Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-410

300-410 Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Question and Answers

Question # 4

Drag and drop the DHCP messages from the left onto the correct uses on the right.

Full Access
Question # 5

Refer to the exhibit.

Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and

ignores BGP traffic that is sent at higher rate?

A.

policy-map SHAPE_BGP

B.

policy-map LIMIT_BGP

C.

policy-map POLICE_BGP

D.

policy-map COPP

Full Access
Question # 6

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Full Access
Question # 7

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 8

Refer to the exhibit.

After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

A.

Set the administrative distance 100 under the RIP process on R2.

B.

Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.

C.

Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.

D.

Redistribute the directly connected interfaces on R2.

Full Access
Question # 9

What is the output of the following command:

show ip vrf

A.

Show's default RD values

B.

Displays IP routing table information associated with a VRF

C.

Show's routing protocol information associated with a VRF.

D.

Displays the ARP table (static and dynamic entries) in the specified VRF

Full Access
Question # 10

Refer to the exhibit.

In which circumstance does the BGP neighbor remain in the idle condition?

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Full Access
Question # 11

Exhibit:

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 12

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 13

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 14

Which command displays the IP routing table information that is associated with VRF-Lite?

A.

show ip vrf

B.

show ip route vrf

C.

show run vrf

D.

show ip protocols vrf

Full Access
Question # 15

Refer to the exhibit.

Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?

A.

Issue the eigrp stub command on R1

B.

Issue the no neighbor stub command on R2.

C.

Issue the eigrp command on R2.

D.

Issue the no eigrp stub command on R1.

Full Access
Question # 16

Drag and drop the MPLS VPN device types from me left onto the definitions on the right.

Full Access
Question # 17

Refer to the exhibit.

The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host

192.168.10.10cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action

resolves the issue without opening full access to this router?

A.

Move the SSH entry to the beginning of the ACL

B.

Temporarily move the permit ip any any line to the beginning of the ACL to see if the flow works

C.

Temporarily remove the ACL from the interface to see if the flow works

D.

Run the show access-list FILTER command to view if the SSH entry has any hit statistic associated with it

Full Access
Question # 18

Which configuration enabled the VRF that is labeled “Inet” on FastEthernet0/0?

A.

R1(config)# ip vrf InetR1(config-vrf)#interface FastEthernet0/0R1(config-if)#ip vrf forwarding Inet

B.

R1(config)#router ospf 1 vrf InetR1(config-router)#ip vrf forwarding FastEthernet0/0

C.

R1(config)#ip vrf Inet FastEthernet0/0

D.

R1(config)# ip vrf InetR1(config-vrf)#ip vrf FastEthernet0/0

Full Access
Question # 19

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 20

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 21

Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A.

nonbroadcast multiaccess

B.

packet switching

C.

policy-based routing

D.

forwarding information base

Full Access
Question # 22

Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right.

Full Access
Question # 23

What is a prerequisite for configuring BFD?

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Full Access
Question # 24

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 25

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?

A.

show track

B.

show threshold

C.

show timer

D.

show delay

Full Access
Question # 27

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 28

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 29

Refer to the exhibit.

During troubleshooting it was discovered that the device is not reachable using a secure

web browser. What is needed to fix the problem?

A.

permit tcp port 443

B.

permit udp port 465

C.

permit tcp port 465

D.

permit tcp port 22

Full Access
Question # 30

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 31

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 32

Which transport layer protocol is used to form LDP sessions?

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Full Access
Question # 33

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 34

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) to the outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

Drag and drop the MPLS terms from the left onto the correct definitions on the right.

Full Access
Question # 37

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 38

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 39

Which is statement about IPv6 inspection is true?

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 40

An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A.

sudo maglev-config update

B.

sudo maglev install config update

C.

sudo maglev reinstall

D.

sudo update config install

Full Access
Question # 41

Refer to the exhibit.

R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?

A.

R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.

B.

Route reflector setup requires full IBGP mesh between the routers.

C.

In route reflector setup, only classful prefixes are advertised to other clients.

D.

In route reflector setups, prefixes are not advertised from one client to another.

Full Access
Question # 42

When provisioning a device in Cisco DNA Center, the engineer sees the error message “Cannot select the device. Not compatible with template”.

What is the reason for the error?

A.

The template has an incorrect configuration.

B.

The software version of the template is different from the software version of the device.

C.

The changes to the template were not committed.

D.

The tag that was used to filter the templates does not match the device tag.

Full Access
Question # 43

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Full Access
Question # 44

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 45

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRPautonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Full Access
Question # 46

Refer to the exhibit.

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 47

Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?

