Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 300-410 Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Exam Practice Test

Demo: 180 questions
Total 594 questions

Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Questions and Answers

Question 1

Refer to the exhibit.

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

Options:

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Question 2

Refer to the exhibit.

A user cannot SSH to the router. What action must be taken to resolve this issue?

Options:

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Question 3

Refer to Exhibit.

Which two configurations allow clients to get dynamic ip addresses assigned?

Options:

A.

Configure access-list 100 permit udp any any eq 61 as the first line

B.

Configure access-list 100 permit udp any any eq 86 as the first line

C.

Configure access-list 100 permit udp any any eq 68 as the first line

D.

Configure access-list 100 permit udp any any eq 69 as the first line

E.

Configure access-list 100 permit udp any any eq 67 as the first line

Question 4

Refer to the exhibit.

An engineer configured BGP between routers R1 and R3 The BOP peers cannot establish neighbor adjacency to be able to exchange routes. Which configuration resolves this issue?

Options:

A.

R3router bgp 6502address-family ipv6neighbor AB01:2011:7:100::1 activate

B.

R1router bgp 6501address-family ipv6neighbor AB01:2011:7:100;:3 activate

C.

R3router bgp 6502neighbor AB01:2011:7:100::1 ebgp-muttlhop 255

D.

R1router bgp 6501 neighborAB01:2011:7:100::3ebgp-multihop255

Question 5

A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?

Options:

A.

tunnel interface of the hub with ip nhrp ospf dr

B.

OSPF priority to 0

C.

route map to set the metrics of learned routes to 110

D.

OSPF priority greater than 1

Question 6

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

Options:

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Question 7

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

Options:

A.

Packets are not forwarded to the specific next hop.

B.

Packets are forwarded based on the routing table.

C.

Packets are forwarded based on a static route.

D.

Packets are forwarded to the specific next hop.

Question 8

Refer to the exhibit.

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

Options:

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Question 9

Exhibit:

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

Options:

A.

Check and resolve reachability between the WLC and the NTP server

B.

Reset the NTP server to resolve any synchronization issues for all devices

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Question 10

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

Options:

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Question 11

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

Options:

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Question 12

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

Options:

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Question 13

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

Options:

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Question 14

An engineer configured Reverse Path Forwarding on an interface and noticed that the routes are dropped when a route lookup fails on that interface for a prefix that is available in the routing table Which interface configuration resolves the issue?

Options:

A.

ip verify unicast source reachable-via rx

B.

ip verify unicast source reachable-via any

C.

ip verify unicast source reachable-via allow-default

D.

ip verify unicast source reachable-via 12-src

Question 15

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

Options:

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Question 16

Refer to Exhibit.

A network administrator has successfully configured DMVPN topology between a hub and two spoke routers. Which two configuration commands should establish direct communications between spoke 1 and spoke 2 without going through the hub? (Choose two).

Options:

A.

At the hub router, configure the ip nhrp shortcut command.

B.

At the spoke routers, configure the ip nhrp spoke-tunnel command.

C.

At the hub router, configure ip nhrp redirect the command

D.

At the spoke routers, configure the ip nhrp shortcut command.

E.

At the hub router, configure tne Ip nhrp spoke-tunnel command

Question 17

Refer to the exhibit.

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

Options:

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Question 18

Refer to the exhibit.

The R1 and R2 configurations are:

The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

Options:

A.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 tti-security hops 1neighbor 10.1.1.1 update-source loopback 0

B.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 disable-connected-checkneighbor 10.1.1.1 update-source loopback 0

C.

R2ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

D.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.1 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

E.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 disable-connected-checkneighbor 10.1.1.2 update-source Loopback0

Question 19

Refer to the exhibit.

The neighbor relationship is not coming up Which two configurations bring the adjacency up? (Choose two)

Options:

A.

NYrouter ospf 1area 0 authentication message-digest

B.

LAinterface E 0/0ip ospf message-digest-key 1 md5 Cisco123

C.

NYinterface E 0/0no ip ospf message-digest-key 1 md5 Cisco123ip ospf authentication-key Cisco123

D.

LAinterface E 0/0ip ospf authentication-key Cisco123

E.

LArouter ospf 1area 0 authentication message-digest

Question 20

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

Options:

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Question 21

Refer to the exhibit.

A company with autonomous system number AS65401 has obtained IP address block 209.165.200.224/27 fro, ARIN. The company needed more IP addresses and was assigned block209.165.202.128/27 from ISP2. An engineer is ISP1 reports they are receiving ISP2 routes from AS65401. Which configuration onR1 resolves the issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 22

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

Options:

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Question 23

Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted onthe 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip route command. Which action stabilizes the service?

Options:

A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.

B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.

C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.

Question 24

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

Options:

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Question 25

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

Options:

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Question 26

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

Options:

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Question 27

Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

Options:

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

B.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

C.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

D.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

Question 28

Refer to the exhibit. The remote server is failing to receive the NetFlow data Which action resolves the issue?

Options:

A.

Modify the flow transport command transport udp 2055 to move under flow monitor profile.

B.

Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input.

C.

Modify the udp port under flow exporter profile to Ip transport udp 4739.

D.

Modify the flow record command record v4_r1 to move under flow exporter profile.

