If you configure the service password-encryption command, the key-string will be stored and displayed in an encrypted form; when it is
displayed, there will be an encryption-type of 7 specified before the encrypted key-string.
EIGRP originally only supported MD5 authentication but since IOS 15.1(2)S and 15.2(1)T we can also use SHA-256 authentication. Nowadays, this form of
authentication is far more secure than MD5.
They ask for 2 options. The one that we know MD5 and the must lose to the reality is plain text. However I didn´t find and official article that mentioned plain
Text.
The router uses two types of authentication:
• Simple password authentication (also called plain text authentication)—Supported by Integrated System-Integrated System (IS-IS), Open Shortest Path
First (OSPF), and Routing Information Protocol Version 2 (RIPv2)
• MD5 authentication—Supported by OSPF, RIPv2, BGP, and EIGRP
QUESTION 628
Refer to the following:
Logging Console 7
Which option is one of the effects entering this command on a Cisco IOS router, with no additional logging configuration?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Console logging: By default, the router sends all log messages to its console port. Hence only the users that are physically connected to the router console
port can view these messages.
The router does not check if a user is logged into the console port or a device is attached to it; if console logging is enabled, messages are always sent to the
console port that can cause CPU load.
To stop the console logging, use the “no logging console” global configuration command. You might want to limit the amount of messages sent to the console
with the “logging console level” configuration command (for example, logging console Informational).
Reference:
http://blog.router-switch.com/2013/12/configure-logging-in-cisco-ios/
QUESTION 629
Refer to the exhibit.
After configuring the routes, the network engineer executes the show ip route command. What is the expected results?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 630
Which two statements about NTP stratum are true? (Choose two)
Correct Answer: DF
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Reference:
https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/bsm/16-6-1/b-bsm-xe-16-6-1-asr920/bsm-time-calendar-set.html
QUESTION 631
Which two statements about OSPF E1 routes are true? (Choose two)
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
Reference:
http://blog.ine.com/2011/04/04/understanding-ospf-external-route-path-selection/
QUESTION 632
A senior network engineer tries to propagate a summary route 209.165.201.0/27 to R2 by redistributing static route on R1, but setup is not working. What is
the issue with the configuration in the exhibit?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Two connected interfaces S0/0 are in VRF Yellow so we have to put the static route into this VRF too.
So it should be “ip route vrf Yellow 209.165.202.129 255.255.255.224 null0”.
QUESTION 633
Refer to the exhibit.
Based on the output, which option is the next hop to get to the 130.0.1.0/24 network?
A. 10.30.30.1
B. 10.0.11.1
C. 10.20.20.1
D. 10.10.10.1
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
This is the BGP routing table. Only the best entry of each prefix (marked with “>”) is placed into the routing table. In the output above, the next hop
130.0.1.0/24 network can be reached via three next hops (which are 10.10.10.1; 10.30.30.1 and 10.20.20.1) but only 10.20.20.1 is the best path and is
placed into the routing table.
QUESTION 634
Refer to the exhibit.
The excerpt was taken from the routing table of router SATX.
Which option ensures that routes from 51.51.51.1 are preferred over routes from 52.52.52.2?
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 635
Refer to the exhibit.
If this configuration is applied to a device that redistributes EIGRP routes into OSPF. which two statements about the behavior of the device are true?
(Choose Two )
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 636
Refer to the exhibit.
A network engineer has configured NTP on a Cisco router, but the time on the router is still incorrect. What is the reason for this problem?
A. The router is not syncing with the peer, even though the NTP request and response packets are being exchanged.
B. The router is not syncing with peer, and the NTP request and response packets are not being exchanged.
C. The router is syncing with the peer, and the NTP request and response packets are being exchanged.
D. The router is dropping all NTP packets.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In the output you can see a * next to the ip address that is the primary NTP server.
Also the 377 that means everything was received and processed.
Negotiation done.
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc.html
Values below this 376 is that Last NTP response was received
QUESTION 637
Which action can you take to mitigate unicast flooding in a network?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 638
Which two technologies can encapsulate an IPv6 payload in an IPv4 packet for transmission across a network? (Choose Two)
A. L2TPv3
B. trunking
C. AToM
D. ISATAP
E. NAT-PT
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The Network Address Translator – Protocol Translator (NAT-PT) defines a set of network-layer translation mechanisms designed to allow nodes that only
support IPv4 to communicate with nodes that only support IPv6, during the transition to the use of IPv6 in the Internet.
NAT-PT provides IPv4/IPv6 protocol translation. It resides within an IP router, situated at the boundary of an IPv4 network and an IPv6 network. By installing
NAT-PT between an IPv4 and IPv6 network, all IPv4 users are given access to the IPv6 network without modification in the local IPv4-hosts (and vice versa).
Equally, all hosts on the IPv6 network are given access to the IPv4 hosts without modification to the local IPv6-hosts. This is accomplished with a pool of IPv4
addresses for assignment to IPv6 nodes on a dynamic basis as sessions are initiated across IPv4-IPv6 boundaries
Reference:
http://www.ietf.org/rfc/rfc4966.txt
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps8802/ps6969/ps1835/prod_white_paper09186a008011ff51_ps6640_Products_White_Paper.html
ISATAP tunneling (Intra-Site Automatic Tunnel Addressing Protocol): is a mechanism for transmitting IPv6 packets over IPv4 network. The word “automatic”
means that once an ISATAP server/router has been set up, only the clients must be configured to connect to it.
QUESTION 639
Which command do you enter to filter only routing updates that are sent through interface GigabitEthernet0/0?
Correct Answer: F
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 640
Which value does a point-to-point GRE tunnel use to identify a peer?
A. MAC address
B. configured multicast address.
C. DLCI
D. IP address
E. VC ID
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 641
Where must a network engineer configure the ip helper-address command on a router?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 642
Which keyword of the aaa authentication ppp command supports PAP only?
A. line
B. krb5
C. local
D. local-case
E. enable
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 643
A network engineer is working on the network topology and executes the command no ip split-horizon on interface S0/0 of the Hub router.