A.

shared risk link group-disjoint

B.

linecard-disjoint

C.

lowest-repair-path-metric

D.

interface-disjoint

Full Access
Question # 48

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 49

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 50

Refer to the exhibit.

The R1 and R2 configurations are:

The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 tti-security hops 1neighbor 10.1.1.1 update-source loopback 0

B.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 disable-connected-checkneighbor 10.1.1.1 update-source loopback 0

C.

R2ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

D.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.1 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

E.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 disable-connected-checkneighbor 10.1.1.2 update-source Loopback0

Full Access
Question # 51

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 52

Drag and drop the MPLS VPN device types from the left onto the definitions on the right.

Full Access
Question # 53

Refer to the exhibit.

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

Refer to the exhibit.

A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?

A.

no terminal monitor

B.

(config)#terminal no monitor

C.

#terminal no monitor

D.

(config)#no terminal monitor

Full Access
Question # 55

Refer to the exhibit.

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

A.

Configure logging history 2

B.

Configure logging history 3

C.

Configure logging history 4

D.

Configure logging history 5

Full Access
Question # 56

Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source The configuration did not work as desired Which service must be enabled to resolve the issue?

A.

Enter the service timestamps log datetime localtime global command.

B.

Enter the service timestamps log datetime synchronize global command.

C.

Enter the service timestamps log datetime console global command.

D.

Enter the service timestamps log datetime clock-period global command

Full Access
Question # 57

A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?

A.

tunnel interface of the hub with ip nhrp ospf dr

B.

OSPF priority to 0

C.

route map to set the metrics of learned routes to 110

D.

OSPF priority greater than 1

Full Access
Question # 58

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 59

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 60

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

Full Access
Question # 61

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 62

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 63

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Full Access
Question # 64

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 65

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Full Access
Question # 66

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

A.

Detect Mult

B.

Required Min Echo RX Interval

C.

Desired Min TX Interval

D.

Required Min RX Interval

Full Access
Question # 67

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 68

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 69

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 70

Refer to the exhibit.

An engineer configured BGP between routers R1 and R3 The BOP peers cannot establish neighbor adjacency to be able to exchange routes. Which configuration resolves this issue?

A.

R3router bgp 6502address-family ipv6neighbor AB01:2011:7:100::1 activate

B.

R1router bgp 6501address-family ipv6neighbor AB01:2011:7:100;:3 activate

C.

R3router bgp 6502neighbor AB01:2011:7:100::1 ebgp-muttlhop 255

D.

R1router bgp 6501 neighborAB01:2011:7:100::3ebgp-multihop255

Full Access
Question # 71

Refer to exhibit.

Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when the show ip route profile

command is run. How must the services be stabilized?

A.

The issue with using BGP must be resolved by using another protocol and redistributing it into EIGRP on R3

B.

The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3

C.

The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3

D.

The issue with using iBGP must be fixed by running eBGP between R3 and R4

Full Access
Question # 72

Refer to the exhibit.

The neighbor relationship is not coming up Which two configurations bring the adjacency up? (Choose two)

A.

NYrouter ospf 1area 0 authentication message-digest

B.

LAinterface E 0/0ip ospf message-digest-key 1 md5 Cisco123

C.

NYinterface E 0/0no ip ospf message-digest-key 1 md5 Cisco123ip ospf authentication-key Cisco123

D.

LAinterface E 0/0ip ospf authentication-key Cisco123

E.

LArouter ospf 1area 0 authentication message-digest

Full Access
Question # 73

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 74

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 75

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 76

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

A.

Interface Tunnel1no ip split-horizon eigrp 111

B.

Interface Tunnel1Ip next-hop-self elgrp 111

C.

Interface Tunnel1tunnel mode Ipsec Ipv4

D.

Interface Tunnel1tunnel protection ipsec profile IPSec-PROFILE

Full Access
Question # 77

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 78

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 79

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 80

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Full Access
Question # 81

Refer to the exhibit.

Troubleshoot and ensure that branch B only ever uses the MPLS B network to reach HQ. Which action achieves this requirement?

A.

Introduce an AS path filter on branch A routers so that only local prefixes are advertised into BGP

B.

increase the local preference for all HQ prefixes received at branch B from the MPLS B network to be higher than the local preferences used on the MPLS A network

C.

Introduce AS path prepending on the branch A MPLS B network connection so that any HQ advertisements from branch A toward the MPLS B network are prepended three times

D.

Modify the weight of all HQ prefixes received at branch B from the MPLS B network to be higher than the weights used on the MPLS A network

Full Access
Question # 82

Refer to Exhibit.

The network administrator configured the branch router for IPv6 on the E0/0 interface. The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

B.