Question 29

What are two characteristics of VRF instance? (Choose two.)

Options:

A.

All VRFs share customers routing and CEF tables .

B.

An interface must be associated to one VRF.

C.

Each VRF has a different set of routing and CEF tables

D.

It is defined by the VPN membership of a customer site attached to a P device.

E.

A customer site can be associated to different VRFs

Question 30

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

Options:

A.

Interface Tunnel1no ip split-horizon eigrp 111

B.

Interface Tunnel1Ip next-hop-self elgrp 111

C.

Interface Tunnel1tunnel mode Ipsec Ipv4

D.

Interface Tunnel1tunnel protection ipsec profile IPSec-PROFILE

Question 31

Exhibit:

Which action resolves the authentication problem?

Options:

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Question 32

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

Options:

A.

Detect Mult

B.

Required Min Echo RX Interval

C.

Desired Min TX Interval

D.

Required Min RX Interval

Question 33

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

Options:

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Question 34

What are two functions of IPv6 Source Guard? (Choose two.)

Options:

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Question 35

Refer to the exhibit.

A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?

Options:

A.

no terminal monitor

B.

(config)#terminal no monitor

C.

#terminal no monitor

D.

(config)#no terminal monitor

Question 36

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

Options:

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Question 37

Refer to the exhibit.

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

Options:

A.

Configure TACACS+ synchronization with the Active Directory admin group

B.

Configure the username from a local database

C.

Configure full access for the username from TACACS+ server

D.

Configure an authorized IP address for this user to access this router

Question 38

Refer to the exhibit.

A network administrator is using the DNA Assurance Dashboard panel to troubleshoot an OSPF adjacency that failed between Edge_NYC interface GigabitEthernet1/3 with Neighbor Edge_SNJ. The administrator observes that the neighborship is stuck in exstart state. How does the administrator fix this issue?

Options:

A.

Configure to match the OSPF interface speed and duplex settings on both routers.

B.

Configure to match the OSPF interface MTU settings on both routers.

C.

Configure to match the OSPF interface unique IP address and subnet mask on both routers.

D.

Configure to match the OSPF interface network types on both routers.

Question 39

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

Options:

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Question 40

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

Options:

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Question 41

Drag and drop the LDP features from the left onto the descriptions on the right

Options:

Question 42

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 43

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

Options:

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Question 44

What are two functions of MPLS Layer 3 VPNs? (Choose two.)

Options:

A.

LDP and BGP can be used for Pseudowire signaling.

B.

It is used for transparent point-to-multipoint connectivity between Ethernet links/sites.

C.

BGP is used for signaling customer VPNv4 routes between PE nodes.

D.

A packet with node segment ID is forwarded along with shortest path to destination.

E.

Customer traffic is encapsulated in a VPN label when it is forwarded in MPLS network.

Question 45

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

Options:

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Question 46

An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

Options:

A.

match the passwords

B.

match the hello timers

C.

match the MTUs

D.

match the network types

Question 47

Refer to the exhibit.

R1 is being monitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?

Options:

A.

Modify the CoPP policy to increase the configured exceeded limit for SNMP.

B.

Modify the access list to include snmptrap.

C.

Modify the CoPP policy to increase the configured CIR limit for SNMP.

D.

Modify the access list to add a second line to allow udp any any eq snmp

Question 48

Refer to the exhibit. A network administrator configured an IPv6 access list to allow TCP return traffic only, but it is not working as expected. Which changes resolve this issue?

Options:

A.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

B.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

C.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

D.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

Question 49

Refer to the exhibit.

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

Options:

A.

Configure logging history 2

B.

Configure logging history 3

C.

Configure logging history 4

D.

Configure logging history 5

Question 50

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

Options:

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Question 51

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

Options:

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Question 52

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

Options:

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Question 53

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

Options:

A.

HQ_R1(config)# ip sla responderHQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responderHQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Question 54

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?

Options:

A.

router ospf 1default-information originate

B.

router ospf 1network 0.0.0.0 0.0.0.0 area 0

C.

router ospf 1redistribute connected 0.0.0.0

D.

router ospf 1redistribute static subnets

Question 55

What are two functions of LDP? (Choose two.)

Options:

A.

It is defined in RFC 3038 and 3039.

B.

It requires MPLS Traffic Engineering.

C.

It advertises labels per Forwarding Equivalence Class.

D.

It must use Resource Reservation Protocol.

E.

It uses Forwarding Equivalence Class

Question 56

How are MPLS Layer 3 VPN services deployed?

Options:

A.

The RD and RT values must match under the VRR

B.

The RD and RT values under a VRF must match on the remote PE router

C.

The import and export RT values under a VRF must always be the same.

D.

The label switch path must be available between the local and remote PE routers.

Question 57

What are two MPLS label characteristics? (Choose two.)

Options:

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Question 58

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

Options:

A.

router bgp 64511aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511neighbor 192.168.100.1 summary-onlyneighbor 192.168.200.2 summary-only

C.

interface E 0/0ip bgp suppress-map BLOCK_SPECIFIC!interface E 0/1ip bgp suppress-map BLOCK_SPECIFIC!ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC!router bgp 64511aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Question 59

Which feature drops packets if the source address is not found in the snooping table?