What is the result of this command?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 644
Which two routers can do OSPF route summarization? (Choose two)
A. ABR
B. ASBR
C. Summary router
D. Internal router
E. Backbone router
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 645
Which two commands do you need to implement on a router to support PPPoE client? (Choose two)
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 646
DRAG DROP
Explanation/Reference:
QUESTION 647
DRAG DROP
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Example:
http://www.ciscopress.com/articles/article.asp?p=100603&seqNum=3
Atlanta(config)#interface serial0
Atlanta(config-if)#encapsulation frame-relay
Atlanta(config-if)#interface serial 0.1 point-to-point
Atlanta(config-subif)#ip address 140.1.1.1 255.255.255.0
Atlanta(config-subif)#frame-relay interface-dlci 52
Atlanta(config-fr-dlci)#interface serial 0.2 point-to-point
Atlanta(config-subif)#ip address 140.1.2.1 255.255.255.0
Atlanta(config-subif)#frame-relay interface-dlci 53
Atlanta(config-fr-dlci)#interface serial 0.3 point-to-point
Atlanta(config-subif)#ip address 140.1.3.1 255.255.255.0
Atlanta(config-subif)#frame-relay interface-dlci 54
QUESTION 648
DRAG DROP
Drag and drop each DMVPN in the left to the correct statement in the right.
Correct Answer:
Explanation/Reference:
QUESTION 649
What from the following can cause an issue for uRPF?
A. Asymetric routing
B. CEF not enabled
C. uRPF not applied to the traffic source
D. if it is used as ingress filtering
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 650
DRAG DROP
DRAG the PPPoE operations on the left with the definitions on the right.
Correct Answer:
Explanation/Reference:
Explanation:
+ PPPoE Active Discovery Initiation (PADI): The client initiates a session by broadcasting a PADI packet to the LAN to request a service.
+ PPPoE Active Discovery Offer (PADO): Any access concentrator that can provide the service requested by the client in the PADI packet replies with a
PADO packet that contains its own name, the unicast address of the client, and the service requested. An access concentrator can also use the PADO
packet to offer other services to the client.
+ PPPoE Active Discovery Request (PADR): From the PADOs it receives, the client selects one access concentrator based on its name or the services
offered and sends it a PADR packet to indicate the service or services needed.
+ PPPoE Active Discovery Session-Confirmation (PADS): When the selected access concentrator receives the PADR packet, it accepts or rejects the
PPPoE session:
– To accept the session, the access concentrator sends the client a PADS packet with a unique session ID for a PPPoE session and a service name that
identifies the service under which it accepts the session.
– To reject the session, the access concentrator sends the client a PADS packet with a service name error and resets the session ID to zero.
+ After a session is established, the client or the access concentrator can send a PPPoE Active Discovery Termination (PADT) packet anytime to terminate
the session. The PADT packet contains the destination address of the peer and the session ID of the session to be terminated. After this packet is sent, the
session is closed to PPPoE traffic.
QUESTION 651
What is supported RADIUS server? (Choose two)
A. telnet
B. authentication
C. accounting
D. authorization
E. SSH
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 652
Based on the configuration information shown above, which of the following are true? (Choose two)
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 653
What is show on logging console 7?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 654
Choose the best IP SLA deployment cycle that reduce deployment time. (Choose four.)
Explanation/Reference:
Explanation:
baseline (network performance), understand (network performance baseline), fine tune and optimize, quantify (results)
Reference:
https://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_paper0900aecd8017f8c9.html
QUESTION 655
Which two protocols are used to deploy a single Hub-DMVPN supporting Spoke-to Spoke tunnels? (Choose two)
A. MPLS
B. RSVP
C. NHRP
D. BFB
E. Multipoint GRE
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 656
What would you configure on SNMPv3 to allow authentication and encryption?
A. authpriv
B. authnopriv
C. noauthnopriv
D. authmember
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 657
DRAG DROP
Drag the items on the left to the proper locations on the right.
Explanation/Reference:
QUESTION 658
DRAG DROP
Drag the items on the left to the proper locations on the right.
Explanation/Reference:
QUESTION 659
DRAG DROP
Explanation/Reference:
Reference:
https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html#timebasedtimerange
QUESTION 660
If you run the command auto-cost reference-bandwidth 10000 on one of the router in the network, what will happen?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
This command affects all the OSPF costs on the local router as all links are recalculated with formula:
cost = reference-bandwidth (in Mbps) / interface bandwidth
Therefore, in this case the command “auto-cost reference-bandwidth 10000” allows the local router to calculate the link up to 10Gbps.
QUESTION 661
What does the command show ip vrf purple TOPOLOGY shows?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 662
What’s the gateway in the global configuration? (Choose three.)
A. If you type “show ip route” you will see “Gateway of last resort it not set”.
B. If you type "show ip route vrf blue” you will see “192.168.1.1 as gateway of last resort”.
C. If you type "show ip route vrf red” you will see “192.168.1.1 as gateway of last resort”.
D. If you type "show ip route vrf blue” you will see “192.168.1.2 as gateway of last resort”.
E. Global routing table does not overlap with VRF routing tables.
Explanation/Reference:
QUESTION 663
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In the output you can see a * next to the ip address that is the primary NTP server.
Also the 377 that means everything was received and processed. Negotiation done.
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc
Values below this 376 is that Last NTP response was received
QUESTION 664
Explanation/Reference:
Explanation:
In the output you can see a * next to the ip address that is the primary NTP server.
Also the 377 that means everything was received and processed. Negotiation done.
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc
Values below this 376 is that Last NTP response was received
A pound sign (#) displayed next to a configured peer in the show ntp associations command output indicates that the router isn’t syncing with the peer but
NTP request and response packets are NOT exchanged.
Reference: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc.html
QUESTION 665
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
In the output you can see a * next to the ip address that is the primary NTP server.
Also the 377 that means everything was received and processed. Negotiation done.
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc
Values below this 376 is that Last NTP response was received
A pound sign (#) displayed next to a configured peer in the show ntp associations command output indicates that the router isn’t syncing with the peer even
though NTP request and response packets are being exchanged.
Reference: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases-110/15171-ntpassoc.html
QUESTION 666
Which of these can be used for IPv4 to IPv6 communication?
A. NAT-PT
B. ISATAP
C. L2 to L3 VPN
D. IPSec
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 667
A diagram with 3 routers: HQ2 – HQ1 – BR1.
When you are running with EIGRP 100 on both routers, what command will you implement so that you will see the loopback IP of BR1 to be advertised at
HQ2A diagram with 3 routers: HQ2 – HQ1 – BR1.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
B because BR1 is the router that has to advertise the loopback to his neighbors but if it is only receiving routes (no stub receive-only) It cannot advertise his
loopback.