Disable IPv6 on the E0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the E0/0 interface by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E0/0 interface

Full Access
Question # 83

What does the PE router convert the Ipv4 prefix to within an MPLS VPN?

A.

VPN-IPv4 prefix combined with the 64-bit route distinguisher

B.

48-bit route combining the IP and PE router-id

C.

prefix that combines the ASN, PE router-id, and IP prefix

D.

eBGP path association between the PE and CE sessions

Full Access
Question # 84

Refer to the exhibit.

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

B.

Add icmp-echo command for the host.

C.

Add the control disable option to the tcp connect.

D.

Modify the ip sla schedule frequency to forever.

Full Access
Question # 85

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Full Access
Question # 86

Refer to the exhibit.

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Full Access
Question # 87

What are two functions of MPLS Layer 3 VPNs? (Choose two.)

A.

LDP and BGP can be used for Pseudowire signaling.

B.

It is used for transparent point-to-multipoint connectivity between Ethernet links/sites.

C.

BGP is used for signaling customer VPNv4 routes between PE nodes.

D.

A packet with node segment ID is forwarded along with shortest path to destination.

E.

Customer traffic is encapsulated in a VPN label when it is forwarded in MPLS network.

Full Access
Question # 88

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 89

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Full Access
Question # 90

Refer to the exhibit.

The network administrator can see the DHCP discovery packet in R1. but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the FaO/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)

A.

service dhcp-relay command on R1

B.

ip dhcp option 82 command on R2

C.

service dhcp command on R1

D.

ip dhcp relay information enable command on R1

E.

ip dhcp relay information trust-all command on R2

Full Access
Question # 91

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Full Access
Question # 92

Which two protocols work in the control plane of P routers across the MPLS cloud? (choose two)

A.

LSP

B.

RSVP

C.

ECMP

D.

LDP

E.

MPLS OAM

Full Access
Question # 93

Refer to the exhibit.

Which action resolves the failed authentication attempt to the router?

A.

Configure aaa authorization login command on line vty 0 4

B.

Configure aaa authorization login command on line console 0

C.

Configure aaa authorization console global command

D.

Configure aaa authorization console command on line vty 0 4

Full Access
Question # 94

Refer to the exhibit.

While troubleshooting an EIGRP neighbor adjacency problem, the network engineer notices that the interface connected to the neighboring router is not participating in the EIGRP process. Which action resolves the issues?

A.

Configure the network command to network 172.16.0.1 0.0.0.0

B.

Configure the network command under EIGRP address family vrf CLIENT1

C.

Configure EIGRP metrics on interface FastEthernet0/3

D.

Configure the network command under EIGRP address family ipv4

Full Access
Question # 95

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/3ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/1ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/3ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/1ip policy route-map PBR1

Full Access
Question # 96

Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue?

A.

HQ_R3(config)# ip sla responderHQ_R3(config)# ip sla responder icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 192.168.100.2

C.

HQ R3(config)# Ip sla responderHQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5

D.

BRANCH(config)# Ip sla 1BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1

Full Access
Question # 97

Exhibit:

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

A.

Check and resolve reachability between the WLC and the NTP server

B.

Reset the NTP server to resolve any synchronization issues for all devices

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Full Access
Question # 98

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responderHQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responderHQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 99

An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A.

match the passwords

B.

match the hello timers

C.

match the MTUs

D.

match the network types

Full Access
Question # 100

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 101

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 102

How does an MPLS Layer 3 VPN function?

A.

set of sites use multiprotocol BGP at the customer site for aggregation

B.

multiple customer sites interconnect through service provider network to create secure tunnels between customer edge devices

C.

set of sites interconnect privately over the Internet for security

D.

multiple customer sites interconnect through a service provider network using customer edge to provider edge connectivity

Full Access
Question # 103

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?

A.

router ospf 1default-information originate

B.

router ospf 1network 0.0.0.0 0.0.0.0 area 0

C.

router ospf 1redistribute connected 0.0.0.0

D.

router ospf 1redistribute static subnets

Full Access
Question # 105

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 106

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second ISP link is up?

A.

LOCAL_PREF

B.

MED

C.

WEIGHT

D.

AS-PATH

Full Access
Question # 107

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 108

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 109

Refer to the exhibit.

R1 is configured with IP SLA to check the availability of the server behind R6 but it kept failing. Which configuration resolves the issue?

A.

R6(config)# ip sla responder

B.

R6(config)# ip sla responder udp-echo ip address 10.10.10.1 port 5000

C.

R6(config)# ip access-list extended DDOSR6(config ext-nac)# 5 permit icmp host 10.66 66.66 host 10.10.10.1

D.