Options:

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Question 60

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

Options:

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Question 61

Refer to the exhibit.

A network administrator is trying to switch to the privileged EXEC level on R1 but failed. Which configuration resolves the issue?

Options:

A.

Enable password Cisco@123

B.

tacass server enable-password Cisco@123

C.

tacacs-server enable-password Cisco@123

D.

enable-password Cisco@123

Question 62

Refer to the exhibit. An engineer must configure a per VRF for TACACS+ for company A. Which configuration on RTG-1 accomplishes the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 63

Refer to the exhibit.

While troubleshooting a BGP route reflector configuration, an engineer notices that reflected routes are missing from neighboring routers. Which two BGP configurations are needed to resolve the issue? (Choose two)

Options:

A.

neighbor 10.1.1.14 route-reflector-client

B.

neighbor R2 route-reflector-client

C.

neighbor 10.1.1.2 allowas-in

D.

neighbor R4 route-reflector-client

E.

neighbor 10.1.1.2 route-reflector-client

Question 64

Refer to the exhibit. Router R4 is configured correctly with default OSPF values. A network engineer configured R7 for OSPF. R7 must not be elected as a DR for the segment between R4-R7. The adjacency between R4 and R7 failed to form. Which configuration resolves the issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 65

Drag and drop the IPv6 first hop security device roles from the left onto the corresponding descriptions on the right.

Options:

Question 66

:590

Refer to the exhibit The R2 OSPF route 10 2 2 0/24 shows in the R1 EIGRP routing table without route redistribution performed between OSPF and EIGRP routing protocols Which configuration is required on router R2 to resolve the issue?

Options:

A.

passive-interface FastEthernet 0/0 command in OSPF1.

B.

Add the no auto-summary command in EIGRP 100.

C.

Replace the network 10.0.0.0 command with FastEthernet0/0network in EIGRP 100.

D.

Addthe passive-interface FastEthernet 1/0 command in EIGRP 100

Question 67

Refer to the exhibit.

An engineer must establish multipoint GRE tunnels between hub router R6 and branch routers R1, R2, and R3. Which configuration accomplishes this task on R1?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 68

An engineer configured a router with this configuration

ip access-hst DENY TELNET

10 deny tcp any any eq 23 log-input

The router console starts receiving log message :%SEC-6-IPACCESSLOGP: list DENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) ->192.168.2.20(23), 1 packet"

Which action stops messages on the console while still denying Telnet?

Options:

A.

Configure a 20 permit ip any any command

B.

Remove log-Input keyword from the access list.

C.

Replace log-input keyword with the log keyword in the access list.

D.

Configure a 20 permit ip any any log-input command.

Question 69

Which control plane process allows the MPLS forwarding state to recover when a secondary RP takes over from a failed primary RP?

Options:

A.

MP-BGP uses control plane services for label prefix bindings in the MPLS forwarding table

B.

LSP uses NSF to recover from disruption *i control plane service

C.

FEC uses a control plane service to distribute information between primary and secondary processors

D.

LDP uses SSO to recover from disruption in control plane service

Question 70

An administrator attempts to download the pack NBAR2 file using TFTP from the CPE router to another device over the Gi0/0 interface. The CPE is configured as below:

The transfer fails. Which action resolves the issue?

Options:

A.

Change the WAN ACL to permit the UDP port 69 to allow TFTP

B.

Make the permit udp any eq tftp any entry the last entry in the WAN ACL.

C.

Change the WAN ACL to permit the entire UDP destination port range

D.

Shorten the file name to the 8+3 naming convention.

Question 71

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

Options:

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Question 72

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

WAN

CORE

MGMT

Options:

Question 73

What is an MPLS LDP targeted session?

Options:

A.

session between neighbors that are connected no more than one hop away

B.

LDP session established between LSRs by exchanging TCP hello packets

C.

label distribution session between non-directly connected neighbors

D.

LDP session established by exchanging multicast hello packets

Question 74

Refer to Exhibit.

PC2 is directly connected to R1. A user at PC2 cannot Telnet to 2001:db8:a:b::10. The user can ping

2001:db8:a:b::10 and receive DHCP-related information from the DHCP server. Which action resolves

the issue?

Options:

A.

Remove sequence 10 and put it back as sequence 25.

B.

Remove sequence 20 and put it back as sequence 45.

C.

Remove sequence 30 and put it back as sequence 5.

D.

Remove sequence 40 and put it back as sequence 15.

Question 75

Refer to the exhibit.

R1 is configured with uRPF, and ping to R1 is failing from a source present in the R1 routing table via the GigatxtEthernet 0/0 interface. Which action resolves the issue?

Options:

A.

Remove the access list from the interface GigabrtEthernet 0/0

B.

Modify the uRPF mode from strict to loose

C.

Enable Cisco Express Forwarding to ensure that uRPF is functioning correctly

D.

Add a floating static route to the source on R1 to the GigabitEthernet 0/1 interface

Question 76

Refer to the exhibit.

A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers.

Which configuration prevents changes from unauthorized NMS and TFTP servers?