"eigrp stub recieve-only" will restrict the router from sharing any of its routes, meaning: connected, summary, redistributed or static routes to any other router
in the EIGRP AS. Learned eigrp routes will never be shared as that would defeat the whole purpose of STUB.
There are other stub options that can be configured. The list looks like this:
– receive-only
– connected
– static
– summary
– redistribute
If you configure the receive-only option, you can’t include any of the other options on the above list. If you just configure the router as a stub and don’t specify
any option, the default behavior is to share connected and summary routes. Some other caveats also arise when using these options. For instance, if you
configure the static option, you still must allow EIGRP to share the static routes by issuing the redistribute static command in the config-router context, or the
router won’t share the routes. The same goes for the connected option. If a network statement does not include the connected routes you want to share, then
you must issue the redistribute connected command. One last aspect which may seem counterintuitive is that if you use the redistribute option, you are
permitting the router to share redistributed routes, but you still must actually redistribute the routes for them to be shared. If you choose the summary option,
don’t forget to either manually create summary routes or enable auto-summary.
QUESTION 668
All interfaces on each router are participating in the EIGRP 100 process.
An engineer issues the eigrp stub command on router BR1.
What will the show ip route be on HQ-R1 look like?
A. HQ-R1 will install only route 12.12.12.12/32 network in its routing table
B. HQ-R1 will install routes 12.12.12.12/32 network and 192.168.10.0/24 in its routing table
C. HQ-R1 will install only route 192.168.10.0/24 network in its routing table
D. All routes will be installed in its routing table on HQ-R1
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Stub advertise summary and connected so you are going to see R1 (loopback)connected, R2(loopback) eigrp, R3 (loopback) eigrp , (network rage between
HQ-R1 and HQ-R2 ) connected, (network rage between HQ-R2 and BR1 ) eigrp.
BR1 is a STUB and there are just two CONNECTED networks, so it will ADVERTISE them to other routers.
QUESTION 669
How to set up IP SLA to monitor jitter between the certain limits?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 670
How can you mitigate fragmentation issues between endpoints separated by a GRE tunnel?
A. PMTU
B. TCP MSS
C. windowing
D. ICMP DF bit
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
The IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 65535, most transmission
links enforce a smaller maximum packet length limit, called an MTU. The value of the MTU depends on the type of the transmission link. The design of IP
accommodates MTU differences since it allows routers to fragment IP datagrams as necessary. The receiving station is responsible for the reassembly of the
fragments back into the original full size IP datagram.
Fragmentation and Path Maximum Transmission Unit Discovery (PMTUD) is a standardized technique to determine the maximum transmission unit (MTU)
size on the network path between two hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in IPv4. However,
all modern operating systems use it on endpoints.
The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP
datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection
reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the
size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.
TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the
middle between these two endpoints. PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is used to dynamically
determine the lowest MTU along the path from a packet’s source to its destination.
http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/25885-pmtud-ipfrag.html
(there is some examples of how TCP MSS avoids IP Fragmentation in this link but it is too long so if you want to read please visit this link)
Note: IP fragmentation involves breaking a datagram into a number of pieces that can be reassembled later.
QUESTION 671
Refer to the exhibit. Which option prevents routing updates from being sent to the DHCP router, while still allowing routing update messages to flow to the
Internet router and the distribution switches?
A. CORE(config)# access-list … deny
CORE(config)# access-list … permit
CORE(config-router)# distribute-list .. out
B. CORE(config)# access-list … deny
CORE(config)# access-list … permit
CORE(config-if)# distribute-list .. out
C. DHCP(config)# access-list … deny
DHCP(config)# access-list … permit
CORE(config-router)# distribute-list .. out
D. CORE(config)# access-list … deny
CORE(config)# access-list … permit
DHCP(config-if)# distribute-list .. out
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 672
What is the function of the snmp-server enable traps and snmp-server host 192.168.1.3 trap version 1c public commands?
A. to allow only 192.168.1.3 to access the system using the community-string public
B. to allow private communications between the router and the host.
C. to collect information about the system on a network management server
D. to disable all SNMP informs that are on the system
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 673
Windows Server Syslog blocked by ACL and….?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 674
OSPF routers that communicate with other network routers like EIGRP are called?
A. ASBR
B. ABR
C. Backbone
D. Internal
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 675
Which feature can filter information at the interface level?
A. Conditional Debugging
B. Local Logging
C. Prefix-List
D. Syslog
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
If you enter the debug condition interface command, the debugging output will be turned off for all interfaces except the specified interface.
To reenable debugging output for all interfaces, use the no debug interface command.
The debug condition commands limit these debugging messages to those related to a particular interface.
QUESTION 676
Which statement about NTP authentication is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
B is not Correct because to enable NTP Authentication is required this command ntp authenticate.
So A is Correct.
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_3ntp.html#93976
QUESTION 677
Which feature is supported with the PPPoE client?
A. DMVPN
B. QoS on the dialer interface
C. MLPPP on the interface
D. Dial-on-demand
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
QUESTION 678
Which condition prevents the establishment of a DMVPN tunnel between two spokes?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 679
Which two statements are benefits of BGP peer groups? (Choose two.)
A. Each neighbor in a peer group can have different inbound BGP policies.
B. A configuration change can be applied simultaneously to all peers in the peer group.
C. They use soft updates to minimize bandwidth consumption.
D. They can optimize backdoor routes.
E. They support groups of paths.
F. They can be updated via multicast.
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 680
Which two statements about AAA with the local database are true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 681
Which three causes of unicast flooding are true? (Choose three.)
A. asymmetric routing
B. forwarding table overflow
C. excess space in the forwarding table
D. consistent STP topology
E. symmetric routing
F. changes in the STP topology
Explanation/Reference:
QUESTION 682
A company is deploying a multicast application that must be accessible between sites, but must not be accessible outside of the organization. Based on the
scoping requirements, the multicast group address for the application will be allocated out of which range?
A. FF02::/16
B. FF08::/16
C. FFOE::/16
D. FF00::/16
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 683
What is the default authentication in RIPv2 when authentication is enabled?
A. SHA1 authentication
B. MD5 authentication
C. plaintext authentication
D. enable password authentication
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Cisco implementation of RIPv2 supports two modes of authentication: plain text authentication and Message Digest 5 (MD5) authentication. Plain text
authentication mode is the default setting in every RIPv2 packet, when authentication is enabled. Plain text authentication should not be used when security
is an issue, because the unencrypted authentication password is sent in every RIPv2 packet.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13719-50.html
QUESTION 684
After configuring RIPng on two routers that are connected via a WAN link, a network engineer notices that the two routers cannot exchange routing updates.