R6(config)# ip access-list extended DDOSR6(confg ext-nac)# 5 permit icmp host 10.10.10.1 host 10.66.66.66

Full Access
Question # 110

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Full Access
Question # 111

i.

Which two labet distribution methods are used by routers in MPLS? (Choose two )

A.

targeted hello message

B.

LDP discovery hello message

C.

LDP session protection message

D.

downstream unsolicited

E.

downstream on demand

Full Access
Question # 112

What are two characteristics of a VRF instance? (Choose two)

A.

It is defined by the VPN membership of a customer site attached to a P device.

B.

Each VRF has a different set of routing and CEF tables.

C.

AII VRFS share customers routing and CEF tables.

D.

An interface must be associated to one VRF

E.

A customer site can be associated to different VRFs.

Full Access
Question # 113

Refer to the exhibit.

A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?

A.

Remove ipv6 inspect ipv6-firewall in from interface gi0/1

B.

Add permit udp any eq domain any log in the access list.

C.

inspect ipv6 inspect name ipv6-firewall udp 53 in global config.

D.

Add permit any eq domain 53 any log in the access list.

Full Access
Question # 114

Refer to the exhibit. An organization is installing a new L3 MPLS link to establish DM VPN Phase 2 tunnels between the hub and two spoke routers Which additional configuration should the engineer implement on each device to achieve optimal routing between the spokes?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 115

Refer to the exhibit. R1 uses SP1 as the primary path. A network engineer must force all SSH traffic generated from R1 toward SP2. Which configuration accomplishes the task?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 116

Refer to the exhibit.

An OSPF neighbor relationship between R2 and R3 is showing stuck in EXCHANGE/EXSTART state. The neighbor is established between R1 and R2. The network engineer can ping from R2 to R3 and vice versa, but the

neighbor is still down. Which action resolves the issue?

A.

Restore the Layer 2/Layer 3 conectivity issue in the ISP network.

B.

Match MTU on both router interfaces or ignore MTU.

C.

Administrative "shut then no shut" both router interfaces.

D.

Enable OSPF on the interface, which is required.

Full Access
Question # 117

Which protocol must be secured with MD-5 authentication across the MPLS cloud to prevent hackers from introducing bogus routers?

A.

MP-BGP

B.

LSP

C.

RSVP

D.

LDP

Full Access
Question # 118

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit ip host 172.16.1.99 any

!

class-map CM-ADMIN

match access-group 100

!

policy-map PM-COPP

class CM-ADMIN

police 500000 conform-action transmit

!

interface E0/0

service-policy input PM-COPP

CoPP failed to capture the desired traffic and the CPU load is getting higher.

Which two configurations resolve the issue? (Choose two.)

A.

interface E0/0no service-policy input PM-COPP!control-planeservice-policy input PM-COPP

B.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit!control-planeservice-policy input PM-COPP

C.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80

D.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80access-list 100 permit tcp host 172.16.1.99 any eq 443

E.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit

Full Access
Question # 119

The network administrator configured the router for Control Plane Policrg so that inbound SSH traffic is policed to 500 kbps This policy must apply to traffic coming in from 101010 0<24 and 192 168 10.0/24 networks

The Control Rane Policing is not applied to SSH traffic and SSH is open to use any bandwidth available. Which configuration resolves this issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 120

Refer to the exhibit.

A network administrator must configure DMVPN tunnels between the hub and spoke with dynamic spoke-to-spoke tunnel capabilities using EIGRP. Which tunnel interface command must the network administrator configure to establish an EIGRP peer?

A.

no ip next-hop-self eigrp 1

B.

ip next-hop-self eigrp 1

C.

no Ip nhrp ntxt-hop-self

D.

ip nhrp next-hop-self

Full Access
Question # 121

An engineer failed to run diagnostic commands on devices using Cisco DNA Center. Which action in Cisco DNA Center resolves the issue?

A.

Enable Command Runner

B.

Enable APIs

C.

Enable CDP

D.

Enable Secure Shell

Full Access
Question # 122

Refer to the exhibit. An administrator must harden a router, but the administrator failed to test the SSH access successfully to the router. Which action resolves the issue?

A.

Configure SSH on the remote device to log m using SSH

B.

SSH syntax must be ssh -I user ip to log in to the remote device

C.

Configure enable secret to log in to the device

D.

SSH must be allowed with the transport output ssh command

Full Access
Question # 123

Refer to the exhibit.

An engineer configures DMVPN and receives the hub location prefix of 10.1.1.0724 on R2 and R3 The R3 prefix of 10 1.3.0/24 is not received on R2. and the R2 prefix 10.1,2.0/24 is not received on R3. Which action reserves the issue?