Options:

A.

access-list 20 permit 10.221.10.11access-list 20 deny any log!snmp-server group NETVIEW v3 priv read NETVIEW access 20snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20snmp-server community Cisc0Us3r RO 20snmp-server community Cisc0wrus3r RW 20snmp-server tftp-server-list 20

B.

access-list 20 permit 10.221.10.11access-list 20 deny any log!snmp-server group NETVIEW v3 priv read NETVIEW access 20snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20snmp-server community Cisc0wrus3r RO 20snmp-server community Cisc0Us3r RW 20snmp-server tftp-server-list 20

C.

access-list 20 permit 10.221.10.11access-list 20 deny any log

D.

access-list 20 permit 10.221.10.11

Question 77

Refer to the exhibit. An administrator must upload the packages conf Me to an FTP server. However, the FTP server rejected anonymous service and required users to authenticate What are the two ways to resolve the issue? (Choose two.)

Options:

A.

Use is ftp username and ip ftp password configuration commands to specify valid FTP server credentials.

B.

Use the copy flash:packages.conf scp: command instead and enter the FTP server credentials when prompted.

C.

Enter the FTP server credentials directly In the FTP URL using the ftp://username:passwordQ192.0.2.40/ syntax .

D.

Create a user on the rooter matching the username and password on the FTP server and log in before attempting the copy

E.

Use the copy flash-packages conf ftp: command instead and enter the FTP server credent-ais when prompted.

Question 78

An engineer is creating a policy that overrides normal routing behavior.if the route to a destination of

10.100.100.0/24 is withdrawn from the routing

Table, the policy must direct traffic to a next hop of 10.1 1.1. if the route is present in the routing table, then

normal forwarding must occur. Which

configuration meets the requirements?

Options:

A.

access-list 100 permit ip any any!route-map POLICY permit 10match ip address 100set ip next-hop recursive 10.1.1.1

B.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!Route-map POLICY permit 10match ip address 100set ip default next-hop 10.1.1.1

C.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route-map POLICY permit 10match ip address 100set ip next-hop 10.1.1.1!route map POLICY permit 20

D.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route map POLICY permit 10match ip address 100Set ip next-hop recursive 10.1.1.1!route-map POLICY permit 20

Question 79

Refer to lhe exhibit. APC is configured to obtain an IP address automatically, but it receives an IP address only from the 169.254.0.0 subnet The DHCP server logs contained no DHCPDISCOVER message from the MAC address of the PC. Which action resolves the issue?

Options:

A.

Configure an ip helper-address on the router to forward DHCP messages to the server.

B.

Configure DHCP Snooping on the switch to forward DHCP messages to the server.

C.

Configure a DHCP reservation on the server for the PC.

D.

Configure a static IP address on the PC and exclude it from the DHCP pool.

Question 80

Refer to the exhibit. A customer reports that networks in the 10.0.1.0/24 space do not appear in the RIP database. What action resolves the issue?

Options:

A.

Remove summarization of 10.0.0.078.

B.

Permit 10.0.1.0/24 address in the ACL.

C.

Remove ACL on R1 blocking 10.0.1.0/24 network.

D.

Configure 10.0.1.0/24 network under RIP.

Question 81

Refer to the exhibit.

After a security audit, the administrator implemented an ACL in the route reflector. The RR became unreachable from any router in the network. Which two actions resolve the issue? (Choose two.)

Options:

A.

Enable the ND proxy feature on the default gateway.

B.

Configure a link-local address on the Ethernet0/1 interface.

C.

Permit ICMPv6 neighbor discovery traffic in the ACL.

D.

Remove the ACL entry 80.

E.

Change the next hop of the default route to the link-local address of the default gateway.

Question 82

:576

Refer to the exhibit. R1 and R2 have been configured where the neighbor relationship must be authenticatedusmgMD5:

The neighbor relationship is not coming up. Which configuration resolves the issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 83

Refer to the exhibit.

An engineer configured SNMP communities on the Core_SW1, but the SNMP server cannot obtain information from Core_SW1. Which configuration resolves this issue?

Options:

A.

snmp-server group NETVIEW v2c priv read NETVIEW access 20

B.

access-list 20 permit 10.221.10.11

C.

access-list 20 permit 10.221.10.12

D.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

Question 84

Refer to the exhibit R2 has been receiving routes from R4 that originated outside AS300 A network engineer configured an AS-Path ACL to avoid adding these routes to the R2 BGP table but the routes are still present in the R2 routing table Which action resolves the issue?

Options:

A.

Replace as-path access-list 1 with the ip as-path access-list 1 permit A300$ command

B.

Replace as-path access-list 1 with the ip as-path access-list 1 permit ..300." command

C.

Replace as-path access-list 1 with the ip as-path access-list 1 permit A300_ command.

D.

Replace as-path access-list 1 with the ip as-path access-list 1 permit A300." command

Question 85

A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?

Options:

A.

ip tcp adjust-mss 1360crypto ipsec fragmentation after-encryption

B.

ip tcp adjust-mtu 1360crypto ipsec fragmentation after-encryption

C.

ip tcp adjust-mss 1360crypto ipsec fragmentation mtu-discovery

D.

ip tcp adjust-mtu 1360crypto ipsec fragmentation mtu-discovery

Question 86

Refer to the exhibit. The default route is not advertised to the neighboring router. Which action resolves the issue?