A. Either a firewall between the two routers or an ACL on the router is blocking TCP 521.
B. Either a firewall between the two routers or an ACL on the router is blocking UDP 520.
C. Either a firewall between the two routers or an ACL on the router is blocking UDP 521.
D. Either a firewall between the two routers or an ACL on the router is blocking TCP 520.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
RIPng is a UDP-based protocol. Each router that uses RIPng has a routing process that sends and receives datagrams on UDP port number 521, the RIPng
port.
Reference: https://tools.ietf.org/html/rfc2080
QUESTION 685
Which LSA type on OSPFv3 is used for link-local updates?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
LSAs that are responsible to carry IPv6 Routes:
LSA Type 8: Link LSA
Link Local scope: LSA is only flooded on the local link and is further used for the LINK-LSA
Reference: https://www.cisco.com/c/en/us/support/docs/ip/ip-version-6-ipv6/212828-link-lsa-lsa-type-8-and-intra-area-pr.html
QUESTION 686
Which feature is an invalid redistribute command option for redistributing routes from EIGRP into OSPF?
A. access list
B. metric
C. route map
D. tag
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 687
What is the role of a route distinguisher in a VRF-Lite setup implementation?
A. It manages the import and export of routes between two or more VRF instances.
B. It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities.
C. It extends the IP address to identify which VRF instance it belongs to.
D. It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 688
A customer asks its service provider for VPN support IPv4 and IPv6 address families.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/routers/connectedgrid/cgr1000/ios/software/15_4_1_cg/vrf_cgr1000.html
QUESTION 689
Which two tasks must you perform to configure a BGP peer group? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 690
Refer to the exhibit. Which effect of this configuration is true?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 691
What is the administrative distance of an EIGRP summary route?
A. 1
B. 90
C. 5
D. 170
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 692
Which two features were added in MSCHAP version 2? (Choose two.)
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
MSCHAP V2 authentication is an updated version of MSCHAP that is similar to but incompatible with MSCHAP Version 1 (V1). MSCHAP V2 introduces
mutual authentication between peers and a Change Password feature.
Reference: https://www.cisco.com/en/US/docs/ios-xml/ios/sec_usr_aaa/configuration/15-2mt/sec-mschap-ver2.html
QUESTION 693
A network engineer wants to monitor hop-by-hop response time on the network. Which IP SLA operation accomplishes this task?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 694
Which location within the network is preferred when using a dedicated router for Cisco IP SLA operations?
A. user edge
B. distribution edge
C. access edge
D. provider edge
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/en/US/technologies/tk648/tk362/tk920technologies_white_paper09186a00802d5efe.html
QUESTION 695
Refer to the exhibit.
What should be configured on the routers in area 1 to ensure that all default summary routes and redistributed EIGRP routes will be forwarded from R6 to
area 1, and only a default route for all other OSPF routes will be forwarded from R5 to area 1.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 696
If device R1 has 1-Gigabit and 10-Gigabit Ethernet interfaces, which command do you enter so that it takes full advantage of OSPF costs?
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 697
Which task must you perform to enable a point-to-point Frame Relay connection?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 698
When a new PC is connected to the network, which step must it take first to receive a DHCP address?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 699
A network engineer is enabling RIPng on a new customer link. Under which configuration mode is RIPng enabled?
A. global
B. interface
C. IPv6
D. router
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 700
Which two causes of latency are true? (Choose two.)
A. split horizon
B. propagation delay
C. serialization delay
D. high bandwidth on a link
E. under-utilization of a link
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 701
DRAG DROP
Drag and drop the statements about device security from the left onto the correct features on the right.
Explanation/Reference:
QUESTION 702
Which IP SLA operation can be used to simulate voice traffic on a network?
A. TCP-connect
B. ICMP-echo
C. ICMP-jitter
D. UDP-jitter
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 703
How can you minimize unicast flooding in a network?
A. Set the router’s ARP timeout value to less than the timeout value for Layer 2 forwarding table entries.
B. Set the router’s ARP timeout value to be the same as timeout value for Layer 2 forwarding table entries.
C. Configure HSRP on two routers, with one subnet preferred on the first router and a different subnet preferred on the second router.
D. Set the router’s ARP timeout value to greater than the timeout value for Layer 2 forwarding table entries.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 704
Which statement is true about an edge interface in relation to the Cisco Easy Virtual Network?
A. An edge interface connects to end devices such as hosts and servers that are VRF-aware.
B. An edge interface is used to differentiate VRF instances
C. An edge interface is configured using the vnet trunk command under the switches virtual interface
D. An edge interface connects a user device to the EVN while defining the EVN boundaries.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
An edge interface connects a user device to the EVN and in effect defines the boundary of the EVN. Edge interfaces connect end devices such as hosts and
servers that are not VRF-aware. Traffic carried over the edge interface is untagged. The edge interface classifies which EVN the received traffic belongs to.
Each edge interface is configured to belong to only one EVN.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.html
QUESTION 705
Which two statements about OSPFv3 are true? (Choose two.)
Correct Answer: BF
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.pdf
QUESTION 706
DRAG DROP
Drag and drop the AAA security features from the left onto the correct descriptions on the right.
Correct Answer:
Explanation/Reference:
QUESTION 707
Which three methods can a network engineer use to fix a metric-based routing loop in the network? (Choose three.)
Explanation/Reference:
QUESTION 708
Which two features are provided by EIGRP for IPv6? (Choose two.)
A. scaling
B. backbone areas
C. partial updates
D. Area Border Router
E. SPF algorithm
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2mt/ipv6-15-2mt-book/ip6-eigrp.html
QUESTION 709
Which two statements about DMVPN are true? (Choose two.)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 710
Which two actions are common methods for migrating a network from one protocol to another? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 711
A network engineer is enabling conditional debugging and executes two commands: debug condition interface serial 0/0 and debug condition interface
serial 0/1.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/debug/command/reference/122debug/dbfcndtr.html#wp1017131
QUESTION 712
Which feature or technology is supported with stateful NAT64?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-3s/nat-xe-3s-book/iadnat-stateful-nat64.pdf
QUESTION 713
A network engineer is configuring two dedicated Internet connections within the Internet module. One connection is the primary connection to all wired
business communications, while the other is the primary connection for all customer wireless traffic. If one of the links goes down, the affected traffic needs
to be redirected to the redundant link.