A.

Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the command no ip split-horizon eigrp 10 on the tunnel interface of R1

B.

There is no spoke-to-spoke connection DMVPN configuration should be modified to enable a tunnel connection between R2 and R3 and neighbor relationship confirmed by use of the show ip eigrp neighbor command

C.

Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the no ip split-horizon eigrp 10 command on the Gi0/0 interface of R1.

D.

There is no spoke-to-spoke connection DMVPN configuration should be modified with a manual neighbor relationship configured between R2 and R3 and confirmed bb use of the show ip eigrp neighbor command.

Full Access
Question # 124

Refer to the exhibit.

A network administrator must block ping from user 3 to the App Server only. An inbound standard access list is applied to R1 interface G0/0 to block ping. The network administrator was notified that user 3 cannot even ping user 9 anymore. Where must the access list be applied in the outgoing direction to resolve the issue?

A.

R2 interface G1/0

B.

R2 interface G0/0

C.

SW1 interface G1/10

D.

SW1 interface G2/21

Full Access
Question # 125

A.

access-list 20 permit 10.221.10.12

B.

snmp-server group NETVIEW v2c priv read NETVIEW access 20

C.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

D.

access-list 20 permit 10.221.10.11

Full Access
Question # 126

Refer to the exhibit. An engineer configured route exchange between two different companies for a migration project EIGRP routes were learned in router C but no OSPF routes were learned in router A. Which configuration allows router A to receive OSPF routes?

A.

(config-router-af)#redistribute ospf 10 1000000 10 255 1 1500

B.

(config-routeraf-topology)#redistribute ospf 10 metric 1000000 10 255 1 1500

C.

(config-router-af-topology)#redistribute connected

D.

(config-router-af-topology )£no redistribute ospf 10 match external 1 external 2 metric 1000000 10 255 1 1500

Full Access
Question # 127

The summary route is not shown in the RouterB routing table after this below configuration on Router_A

.

Which Router_A configuration resolves the issue by advertising the summary route to Router B?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 128

Refer to the exhibit The route to 192 168 200 0 is flapping between R1 and R2 Which set of configuration changes resolves the flapping route?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 129

What is the function of BFD?

A.

It provides uniform failure detection regardless of media type.

B.

It creates high CPU utilization on hardware deployments.

C.

It negotiates to the highest version if the neighbor version differs.

D.

It provides uniform failure detection on the same media type.

Full Access
Question # 130

Refer to the exhibit. An engineer configured user login based on authentication database on the router, but no one can log into the router. Which configuration resolves the issue?

A.

aaa authentication login default enable

B.

aaa authorization network default local

C.

aaa authentication login default local

D.

aaa authorization exec default local

Full Access
Question # 131

Refer to the exhibit. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 132

:576

Refer to the exhibit. R1 and R2 have been configured where the neighbor relationship must be authenticatedusmgMD5:

The neighbor relationship is not coming up. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 133

How does an MPLS Layer 3 VPN differentiate the IP address space used between each VPN?

A.

by RD

B.

by address family

C.

by MP-BGP

D.

byRT

Full Access
Question # 134

Refer to the exhibit.

R5 should not receive any routes originated in the EIGRP domain. Which set of configuration changes removes the EIGRP routes from the R5 routing table to fix the issue?

A.

R4route-map O2R deny 10match tag 111route-map O2R permit 20!router ripredistribute ospf 1 route-map O2R metric 1

B.

R2route-map E20 deny 20R4route-map O2R deny 10match tag 111!router ripredistribute ospf 1 route-map O2R metric 1

C.

R4route-map O2R permit 10match tag 111route-map O2R deny 20!router ripredistribute ospf 1 route-map O2R metric 1

D.

R4route-map O2R deny 10match tag 111!router ripredistribute ospf 1 route-map O2R metric 1

Full Access
Question # 135

Refer to the exhibit.

An engineer configures two ASBRs 10 4 17.6 and 10 4 15 5 in an OSPF network to redistribute routes from EIGRP However, both ASBRs show the EIGRP routes as equal costs even though the next-hop router 10 4 17 6 is closer to R1 How should the network traffic to the EIGRP prefixes be sent via 10 4.17.6?

A.

The administrative distance should be raised to 120 from the ASBR 10.4.15 5.

B.

The redistributed prefixes should be advertised as Type 1

C.

The ASBR 10 4 17 6 should assign a tag to match and assign a lower metnc on R1

D.

The administrative distance should be raised to 120 from the ASBR 104.17.6

E.

The admitstrative distance should be raised to 120 from the ASBR 104 15.5.