Options:

A.

Configure the redistribute static metric 200 subnets command under OSPF.

B.

Configure OSPF on the Dialer0 interface.

C.

Configure the network 0.0.0.0 255.255.255.255 area 0 command under OSPF.

D.

Configure the default-information originate command under OSPF.

Question 87

The network administrator must implement IPv6 in the network to allow only devices that not only have registered IP addresses but are also connecting from assigned locations. Which security feature must be implemented?

Options:

A.

IPv6 Snooping

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

IPv6 Router Advertisement Guard

Question 88

Refer to the exhibit.

When the FastEthemet0/1 goes down, the route to 172.29.0 0/16 via 192.168.253 2 is not installed in the RIB. Which action resolves the issue?

Options:

A.

Configure reported distance greater than the feasible distance

B.

Configure feasible distance greater than the successor's feasible distance.

C.

Configure reported distance greater than the successor's feasible distance.

D.

Configure feasible distance greater than the reported distance

Question 89

Refer to the exhibit An engineer is troubleshooting an OSPF adjacency issue between directly connected routers R1 and R2 Which configuration resolves the issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 90

Refer to the exhibit.

The connected routers do not show up as OSPF neighbors. Which action resolves the issue?

Options:

A.

Change the R1 dead timer to 20.

B.

Change the R2 dead timer to 20.

C.

Change the R2 hello timer to 20.

D.

Change the R1 hello timer to 20.

Question 91

An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 92

What action is performed for untagged outgoing labels in an MPLS router?

Options:

A.

Convert the incoming MPLS packet to an untagged packet and then do a FIB lookup

B.

Convert the incoming MPLS packet to an untagged packet and then do a RIB lookup.

C.

Convert the untagged packet to a labeled packet and forward it to the next router

D.

Convert the incoming MPLS packet to an IP packet and forward it to the next router.

Question 93

:581

The network administrator deployed the Binding Table Recovery feature. Which two devices recover the missing binding table entries? (Choose two.)

Options:

A.

DHCP client

B.

DHCP server

C.

destination host

D.

source host

E.

DHCP relay agent

Question 94

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit ip host 172.16.1.99 any

!

class-map CM-ADMIN

match access-group 100

!

policy-map PM-COPP

class CM-ADMIN

police 500000 conform-action transmit

!

interface E0/0

service-policy input PM-COPP

CoPP failed to capture the desired traffic and the CPU load is getting higher.

Which two configurations resolve the issue? (Choose two.)

Options:

A.

interface E0/0no service-policy input PM-COPP!control-planeservice-policy input PM-COPP

B.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit!control-planeservice-policy input PM-COPP

C.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80

D.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80access-list 100 permit tcp host 172.16.1.99 any eq 443

E.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit

Question 95

Refer to the exhibit.

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?

Options:

A.

flow monitor Flowmonitor1destination 10.221.10.11

B.

flow exporter FlowAnalyzer1destination 10.221.10.11

C.

interface Ethernet0/1flow-destination 10.221.10.11

D.

interface Ethernet0/0flow-destination 10.221.10.11

Question 96

Refer to the exhibit. Which action resolves the issue?

Options:

A.

Establish connectivity between the NTP server and the switch.

B.

Configure the local time on Cisco DNA Center

C.

Configure the local time on the SW1 device

D.

Establish connectivity between the NTP server and Cisco DNA Center.

Question 97

Which two technologies optimize MPLS infrastructure using bandwidth protection services when experiencing slow response7 (Choose two.)

Options:

A.

IPLFA

B.

MPLS OAM

C.

VPLS

D.

SO-MPLS

E.

Fast-Rwoute

Question 98

Refer to the exhibit.

A network administrator notices these console messages from host 10.11.110.12 originating from interface E1/0. The administrator considers this an unauthorized attempt to access SNMP on R1. Which action prevents the attempts to reach R1 E1/0?

Options:

A.

Configure IOS control plane protection using ACL 90 on interface E1/0

B.

Configure IOS management plane protection using ACL 90 on interface E1/0

C.

Create an inbound ACL on interface E1/0 to deny SNMP from host 10.11.110.12

D.

Add a permit statement including the host 10.11.110.12 into ACL 90

Question 99

Refer to the exhibit. Which configuration resolves the issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 100

Refer to the exhibit.

An engineer must establish a point-to-point GRE VPN between R1 and the remote site. Which configuration accomplishes the task for the remote site?

Options:

A.

Interface Tunnel1tunnel source 199.1.1.1tunnel destination 200.1.1.3ip address 192.168.1.3 255.255.255.0

B.

Interface Tunnel1tunnel source 200.1.1.3tunnel destination 199.1.1.1ip address 192.168.1.1.255.255.255.0

C.

Interface Tunnel1tunnel source 200.1.1.3tunnel destination 199.1.1.1ip address 192.168.1.3.255.255.255.0

D.

Interface Tunnellunnel source 199.1.1.1tunnel destination 200.1.1.3ip address 192.168.1.1.255.255.255.0

Question 101

Refer to the exhibit.