A. PBR
B. IP QoS
C. MMC
D. IP SLA
E. IP SAA
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 714
Refer to the exhibit.
Which command is used to control the type of routes that are processed in incoming route updates?
A. ip vrf forwarding
B. distribute-list 1 out
C. passive-interface
D. distribute-list 1 in
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 715
Refer to the exhibit.
Which statement about redistribution from BGP into OSPF process 10 is true?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 716
Which two statements are differences between AAA with TACACS+ and AAA with RADIUS? (Choose two.)
A. Unlike TACACS+, RADIUS sends packets with only the password encrypted.
B. Only TACACs+ uses TCP.
C. Only RADIUS uses TCP.
D. Unlike TACACS+, RADIUS supports accounting and authorization only.
E. Only TACACS+ combines authentication and authorization.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html#comp_udp_tcp
QUESTION 717
Refer to the exhibit.
A network engineer is modifying configurations for a customer that currently uses VPN connectivity between their sites. The customer had added a new
spoke site but it does not have reachability to servers located at the hub.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 718
Which command can be entered on router R5 to configure 80 percent of the bandwidth of a link for EIGRP Autonomous System 55?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 719
Which statement about the metric calculation in EIGRP is true?
A. The mean value of bandwidth between the source and destination is used.
B. The minimum bandwidth between the source and destination is used.
C. The minimum delay along the path is used.
D. The maximum delay along the path is used.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 720
Which statement best describes the following two OSPF commands, which are used to summarize routes?
A. The area range command specifies the area where the subnet resides are summarizes it to other areas. The summary-address command summarized
external routes.
B. The area range command summarized subnets for a specific area. The summary-address command summarizes a subnet for all areas.
C. The area range command defines the area where the network resides. The summary-address command enables autosummarization.
D. the area range command defines the area where the network resides. The summary-address command summarizes a subnet for all areas.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 721
Refer to the exhibit.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 722
Which two statements about PPPoE packet types are true? (Choose two.)
A. PADR is a broadcast packet sent from the client to request a new server.
B. PADO is a broadcast reply packet sent to the client.
C. PADO is a unicast reply sent to the client.
D. PADI is an initialization packet sent as a broadcast message.
E. PADR is a unicast confirmation packet sent to the client.
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 723
What is VRF-Lite?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 724
Refer to the exhibit.
How can you change this configuration so that when user CCNP logs in, the show run command is executed and the session is terminated?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/username.htm
QUESTION 725
Which two statements about redistributing EIGRP into OSPF are true? (Choose two.)
A. The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table.
B. The redistributed EIGRP routes are placed into an OSPF area whose area ID matches the EIGRP autonomous system number.
C. The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database.
D. The administrative distance of the redistributed routes is 170.
E. The redistributed EIGRP routes appear as OSPF external type 1.
F. The redistributed EIGRP routes as type 3 LSAs in the OSPF database.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 726
A network administrator is attempting to configure IP SLA to allow one time stamp to be logged when a packet arrives on the interface and one time stamp to
be logged when a packet leaves the interface.
A. Trigger
B. Responder
C. Trap
D. Logging
E. RTT
Correct Answer: E
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 727
A network engineer executes the show ip flow interface command. Which type of information is displayed on the interface?
A. NetFlow configuration
B. IP Cisco Express Forwarding statistics
C. route cache information
D. error statistics
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/command/nf-cr-book.pdf
QUESTION 728
Which IOS commands can you use to limit the CPU impact of log generation and transmission on an IOS router?
A. You can use the ip access-list logging limit command in conjunction with the logging rate-interval command.
B. You can use the ip access-list syslog-logging interval command in conjunction with the logging rate-limit command.
C. You can use the ip access-list logged interval command in conjunction with the logged rate-limit command.
D. You can use the ip access-list logging interval command in conjunction with the logging rate-limit command.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/about/security-center/access-control-list-logging.html
QUESTION 729
Which issue is important to address when integrating two networks with different routing protocols?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 730
A network engineer wants to implement an SNMP notification process for host machines using the strongest security available. Which command
accomplishes this task?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 731
DRAG DROP
Drag and drop the DMVPN components from the left onto the correct descriptions on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 732
What does SNMP v2c use for authentication?
A. SSL certificate
B. community string
C. username and password
D. Hash algorithm
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv2c.pdf
QUESTION 733
Refer to the exhibit.
R1 is configured with VRF-Lite and can ping R2. R2 is fully configured, but it has no active EIGRP neighbors in vrf Yellow. If the configuration of r2 is
complete, then which issue prevents the EIGRP 100 neighbor relationship in vrf Yellow from forming?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 734
If you want to migrate an IS-IS network to another routing protocol with a lower AD, which two protocols do you consider? (Choose two.)
A. RIP
B. UDP
C. TCP/IP
D. EIGRP
E. OSPF
F. internal BGP
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/Administrative_distance
QUESTION 735
DRAG DROP
You are configuring the R1 Serial0 interface for a point-to-point connection. drag and drop the required configuration statements from the left onto the correct
locations from the diagram on the right. Not all commands are used.
Explanation/Reference:
QUESTION 736
Which action is the most efficient way to handle route feedback when converting a RIPv2 network to OSPF?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 737
Which two effects of asymmetric routing are true? (Choose two.)
A. unicast flooding
B. uRPF failure
C. errdisabling of ports
D. port security violations
E. excessive STP convergence
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 738
Which functions are included in the two-message rapid exchange that a DHCPv6 client can receive from a server?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/whitepaper_c11-689821.html
QUESTION 739
Which two statements are examples of the differences between IPv4 and IPv6 EIGRP? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: http://www.ciscopress.com/articles/article.asp?p=2137516&seqNum=4
QUESTION 740
DRAG DROP
Drag and drop the methods supported by the aaa accounting command from the left onto the correct descriptions on the right.
Correct Answer:
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/fsecur_r/srfacct.html
QUESTION 741
Which statement about the split-horizon rule for distance vector routing protocols is true?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 742
A customer requests policy-based routing. Packets arriving from source 209.165.200.225 should be sent to the next hop at 209.165.200.227, with the
precedence bit set to priority. Packets arriving from source 209.165.200.226 should be sent to the next hop at 209.165.200.228, with the precedence bit set
to critical.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 743
Refer to the exhibit.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 744
Which SNMP security level is available across all versions of the protocol?