F.

The redistributed prefixes should be advertised as Type 1.

G.

The ASBR 10 4 17 6 should assign a tag to match and assign a tower metnc on R1

Full Access
Question # 136

Full Access
Question # 137

Refer to the exhibit EIGRP adjacency between router A and router C is not working as expected Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 138

Refer to the exhibit.

An engineer must configure PBR on R1 to reach to 10.2.2.0/24 via R3 AS64513 as the primary path and a backup route through default route via R2 AS64513. All BGP routes are in the routing table of R1. but a static default route overrides BGP routes. Which PBR configuration achieves the objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 139

An engineer configured routing between multiple OSPF domains and introduced a routing loop that caused network instability. Which action resolves the problem?

A.

Set a tag using the redistribute command toward a domain and deny inbound m the other domain by a matching tag

B.

Set a tag using the redistribute command toward a different domain and deny the matching tag when exiting from that domain

C.

Set a tag using the network command in a domain and use the route-map command to deny the matching lag when exiting toward a different domain

D.

Set a tag using the network command in a domain and use the route-map command to deny the matching tag when entering into a different domain

Full Access
Question # 140

Refer to the exhibit. An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 141

:585

Which type of ports are protected by IPv6 Source Guard?

A.

Layer 2 ports

B.

access ports

C.

Layer 3 ports

D.

trunk ports

Full Access
Question # 142

Refer to the exhibit. Router R4 is configured correctly with default OSPF values. A network engineer configured R7 for OSPF. R7 must not be elected as a DR for the segment between R4-R7. The adjacency between R4 and R7 failed to form. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 143

Refer to the exhibit.

The R2 loopback interface is advertised with RIP and EIGRP using default values. Which configuration changes make R1 reach the R2 loopback using RIP?

A.

R1(config)# router ripR1(config-router)# distance 90

B.

R1(config)# router ripR1(config-router)# distance 100

C.

R1(config)# router eigrp 1R1(config-router)# distance eigrp 130 120

D.

R1(config)# router eigrp 1R1(config-router)# distance eigrp 120 120

Full Access
Question # 144

The network administrator configured CoPP so that all SNMP traffic from Cisco Prime located at 192.168.1.11 toward the router CPU is limited to 1000 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit udp any any eq 161

!

class-map CM-SNMP

match access-group 100

!

policy-map PM-COPP

class CM-SNMP

police 1000 conform-action transmit

!

control-plane

service-policy input PM-COPP

The network administrator is not getting the desired result for the SNMP traffic and SNMP traffic is getting dropped frequently. Which set of configurations resolves the issue?

A.

no access-list 100access-list 100 permit tcp host 192.168.1.11 any eq 161

B.

no access-list 100access-list 100 permit udp host 192.168.1.11 any eq 161!policy-map PM-COPPclass CM-SNMPno police 1000 conform-action transmitpolice 1000000 conform-action transmit!control-planeno service-policy input PM-COPP!interface E 0/0service-policy input PM-COPP!interface E 0/1service-policy input PM-COPP

C.

no access-list 100access-list 100 permit udp host 192.168.1.11 any eq 161!policy-map PM-COPPclass CM-SNMPno police 1000 conform-action transmitpolice 1000000 conform-action transmit

D.

policy-map PM-COPPclass CM-SNMPno police 1000 conform-action transmitpolice 1000000 conform-action transmit

Full Access
Question # 145

What is a function of IPv6 Source Guard?

A.

It works with address glean or ND to find existing addresses.

B.

It inspects ND and DHCP packets to build an address binding table.

C.

It denies traffic from known sources and allocated addresses.

D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

Full Access
Question # 146

Refer to the exhibit.

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1destination 10.221.10.11

B.

flow exporter FlowAnalyzer1destination 10.221.10.11

C.

interface Ethernet0/1flow-destination 10.221.10.11

D.

interface Ethernet0/0flow-destination 10.221.10.11

Full Access
Question # 147

How are CE advertised routes segmented from other CE routers on an MPLS PE router?

A.

with a combination of VRF-Lite and MP-BGP

B.

by pushing MPLS labels advertised by LDP on customer routes

C.

by enabling multiple instances of BGP. one for each CE router

D.

by assigning CE-facing interfaces to different VRFs

Full Access
Question # 148

Which technique removes the outermost label of an MPLS-tagged packet before the packet is forwarded to an adjacent LER?

A.

label swap

B.

explicit-null

C.

label imposition

D.

PHP

Full Access
Question # 149

Refer to the exhibit.