TCP traffic should be reaching host 10.10.10.10/24 via R2. Which action resolves the issue?

Options:

A.

TCP traffic will reach the destination via R2 without any changes

B.

Add a permit 20 statement in the route map to allow TCP traffic

C.

Allow TCP in the access list with no changes to the route map

D.

Set IP next-hop to 10.10.12.2 under the route-map permit 10 to allow TCP traffic.

Question 102

Refer to the exhibit.

An engineer must configure a LAN-to-LAN IPsec VPN between R1 and the remote router. Which IPsec

Phase 1 configuration must the engineer use for the local router?

Options:

A.

crypto isakmp policy 5authentication pre-shareencryption 3deshash shagroup 2!crypto isakmp key cisco123 address 200.1.1.3

B.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123 address 200.1.1.3

C.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123 address 199.1.1.1

D.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123! address 199.1.1.1

Question 103

Refer to me exhibit Traffic from R3 to the central site does not use alternate paths when R3 cannot reach 10 10 10 2 Traffic on R3 destined to R4 takes an alternate route via 10 10 10.6 when 10 10 10 4 is not accessible from R3 Which configuration switches traffic destined to 10 10 10 2 from R3 on the alternate path’’

Options:

A.

R3(config)#ip route 192.168.10.1 255.255.265.255 10.10.10.2 track 20

B.

R2(config)#ip route 10.10 10 3 255 255.255 255 10.0.0.6

C.

R3(config)#track( 20 ip sla 20 reachability

D.

R6(config)#ip route 10.10.10 3 255.255.255.255 10.0.0.30

Question 104

Refer to the exhibit.

An engineer is trying to add an encrypted user password that should not be visible in the router configuration. Which two configuration commands resolve the issue? (Choose two)

Options:

A.

password encryption aes

B.

username Admin password Cisco@maedeh motamedi

C.

username Admin password 5 Cisco@maedeh motamedi

D.

username Admin secret Cisco@maedeh motamedi

E.

no service password-encryption

F.

service password-encryption

Question 105

The network administrator configured the router for Control Plane Policrg so that inbound SSH traffic is policed to 500 kbps This policy must apply to traffic coming in from 101010 0<24 and 192 168 10.0/24 networks

The Control Rane Policing is not applied to SSH traffic and SSH is open to use any bandwidth available. Which configuration resolves this issue?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 106

Refer to the exhibit. The ISP router is fully configured for customer A and customer B using the VRF-Lite feature. What is the minimum configuration required for customer A to communicate between routers A1 and A2?

Options:

A.

A1interface fa0/0description To->ISPip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0

B.

A1interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0A2interfacefa0/0description To->ISPip vrf forwarding Aip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0

C.

A1interface fa0/0description To->ISPip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0

D.

A1interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100 vrf Anet 172.31.200.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100 vrf Anet 172.31.200.1 0.0.0.255 area 0

Question 107

Refer to the exhibit.

An engineer configured IP SLA to monitor a next hop on a router for reachability When the next hop is unreachable, the router is executing tracking and failing over another route, but packet loss is experienced because the reachability is flapping. Which action resolves the issue?

Options:

A.

Append delay up 0 down Ovto the track command

B.

Increase the timeout of the sla probe to 6000

C.

Append delay up SO down 60vto the track command

D.

Increase the frequency of the sla probe to 60.

Question 108

Refer to the exhibit. An engineer configured router R3 to redistribute the prefix 10.10.10.0/24 from OSPF into EIGRP R1 has no connectivity to the prefix. Which action enables receipt of prefixes on R1?

Options:

A.

R3 is advertising the 10.20.20 0'24 prefix with a TTL of 1, R3 must set the TTL to 2 for this prefix.

B.

R1 docs not have a neighbor relationship with R2. The EIGRP process should be cleared on R1.

C.

Duplicate router IDs on R1 and R3, R1 should modify its router ID.

D.

R1 is not receiving the next-hop IP address of R3. R2 must enable the network 10 20.20.0V24 within EIGRP.

Question 109

What are two characteristics of a VRF instance? (Choose two)

Options:

A.

It is defined by the VPN membership of a customer site attached to a P device.

B.

Each VRF has a different set of routing and CEF tables.

C.

AII VRFS share customers routing and CEF tables.

D.

An interface must be associated to one VRF

E.

A customer site can be associated to different VRFs.

Question 110

A network administrator must optimize the segment size of the TCP packet on the DMVPN IPsec protected tunnel interface, which carries application traffic from the head office to a designated branch. The TCP segment size must not overwhelm the MTU of the outbound link. Which configuration must be applied to the router to improve the application performance?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 111

What is a function of IPv6 Source Guard?

Options:

A.

It works with address glean or ND to find existing addresses.

B.

It inspects ND and DHCP packets to build an address binding table.

C.

It denies traffic from known sources and allocated addresses.

D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

Question 112

:588

Refer to the exhibit. An engineer must filter prefixes that originate from AS65412. but it is not working correctty. Which configuration must the engineer apply to R1 to resolve the issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 113

Refer to the exhibit. A network engineer lost remote access to the router due to a network problem. The engineer used the console to access the router and noticed continuous logs on the console terminal. Which configuration limits the number of log messages on the console to critical and higher seventy level messages?