A. authPriv
B. NoAuthPriv
C. AuthNoPriv
D. NoAuthNoPriv
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 745
Refer to the exhibit.
All neighbor routers are in the BGP peer group named PEER-1. All passwords are configured as cisco. These messages are logged to the console of router
DSW1, which is peering with router Core.
Which two configurations allow a peering session to form between DSW1 and the Core? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 746
Which address is an IPv6 multicast address?
A. 2002:0:0:0:0:0:0:2
B. 0002:0:0:0:0:0:0:2
C. FF02:0:0:0:0:0:0:2
D. FE02:0:0:0:0:0:0:2
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 747
Which two statements about VRF-Lite configurations are true? (Choose two.)
Correct Answer: CF
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/vrf.pdf
QUESTION 748
What is the default maximum segment size for TCP traffic?
A. 536
B. 1492
C. 1500
D. 1508
E. 3340
F. 4096
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/Maximum_segment_size
QUESTION 749
Refer to the exhibit. Which statement describes the effect of this configuration on a Cisco router?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 750
A network engineer has configured an IOS router to synchronize its clock with a Windows server. After several minutes, the network engineer notices that the
local time on the router does not match the time on the Windows server. What is the reason for this?
A. Either a firewall between the two devices or on ACL on the router is blocking UDP port 123.
B. Either a firewall between the two devices or an ACL on the router is blocking TCP port 958.
C. Either a firewall between the two devices or an ACL on the router is blocking UDP port 958.
D. Either a firewall between the two devices or an ACL on the router is blocking TCP port 123.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 751
Which types of LSAs are present in the stub area?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 752
Which command creates a manual summary on an interface when using EIGRP?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 753
DRAG DROP
Drag and drop the statements about NAT64 from the left onto the correct NAT64 types on the right.
Correct Answer:
QUESTION 754
Which two steps must you perform to allow access to a device when the connection to a remote TACACS+ authentication server fails? (Choose two.)
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 755
Which statement about the IP SLA feature is true?
A. It keeps track of the number of packets and bytes that are observed in each flow by storing information in a cache flow.
B. It classifies various traffic types by examining information within Layers 3 through 7.
C. It measures how the network treats traffic for specific applications by generating traffic that bears similar characteristics to application traffic.
D. It ensures that there are appropriate levels of service for network applications.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 756
Which feature mitigates fragmentation issues caused by endpoint hosts?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 757
Which two statements about the OSPF down bit are true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 758
Which two LSA types were introduced to support OSPF for IPv6? (Choose two.)
A. type 9
B. type 5
C. type 10
D. type 8
E. type 7
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 759
Which statement about dynamic NAT is true?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 760
Which two types of traffic can benefit from LLQ? (Choose two.)
A. email
B. video
C. file transfer
D. telnet
E. voice
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 761
Refer to the exhibit. Based on Cisco best practice, which statement about the output is true?
A. The output should be analyzed by a network engineer before executing other show commands on an IOS router in production.
B. The output should be analyzed by a network engineer before executing any debug commands on an IOS router in production.
C. The output should be analyzed by a network engineer before allocating additional memory and CPU usage to processes on an IOS router in production.
D. The output should be analyzed by a network engineer before executing any configuration commands on an IOS router in production.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 762
Users were moved from the local DHCP server to the remote corporate DHCP server. After the move, none of the users were able to use the network.
Which two issues will prevent this setup from working properly? (Choose two.)
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 763
Which command do you enter on router R6 so that BGP supports multiple protocols?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 764
PPPoE requires certain signals and information to establish, accept, control and terminate the session.
The basic signalling is shown below.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 765
Choose correct statement about Dynamic NAT. (Choose two.)
A. inside local
B. outside local
C. this list will be translated to this subnet (which is pool)
D. outside global
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 766
Which two conditions can cause BGP neighbor establishment to fail? (Choose two.)
A. There is an access list blocking all TCP traffic between the two BGP neighbors
B. The IBGP neighbor is not directly connected.
C. BGP synchronization is enabled in a transit autonomous system with fully-meshed IBGP neighbors.
D. The BGP update interval is different between the two BGP neighbors
E. The BGP neighbor is referencing an incorrect autonomous system number in its neighbor statement.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 767
Which feature can be used to reduce the number of ICMP unreachable message egressing a router?
A. uRPF
B. ICMP rate-limiting
C. ip unreachables command
D. Asymmetric routing
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 768
What happens when a router receives a route with an administrative distance of 255?
A. The router installs the route as the most preferred path in the routing table.
B. The router installs the route as the least preferred path in the routing table
C. The router becomes the feasible successor for the route
D. The router is unable to install the route into the routing table
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 769
A network access server using TACACS+ for AAA operations receives an error message from the TACACS server.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 770
Which purpose of the AAA accounting feature is true when you use TACACS+ authentication?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 771
Which command configure a default authentication list that uses a local database and a case-insensitive username?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 772
Which LAN feature enables a default gateway to inform its end devices when a better path to a destination is available?
A. HSRP
B. ICMP unreachable messages
C. ICMP redirects
D. Proxy ARP
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 773
Which routing protocol searches for a better route through other autonomous systems to achieve convergence?
A. Link-state
B. Hybrid
C. Path vector
D. Distance vector
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 774
For RIPv2, how long a static route remains if the point to point interface is down?
A. 30s
B. 60s
C. 180s
D. 240s
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 775
How big is the smallest packet that will always be fragmented on a standard Ethernet network with default configuration?
A. 1500 bytes
B. 1800 bytes
C. 2048 bytes
D. 2100 bytes
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 776
Which task must you perform to implement EIGRP for IPv6 on a device?
A. Use the ipv6 cef command to enable Cisco Express Forwarding on the device.
B. Configure a loopback interface on the device.
C. Manually configure the router ID
D. Statically configure a neighbor statement
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 777
Which criterion does the BGP maximum paths feature use for load balancing?
A. MED
B. local preference
C. weight
D. router ID
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 778
What happens when unicast flood protection is triggered on a VLAN?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 779
Which option is the best for protecting CPU utilization on a device?
A. fragmentation
B. COPP
C. ICMP redirects
D. ICMP unreachable messages
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 780
Which two statements about EVN are true? (Choose two.)
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 781
What are two important differences between OSPFv2 and OSPFv3? (Choose two.)
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 782
Which adverse event can occur as a consequence of asymmetric routing on the network?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 783
Which feature can automatically assign IP addresses in a PPPoE environment?