The security department recently installed a monitoring device between routers R3 and R5, which a loss of network connectivity for users connected to R5. Troubleshooting revealed that the monitoring device cannot forward multicast packets. The team already updated R5 with the correct configuration. Which configuration must be implemented on R3 to resolve the problem by ensuring R3 as the DR for the R3-R5 segment?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 150

:588

Refer to the exhibit. An engineer must filter prefixes that originate from AS65412. but it is not working correctty. Which configuration must the engineer apply to R1 to resolve the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 151

Refer to the exhibit R1 cannot establish a neighbor relationship with R2 Which action resolves the issue"?

A.

Configure the mtu Ignore command on the Interfaces of R1 and R2

B.

Configure the ip ospf network point-to-point command on the interfaces of R1 and R2

C.

Configure the ip ospf network broadcast command on the interfaces of R1 and R2

D.

Configure the neighbor 2.2.2.2 command on R1 under the OSPF process

Full Access
Question # 152

Refer to the exhibit. The traffic from spoke to hub is dropping. The operations team observes:

R2-R3 link is down due to the fiber cut.

R2 and R5 receive traffic from R1 in AS 65101.

R3 and R5 receive traffic from R4 in AS 65201.

Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 153

A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?

A.

ip tcp adjust-mss 1360crypto ipsec fragmentation after-encryption

B.

ip tcp adjust-mtu 1360crypto ipsec fragmentation after-encryption

C.

ip tcp adjust-mss 1360crypto ipsec fragmentation mtu-discovery

D.

ip tcp adjust-mtu 1360crypto ipsec fragmentation mtu-discovery

Full Access
Question # 154

What are the two reasons for RD and VPNv4 addresses in an MPLS Layer 3 VPN? (Choose two.)

A.

RD is prepended to each prefix to make routes unique.

B.

VPN RT communities are used to identify customer unique routes.

C.

When the PE redistributes customer routes into MP-BGP, they must be unique.

D.

They are on a CE device to use for static configuration.

E.

They are used for a BGP session with the CE device.

Full Access
Question # 155

:584

Reler Iothe exhibit The engineer is trying to transfer the newIOSfile to the router R3 but is getting an error Which configuration achieves the file transfer?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 156

Refer to the exhibit.

During ISP router maintenance, the network produced many alerts because of the flapping interface. Which configuration on R1 resolves the issue?

A.

no snmp trap link-status

B.

snmp trap link-status down

C.

snmp trap ip verify drop-rate

D.

ip verify drop-rate notify hold-down 60

Full Access
Question # 157

Refer to the exhibit.

An engineer must filter incoming EIGRP updates to allow only a set of specific prefixes. The distribute list is tested, and it filters out all routes except network 10.10.10.0/24. How should the engineer temporarily allow all prefixes to be learned by the routers again without adjusting the existing access list?

A.

A permit 20 statement should be added before completing the ACL with the required prefixes, and then the permit 20 statement can be removed.

B.

A permit any statement should be added before completing the ACL with the required prefixes and then the permit any statement can be removed.

C.

A continue statement should be added within the permit 10 statement before completing the ACL with the required prefixes, and then the continue statement can be removed.

D.

An extended access list must be used instead of a standard access list to accomplish the task

Full Access
Question # 158

Refer to the exhibit.

An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue?

A.

ip access-list extended OSPF permit ospf any any

B.

policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop

C.

control-plane service-policy input COPP

D.

class-map match-all OSFP match access-group name OSPF

Full Access
Question # 159

R1 and R2 are configured as eBGP neighbor , R1 is in AS100 and R2 is in AS200. R2 is advertising these networks to R1:

The network administrator on R1 must improve convergence by blocking all subnets of 172-16.0.0/16 major network with a mask lower than 23 from coming in, Which set of configurations accomplishes the task on R1?

A.

ip prefix-list PL-1 deny 172.16.0.0/16 le 23ip prefix-list PL-1 permit 0.0.0.0/0 le 32!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

B.

ip prefix-list PL-1 deny 172.16.0.0/16 ge 23ip prefix-list PL-1 permit 0.0.0.0/0 le 32!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

C.

access-list 1 deny 172.16.0.0 0.0.254.255access-list 1 permit any!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 distribute-list 1 in

D.

ip prefix-list PL-1 deny 172.16.0.0/16ip prefix-list PL-1 permit 0.0.0.0/0!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

Full Access
Question # 160

Drag and drop the operations from the left onto the locations where the operations are performed on the right.

Full Access
Question # 161

The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123.

The administrator has configured the following on R1:

ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 162

Refer to the exhibit R2 can reach Loopback222, but R1 SW1 and PC1 cannot communicate with 172.16.222 254 R1 and R2 configurations are shown here

Which EIGRP configuration command resolves the issue?

A.

R2(config-router) # redistribute static

B.

R1(conftg-router)# network 172.16.222.254 0.0.0.0

C.

R1 (config-router)# network 172.16.222.264 255.255.255.255

D.

R1(config-router)# redistribute static

Full Access
Question # 163

Refer to the exhibit.

A loop occurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled. Which action prevents the loop between R1, R2, and R3?

A.

Configure route tagging

B.

Enable split horizon

C.

Configure R2 as stub receive-only

D.

Configure route filtering

Full Access
Question # 164

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

WAN

CORE

MGMT

Full Access
Question # 165

An engineer is creating a policy that overrides normal routing behavior.if the route to a destination of

10.100.100.0/24 is withdrawn from the routing

Table, the policy must direct traffic to a next hop of 10.1 1.1. if the route is present in the routing table, then

normal forwarding must occur. Which

configuration meets the requirements?

A.

access-list 100 permit ip any any!route-map POLICY permit 10match ip address 100set ip next-hop recursive 10.1.1.1

B.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!Route-map POLICY permit 10match ip address 100set ip default next-hop 10.1.1.1

C.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route-map POLICY permit 10match ip address 100set ip next-hop 10.1.1.1!route map POLICY permit 20

D.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route map POLICY permit 10match ip address 100Set ip next-hop recursive 10.1.1.1!route-map POLICY permit 20

Full Access
Question # 166

:578

Refer to the exhibit. The primary link between R1 and R2wentdownbutR3isstill advertising the 192.166.200.0/24 networktoR1 and the 192.166.100.0/24 networktoR2, which createsaloop. Which action resolves the issue?

A.

Configure the eigrp stub command under theElGRP process on R3

B.

Configure the summaryaddress 192.168.0.0 255.255.0.0 100 command on R3

C.

Configure the eigrp stub leak-map command under the EIGRPprocess on R1

D.

Configurethe eigrp stub command under theElGRP process on R2

Full Access
Question # 167

Refer to the exhibit.

A network administrator notices these console messages from host 10.11.110.12 originating from interface E1/0. The administrator considers this an unauthorized attempt to access SNMP on R1. Which action prevents the attempts to reach R1 E1/0?

A.

Configure IOS control plane protection using ACL 90 on interface E1/0

B.

Configure IOS management plane protection using ACL 90 on interface E1/0

C.

Create an inbound ACL on interface E1/0 to deny SNMP from host 10.11.110.12

D.

Add a permit statement including the host 10.11.110.12 into ACL 90

Full Access
Question # 168

:579

Refer to the exhibit. Router ABR-Rtr is not propagating the internet routes in OSPF area 10. which causes internet reachability problems in the area. Which action resolves the issue?

A.

ABR-Rtr must configure the default-information originate always command.

B.

ABR-Rtr must configure the area 10 stub no-summary command.

C.

ABR-Rtr network type must be broadcast network.

D.

ABR-Rtr must advertise the 0.0.0.0/0 default route in area 10.

Full Access
Question # 169

Refer to the exhibit. R1 must advertise all loopback interfaces IP addresses to neighbors, but EIGRP neighbors receive a summary route. Which action resolves the issue?

A.

Redistribute connected routes into EIGRP Enable

B.

EIGRP on loopback Interfaces.

C.

Disable auto summarization on R1.

D.

Remove the 10.100.1.0/24 static route.

Full Access
Question # 170

Refer to the exhibit.

The branch router is configured with a default route toward the internet and has no routes configured for the HQ site that is connected through interface G2/0. The HQ router is fully configured and does not require changes. Which configuration on the branch router makes the intranet website (TCP port 80) available to the branch office users?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 171

Users were moved from the local DHCP server to the remote corporate DHCP server. After the move,

none of the users were able to use the network.

Which two issues will prevent this setup from working properly? (Choose two)

A.

Auto-QoS is blocking DHCP traffic.

B.

The DHCP server IP address configuration is missing locally

C.

802.1X is blocking DHCP traffic

D.

The broadcast domain is too large for proper DHCP propagation

E.

The route to the new DHCP server is missing

Full Access
Question # 172

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 173

Which SNMP verification command shows the encryption and authentication protocols that are used in

SNMPV3?

A.

show snmp group

B.

show snmp user

C.

show snmp

D.

show snmp view

Full Access
Question # 174

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 175

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Full Access
Question # 176

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 177

Refer to the exhibit.

Which statement about R1 is true?

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Full Access
Question # 178

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

A.

DMVPN

B.

GETVPN

C.

Cisco Easy VPN

D.

FlexVPN

Full Access