Options:

A.

term no monitor

B.

logging console 2

C.

no logging console

D.

logging console 5

Question 114

Refer to the exhibit. A network engineer receives a report that Spoke 1 users can perform bank transactions with the server located at the Center site, but Spoke 2 users cannot. Which action resolves the issue?

Options:

A.

Configure the Spoke 2 users IP on the router B OSPF domain

B.

Configure encapsulation dot1q 78 on the router C interface.

C.

Configure IPv6 on the routers B and C interfaces

D.

Configure OSPFv2 on the routers B and C interfaces

Question 115

Refer to the exhibit After an engineer modified the configuration for area 7 to permit type 1 2 and 7 LSAs only users connected to router R9 reported that they could no longer access the internet. Which configuration restores internet access to users on R9 and permits only LSA type 1,2, and 7?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 116

Refer to the exhibit. In Cuco DNA Center, a network engineer identifies that BGP-learned networks are repeatedly withdrawn from peers. Which configuration must the engineer apply to resolve the Issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 117

Refer to the exhibit.

An engineer configures the router 10.1.100.10 for EIGRP autosummarization so that R1 should receive the summary route of 10.0.0.0/8. However, R1 receives more specific /24 routes.

Which action resolves this issue?

Options:

A.

Router R1 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

B.

Router R1 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are received on R1.

C.

Router 10.1.100.10 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are summarized toward R1.

D.

Router 10.1.100.10 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

Question 118

Refer to the exhibit. An engineer configured SNMP Commîmes on UserSW2 switch, but the SNMP server cannot upload modified configurations to the switch. Which configuration resolves this issue?

Options:

A.

snmp-server community Ciscowruser RW 11

B.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

C.

snmp-server community CiscOUs3r RW 11

D.

snmp-server group NETVIEW v2c priv read NETVIEW access 11

Question 119

Refer to the exhibit A customer reported an issue with a fiber link failure between RC and RE Users connected through the spoke location face disconnection and packet drops with the primary email server (172.16.16.1) but have no issues with the backup email server (172.16.26.1). All the router loopback IPs are advertised through the OSPF protocol. Which configuration resolves the issue?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 120

What is a MPLS PHP label operation?

Options:

A.

Downstream node signals to remove the label.

B.

It improves P router performance by not performing multiple label lookup.

C.

It uses implicit-NULL for traffic congestion from source to destination forwarding

D.

PE removes the outer label before sending to the P router.

Question 121

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

TypE. dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does the authoritative flag mean in regards to the NHRP information?

Options:

A.

It was obtained directly from the next-hop server.

B.

Data packets are process switches for this mapping entry.

C.

NHRP mapping is for networks that are local to this router.

D.

The mapping entry was created in response to an NHRP registration request.

E.

The NHRP mapping entry cannot be overwritten.

Question 122

Which is statement about IPv6 inspection is true?

Options:

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Question 123

Refer to the exhibit.

Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and

ignores BGP traffic that is sent at higher rate?

Options:

A.

policy-map SHAPE_BGP

B.

policy-map LIMIT_BGP

C.

policy-map POLICE_BGP

D.

policy-map COPP

Question 124

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

Options:

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Question 125

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

Options:

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRPautonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Question 126

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

Options:

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Question 127

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

Options:

A.

R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.

B.

R1 does not accept any routes other than 192.168.130.0/24

C.

R1 does not forward traffic that is destined for 192.168.30.0/24

D.

Network 192.168.130.0/24 is not allowed in the R1 table

Question 128

Which transport layer protocol is used to form LDP sessions?

Options:

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Question 129

Refer to the exhibit.

Drag and drop the credentials from the left onto the remote login information on the right to resolve a failed login attempt to vtys. Not all credentials are uf SLA by defining frequency and schedulingsed

Options:

Question 130

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

Options:

A.

DMVPN

B.

GETVPN

C.

Cisco Easy VPN

D.

FlexVPN

Question 131

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

Options:

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Question 132

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

Options:

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Question 133

What is the role of a route distinguisher via a VRF-Lite setup implementation?

Options:

A.

It extends the IP address to identify which VFP instance it belongs to.

B.

It manages the import and export of routes between two or more VRF instances

C.

It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities

D.

It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities

Question 134

What is a function of IPv6 ND inspection?

Options:

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Question 135

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

Options:

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Question 136

What is a role of route distinguishers in an MPLS network?

Options:

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Question 137

Refer to the exhibit.

Which statement about R1 is true?

Options:

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Question 138

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

Options:

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Question 139

Which configuration enabled the VRF that is labeled “Inet” on FastEthernet0/0?

Options:

A.

R1(config)# ip vrf InetR1(config-vrf)#interface FastEthernet0/0R1(config-if)#ip vrf forwarding Inet

B.

R1(config)#router ospf 1 vrf InetR1(config-router)#ip vrf forwarding FastEthernet0/0

C.

R1(config)#ip vrf Inet FastEthernet0/0

D.

R1(config)# ip vrf InetR1(config-vrf)#ip vrf FastEthernet0/0

Question 140

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

Options:

A.

service timestamps log uptime

B.

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.

service timestamps log datetime localtime show-timezone

D.

clock calendar-valid

Question 141

Refer to the exhibit.