A. DHCP
B. BOOTP
C. PPP
D. APIPA
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 784
How does R1 handle the route to network 10.1.80.0.0/24?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 785
Which STP feature can reduce TCNs on ports that are connected to end devices?
A. BPDU guard
B. Root guard
C. PortFast
D. BackboneFast
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 786
Which command must you configure globally to support RIPng?
A. ip routing
B. ip cef
C. ipv6 enable
D. ipv6 unicast-routing
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 787
Which protocol does VRF-Lite support?
A. IS-IS
B. ODR
C. EIGRP
D. IGRP
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 788
Which two statements about NAT in a DMVPN environment are true? (Choose two.)
Correct Answer: DE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 789
Which adverse circumstance can the TTL feature prevent?
A. routing loops
B. DoS attacks
C. link saturation
D. CAM table overload
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 790
Which two EIGRP metrics have nonzero K values by default? (Choose two.)
A. reliability
B. delay
C. cost
D. load
E. bandwidth
Correct Answer: BE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 791
Refer to the exhibit. You want router r1 to perform unequal-cost routing to the 172.168.10.0/24 network.
What is the smallest EIGRP variance value that you can configure on R1 to achieve this result?
A. 1
B. 2
C. 3
D. 4
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 792
Which IP SLA operation can be used to simulate voice traffic on a network?
A. TCP connect
B. UDP-jitter
C. ICMP-echo
D. ICMP-jitter
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 793
Device R1 has 1 Gigabit and 10 Gigabit Ethernet interfaces. Which command do you enter so that takes full advantage of OSPF costs?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 794
In which network environment is AAA with RADIUS most appropriate?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 795
Which SNMP model and level can provide DES encryption?
A. SNMPV2 noAuthNoPriv
B. SNMPV3 authNoPriv
C. SNMPV3 authPriv
D. SNMPV3 noAuthNoPriv
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 796
Which value determines the amount of traffic that a network path can hold in transit?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 797
Which protocol can you use to remotely install an IOS on a Cisco switch?
A. SFTP
B. NetFlow
C. FTP
D. SNMP
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 798
A user is attempting to authentication on the device connected to a TACACS+ server but the server require more information from the user to complete
authentication.
A. ACCEPT
B. ERROR
C. REJECT
D. CONTINUE
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 799
Which security feature can protect DMVPN tunnels?
A. IPsec
B. TACACS+
C. RTBH
D. RADIUS
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 800
What happens when two EIGRP peers have mismatched K values?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 801
Refer to exhibit. Which effect of this configuration is true?
A. The device sends SNMP traps related to BGP operations to host 192.168.1.128
B. It configures an ACL to protect SNMP manager from receiving BGP traps.
C. It configures the device to use string ciscotest for read and write access to any SNMP manager on the network
D. It configures the device to communicate with other devices in the ciscotest community using SNMPv3
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 802
When an EIGRP router discovers a new neighbor, which packet type does the router send to help the neighbor build its topology table?
A. Replies
B. Requests
C. Updates
D. Queries
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 803
Which Technology supports overlapping IP address on a single interface?
A. policy-based routing
B. VRF-Lite
C. On-Demand Routing
D. QoS
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 804
Which two statements about ICMP unreachable messages are true? (Choose two.)
A. They are sent when a route to the destination is missing from the routing table
B. They can be enable and disable on a device only on a global level
C. They are sent when a destination address responds to an ARP request
D. They include the entire packet so that the source can identify the process that generated the message
E. They include a portion of the original data so that the source can identify the process that generated the message
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 805
Which password takes precedence if you configure multiple passwords for Telnet connections to a Cisco IOS device?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 806
Which two statements about GRE tunnel keys are true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 807
A router receives a routing advertisement for 10.1.1.0/24 from an EIGRP peer and from an OSPF peer. Which route does the router install in the routing
table, and for which reason?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 808
Which criterion does BGP evaluate first when determining the best path?
A. MED value
B. neighbor address
C. local preference value
D. weight
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 809
When does a Cisco router send an ICMP redirect?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 810
You are configuring a static route. Which action must you take to avoid the possibility of recursive row?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 811
Refer to the exhibit. R1 and R2 are unable to establish an EIGRP adjacency.
Which action corrects the problem?
A. Change the eigrp route-id on one of the routers so that values on the two routers are different.
B. Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration
C. Change the autonomous system number on one of the routers so that each router has different values
D. Change the IP address and subnet mask on R2 so that is on the same subnet as R1.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 812
Which routing protocol routers traffic through the best path and second best path at the same time?
A. EIGRP
B. BGP
C. OSPF
D. RIP
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 813
A router with default RIPv2 settings loses connectivity to it's next-hop neighbor.
How long downs the router wait before removing the route to the next hop from its route table?
A. 30 seconds
B. 60 seconds
C. 180 seconds
D. 240 seconds
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 814
Refer to the exhibit. You notice that traffic from R1 to the 192.168.10.0/24 network prefers the path through R3 instead of the least-cost path through R2.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 815
You want to configure a device to select an OSPF-learned route as the preferred path over an EBGP-learned route.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 816
What is the maximum number of hops on a router that RIPng advertises as reachable?
A. 15
B. 30
C. 99
D. 255
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 817
OSPF chooses routes in which order, regardless of route's administrative distance and metric?
A. Intra-Area (O) - Inter-Area (O IA) - External Type 1 (E1) - External Type 2 (E2) - NSSA Type 1 (N1) - NSSA Type 2 (N2)
B. Intra-Area (O) - Inter-Area (O IA) - NSSA Type 1 (N1) - NSSA Type 2 (N2) - External Type 1 (E1) - External Type 2 (E2)
C. Intra-Area (O) - Inter-Area (O IA) - NSSA Type 1 (N1) - External Type 1 (E1) - NSSA Type 2 (N2) - External Type 2 (E2)
D. Intra-Area (O) - NSSA Type 1 (N1) - External Type 1 (E1) - Inter-Area (O IA) - NSSA Type 2 (N2) - External Type 2 (E2)
E. Intra-Area (O) - Inter-Area (O IA) - NSSA Type 1 (N1) - External Type 1 (E1) - NSSA Type 2 (N2) - External Type 2 (E2)
F. NSSA Type 1 (N1) - NSSA Type 2 (N2) - Intra-Area (O) - Inter-Area (O IA) - External Type 1 (E1) - External Type 2 (E2)
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
Explanation:
Regardless of a route’s metric or administrative distance, OSPF will choose routes in the following order:
Intra-Area (O)
Inter-Area (O IA)
External Type 1 (E1)
External Type 2 (E2)
NSSA Type 1 (N1)
NSSA Type 2 (N2)
QUESTION 818
Which calculation is used to determine the default EIGRP metric?