Why is user authentication being rejected?

Options:

A.

The TACACS+ server expects “user”, but the NT client sends “domain/user”.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

C.

The TACACS+ server is down, and the user is in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Question 142

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

Options:

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Question 143

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 144

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

Options:

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Question 145

What is a prerequisite for configuring BFD?

Options:

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Question 146

Drag and drop the MPLS terms from the left onto the correct definitions on the right.

Options:

Question 147

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Options:

Question 148

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

Options:

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Question 149

Refer to the exhibit.

An engineer configures a static route on a router, but when the engineer checks the route

to the destination, a different next hop is chosen. What is the reason for this?

Options:

A.

Dynamic routing protocols always have priority over static routes.

B.

The metric of the OSPF route is lower than the metric of the static route.

C.

The configured AD for the static route is higher than the AD of OSPF.

D.

The syntax of the static route is not valid, so the route is not considered.

Question 150

Refer to the exhibit.

The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host

192.168.10.10cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action

resolves the issue without opening full access to this router?

Options:

A.

Move the SSH entry to the beginning of the ACL

B.

Temporarily move the permit ip any any line to the beginning of the ACL to see if the flow works

C.

Temporarily remove the ACL from the interface to see if the flow works

D.

Run the show access-list FILTER command to view if the SSH entry has any hit statistic associated with it

Question 151

Refer to the exhibit.

R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?

Options:

A.

R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.

B.

Route reflector setup requires full IBGP mesh between the routers.

C.

In route reflector setup, only classful prefixes are advertised to other clients.

D.

In route reflector setups, prefixes are not advertised from one client to another.

Question 152

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

Options:

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Question 153

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

Options:

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Question 154

Refer to the exhibit.

After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

Options:

A.

Set the administrative distance 100 under the RIP process on R2.

B.

Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.

C.

Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.

D.

Redistribute the directly connected interfaces on R2.

Question 155

An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

Options:

A.

set ip next-hop

B.

set ip default next-hop

C.

set ip next-hop recursive

D.

set ip next-hop verify-availability

Question 156

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Options:

Question 157

Refer to the exhibit.

Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?

Options:

A.

Issue the eigrp stub command on R1

B.

Issue the no neighbor stub command on R2.

C.

Issue the eigrp command on R2.

D.

Issue the no eigrp stub command on R1.

Question 158

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

Options:

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Question 159

Refer to the exhibit.

The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 160

Refer to the exhibit.

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

Options:

A.

no ip ssh disable

B.

ip ssh enable

C.

ip ssh version 2

D.

crypto key generate rsa

Question 161

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 162

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Options:

Question 163

Which security feature can protect DMVPN tunnels?

Options:

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Question 164

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 165

Refer to the exhibit.

Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 166

What is an advantage of using BFD?

Options:

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Question 167

Refer to the exhibit.

In which circumstance does the BGP neighbor remain in the idle condition?

Options:

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Question 168

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

Options:

A.

DMVPN

B.

MPLS VPN

C.

Virtual Tunnel Interface (VTI)

D.

SSL VPN

E.

PPPoE

Question 169

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

Options:

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Question 170

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 171

Refer to the exhibit.

A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

Options:

A.

The local preference value in another neighbor statement is higher than 250.

B.

The local preference value should be set to the same value as the weight in the route map.

C.

The route map is applied in the wrong direction.

D.

The weight value in another neighbor statement is higher than 200.

Question 172

Refer to the exhibit.

An engineer is trying to redistribute OSPF to BGP, but not all of the routes are

redistributed. What is the reason for this issue?

Options:

A.

By default, only internal routes and external type 1 routes are redistributed into BGP

B.

Only classful networks are redistributed from OSPF to BGP

C.

BGP convergence is slow, so the route will eventually be present in the BGP table

D.

By default, only internal OSPF routes are redistributed into BGP

Question 173

Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right.

Options:

Question 174

Which option is the best for protecting CPU utilization on a device?

Options:

A.

fragmentation

B.

COPP

C.

ICMP redirects

D.

ICMP unreachable messages

Question 175

Which statement about MPLS LDP router ID is true?

Options:

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Question 176

Which two statements about VRF-Lite configurations are true? (Choose two.)

Options:

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

Question 177

Refer to the exhibit.

AAA server 10.1.1.1 is configured with the default authentication and accounting settings, but the switch cannot communicate with the server Which action resolves this issue?

Options:

A.

Match the authentication port

B.

Match the accounting port

C.

Correct the timeout value.

D.

Correct the shared secret.

Question 178

Refer to the exhibit.

What is the result of applying this configuration?

Options:

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Question 179

Drag and drop the MPLS VPN device types from me left onto the definitions on the right.

Options:

Question 180

While troubleshooting connectivity issues to a router, these details are noticed:

Standard pings to all router interfaces, including loopbacks, are successful.

Data traffic is unaffected.

SNMP connectivity is intermittent.

SSH is either slow or disconnects frequently.

Which command must be configured first to troubleshoot this issue?

Options:

A.

show policy-map control-plane

B.

show policy-map

C.

show interface | inc drop

D.

show ip route

Demo: 180 questions
Total 594 questions