A. Bandwidth+Delay
B. Bandwidth*Delay
C. Bandwidth-Delay
D. Bandwidth/Delay
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 819
Which two packet types can an EIGRP router send when a route goes into the Active state? (Choose two.)
A. query
B. update
C. request
D. hello
E. reply
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 820
Which condition must be met before two EVN devices can connect?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 821
Which algorithm is used by EIGRP to determine the best path through a network?
A. DUAL
B. Dijkstra
C. SPF
D. A* Search
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 822
What happens when a router receives a packet with a TTL of 0?
A. The router attempts to forward the packet along an alternate path in the route table
B. The router sends an ICMP Time Exceeded Message to the host that sent the packet
C. The router sends an ICMP Destination Unreachable Message to the host that sent the packet
D. The router flags the packet and forwards it to the next hop
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 823
Refer to the exhibit. Which effect of this configuration is true?
A. The device will authenticate all users connecting to vty lines 0 4 against TACACS+
B. When users attempt to connect to vty lines 0 4, the device will authenticate them against TACACS+ if local authentication fails
C. The device will allow users at 192.168.0.202 to connect to vty lines 0 4 using the password ciscotestkey
D. The device will allow only users at 192.168.0.202 to connect to vty line 0 4
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 824
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 825
Which OSPF network type uses a DR?
A. point-to-point nonbroadcast
B. point-to-multicast
C. nonbroadcast multiaccess
D. point-to-point
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 826
Refer to the exhibit. A network engineer is implementing a Frame Relay design using EIGRP as the routing protocol EIGRP 100 is up and the hub is
receiving advertisements for both loopback interfaces from Spoke 1 and Spoke2. Spoke 1 and Spoke 2 can see Loopback 1 advertisements from the hub,
but neither spoke sees loopback advertisements from the other spoke. Why are the routing updates not prorogating properly?
A. The network mask that is used on the loopback interfaces of the spoke routers is invalid
B. Split horizon on the hub interface is preventing advertisements
C. There is a physical Layer 1 issue between one of the spokes and the hub
D. Split horizon on one of the spoke interfaces is preventing advertisements
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 827
Which two tasks must you perform when you install SSH on a Cisco IOS device? (Choose two.)
A. Enable TACACS+
B. Delete the VTY lines
C. Generate an SSH key
D. Configure a device hostname
E. Disable Telnet
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 828
Which protocol allows hosts to rearrange out-of-order packets at Layer 3?
A. Use UDP, which sequences packets and can place them in the correct order
B. Use TCP, which works with the STP root bridge to transmit packets in the correct order
C. Use TCP, which sequences packets and can place them in the correct order
D. Use UDP, which can retransmit missing packets
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 829
To enable policy-based routing, which function specifies the match criteria and resulting action of all the match clauses that are met?
A. class map
B. route map
C. service policy
D. ACL
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfpbr.pdf
QUESTION 830
A router in an EVN environment is choosing a route. Which value is given the highest selection priority?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/layer-3-vpns-l3vpn/whitepaper_c11-638769.html
QUESTION 831
What is the range for private AS numbers?
A. 64512 to 65535
B. 1 to 64511
C. 1024 to 65535
D. 1 to 1024
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 832
Refer to the exhibit.
After configuring the rotes, the network engineer executes the show ip route command. What is the expected result?
A. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 2 subnetsC 10.0.2.0 is directly connected, FastEthernet0/0C 10.0.1.0 is
directly connected, FastEthernet0/1S” 0.0.0.0/0[1/0] via 10.0.2.1 [1/0] via 10.0.1.1Router #
B. Gateway of last resort is 10.0.1.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.1.0 is directly connected, FastEthernet0/1 S” 0.0.0.0/0 [1/0]
via 10.0.1.1 Router #
C. Gateway of last resort is not set Router #
D. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.2.0 is directly connected, FastEthernet0/0 S”0.0.0.0/0 [1/0]
via 10.0.2.1 Router #
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 833
Which protocol proposes IETF as the viable successor to NAT-PT?
A. NAT64
B. 64NAT
C. NAT-PT64
D. 64NAT-PT
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 834
Refer to the exhibit. Which two effects of this configuration are true? (Choose two.)
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 835
Which feature eliminates the need for Cisco Express Forwarding to maintain a route cache?
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-8-0E/15-24E/configuration/guide/xe-380-configuration/cef.pdf
QUESTION 836
Refer to the exhibit. Which BGP attribute can be used to influence traffic from AS200 and AS300 to enter AS100 via link 1?
A. AS-path
B. weight
C. local preference
D. MED
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 837
Which IP SLA deployment cycle reduces the deployment time for network applications?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_paper0900aecd8017531d.pdf
QUESTION 838
Which two OSPF area types filter type 4 and type 5 LSAs? (Choose two.)
A. Level 2
B. not-so-stubby
C. totally stubby
D. level 1
E. stub
F. Level1 – Level2
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 839
Which value identifies traffic, intended for different paths in an EVN environment?
A. VLAN ID
B. route target
C. route tag
D. VNET tag
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 840
Refer to the exhibit. Which IP address does OSPF choose as the R1 router ID?
A. 172.16.1.1
B. 172.17.1.1
C. 192.168.12.1
D. 192.168.21.1
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 841
Which type of Cisco Express Forwarding adjacency is created when the next hop is directly connected, but its MAC header rewrite information is missing?
A. discard
B. glean
C. punt
D. null
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/isw-cef-15-mt-book/isw-cef-overview.html
QUESTION 842
Refer to the exhibit. Based on the output from the show ip protocols vrf RED command, what is happening with the routing processes?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 843
Refer to the exhibit. Which routes will be injected into the routing protocol?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 844
Which command is the correct way to summarize routes that were injected into OSPF area 100 from RIP?
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 845
Which condition must be met before you can configure SSH on a device running Cisco IOS?
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 846
Which command instructs a PPPoE client to obtain its IP address from the PPPOE server?
A. ip address DHCP
B. ip address dynamic
C. ip address negotiated
D. ip address auto negotiated
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 847
The OSPF database of a router shows LSA types 1, 2, 7, and 3 default router only. Which type of area is this router connected to?
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference: