300-101 CCNP Route Exam Questions
300-101 CCNP Route Exam Questions
300-101 CCNP Route Exam Questions
Cisco
Exam 300-101
Implementing Cisco IP Routing
Version: 11.0
Topic
No. of Questions
12
25
22
68
Question No : 1 - (Topic 1)
Which three problems result from application mixing of UDP and TCP streams within a
network with no QoS? (Choose three.)
A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput
Answer: A,C,E
Question No : 2 - (Topic 1)
Which statement about the use of tunneling to migrate to IPv6 is true?
A. Tunneling is less secure than dual stack or translation.
B. Tunneling is more difficult to configure than dual stack or translation.
C. Tunneling does not enable users of the new protocol to communicate with users of the
old protocol without dual-stack hosts.
D. Tunneling destinations are manually determined by the IPv4 address in the low-order 32
bits of IPv4-compatible IPv6 addresses.
Answer: C
Question No : 3 - (Topic 1)
Which two actions must you perform to enable and use window scaling on a router?
(Choose two.)
A. Execute the command ip tcp window-size 65536.
B. Set window scaling to be used on the remote host.
C. Execute the command ip tcp queuemax.
D. Set TCP options to "enabled" on the remote host.
E. Execute the command ip tcp adjust-mss.
A Composite Solution With Just One Click - Certification Guaranteed
Question No : 4 - (Topic 1)
A network administrator executes the command clear ip route. Which two tables does this
command clear and rebuild? (Choose two.)
A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table
Answer: A,B
Question No : 5 - (Topic 1)
Under which condition does UDP dominance occur?
A. when TCP traffic is in the same class as UDP
B. when UDP flows are assigned a lower priority queue
C. when WRED is enabled
D. when ACLs are in place to block TCP traffic
Answer: A
Question No : 6 - (Topic 1)
Refer to the exhibit.
Question No : 7 - (Topic 1)
A network administrator uses IP SLA to measure UDP performance and notices that
packets on one router have a higher one-way delay compared to the opposite direction.
Which UDP characteristic does this scenario describe?
A. latency
B. starvation
C. connectionless communication
D. nonsequencing unordered packets
E. jitter
Answer: A
Question No : 8 - (Topic 1)
Which method allows IPv4 and IPv6 to work together without requiring both to be used for
a single connection during the migration process?
A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT
Answer: A
Question No : 9 - (Topic 1)
A Composite Solution With Just One Click - Certification Guaranteed
Question No : 10 - (Topic 1)
Refer to the exhibit.
Question No : 11 - (Topic 1)
Which three TCP enhancements can be used with TCP selective acknowledgments?
(Choose three.)
A. header compression
B. explicit congestion notification
C. keepalive
D. time stamps
E. TCP path discovery
F. MTU window
Answer: B,C,D
Question No : 12 - (Topic 1)
A network engineer notices that transmission rates of senders of TCP traffic sharply
increase and decrease simultaneously during periods of congestion. Which condition
causes this?
A. global synchronization
B. tail drop
C. random early detection
D. queue management algorithm
Answer: A
Question No : 13 - (Topic 2)
A corporate policy requires PPPoE to be enabled and to maintain a connection with the
ISP, even if no interesting traffic exists. Which feature can be used to accomplish this task?
A. TCP Adjust
A Composite Solution With Just One Click - Certification Guaranteed
Question No : 14 - (Topic 2)
Prior to enabling PPPoE in a virtual private dialup network group, which task must be
completed?
A. Disable CDP on the interface.
B. Execute the vpdn enable command.
C. Execute the no switchport command.
D. Enable QoS FIFO for PPPoE support.
Answer: B
Question No : 15 - (Topic 2)
Which protocol uses dynamic address mapping to request the next-hop protocol address
for a specific connection?
A. Frame Relay inverse ARP
B. static DLCI mapping
C. Frame Relay broadcast queue
D. dynamic DLCI mapping
Answer: A
Question No : 16 - (Topic 2)
A network engineer has been asked to ensure that the PPPoE connection is established
and authenticated using an encrypted password. Which technology, in combination with
PPPoE, can be used for authentication in this manner?
Question No : 17 - (Topic 2)
Which PPP authentication method sends authentication information in clear text?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
Answer: D
Question No : 18 - (Topic 2)
Which statement is true about the PPP Session Phase of PPPoE?
A. PPP options are negotiated and authentication is not performed. Once the link setup is
completed, PPPoE functions as a Layer 3 encapsulation method that allows data to be
transferred over the PPP link within PPPoE headers.
B. PPP options are not negotiated and authentication is performed. Once the link setup is
completed, PPPoE functions as a Layer 4 encapsulation method that allows data to be
transferred over the PPP link within PPPoE headers.
C. PPP options are automatically enabled and authorization is performed. Once the link
setup is completed, PPPoE functions as a Layer 2 encapsulation method that allows data
to be encrypted over the PPP link within PPPoE headers.
D. PPP options are negotiated and authentication is performed. Once the link setup is
completed, PPPoE functions as a Layer 2 encapsulation method that allows data to be
transferred over the PPP link within PPPoE headers.
Answer: D
Question No : 20 - (Topic 3)
What is the default OSPF hello interval on a Frame Relay point-to-point network?
A. 10
B. 20
C. 30
D. 40
Answer: A
Question No : 21 - (Topic 3)
You have been asked to evaluate how EIGRP is functioning in a customer network.
10
11
12
13
Question No : 22 - (Topic 3)
What is the purpose of the autonomous-system {autonomous-system-number} command?
A. It sets the EIGRP autonomous system number in a VRF.
B. It sets the BGP autonomous system number in a VRF.
C. It sets the global EIGRP autonomous system number.
D. It sets the global BGP autonomous system number.
Answer: A
14
Question No : 24 - (Topic 3)
A router with an interface that is configured with ipv6 address autoconfig also has a linklocal address assigned. Which message is required to obtain a global unicast address
when a router is present?
A. DHCPv6 request
B. router-advertisement
C. neighbor-solicitation
A Composite Solution With Just One Click - Certification Guaranteed
15
Question No : 25 - (Topic 3)
For security purposes, an IPv6 traffic filter was configured under various interfaces on the
local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor
adjacencies were lost. What caused this issue?
A. The traffic filter is blocking all ICMPv6 traffic.
B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work
properly.
C. The link-local addresses that were used by OSPFv3 were explicitly denied, which
caused the neighbor relationships to fail.
D. IPv6 traffic filtering can be implemented only on SVIs.
Answer: C
Question No : 26 - (Topic 3)
You have been asked to evaluate how EIGRP is functioning in a customer network.
16
17
18
19
A. 10
B. 20
C. 30
D. 40
Answer: B
Question No : 27 - (Topic 3)
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer
questions a customer has about its operation. The customer has disabled your access to
the show running-config command.
20
21
22
23
Which of the following statements is true about the serial links that terminate in R3
A. The R1-R3 link needs the neighbor command for the adjacency to stay up
B. The R2-R3 link OSPF timer values are 30, 120, 120
C. The R1-R3 link OSPF timer values should be 10,40,40
D. R3 is responsible for flooding LSUs to all the routers on the network.
Answer: B
Question No : 28 - (Topic 3)
Router A and Router B are configured with IPv6 addressing and basic routing capabilities
using OSPFv3. The networks that are advertised from Router A do not show up in Router
B's routing table. After debugging IPv6 packets, the message "not a router" is found in the
output. Why is the routing information not being learned by Router B?
A. OSPFv3 timers were adjusted for fast convergence.
B. The networks were not advertised properly under the OSPFv3 process.
C. An IPv6 traffic filter is blocking the networks from being learned via the Router B
interface that is connected to Router A.
D. IPv6 unicast routing is not enabled on Router A or Router B.
24
25
Answer: We need to configure policy based routing to send specific traffic along a path
that is different from the best path in the routing table.
Here are the step by Step Solution for this:
1) First create the access list that catches the HTTP traffic:
R1(config)#access-list 101 permit tcp any any eq www
2) Configure the route map that sets the next hop address to be ISP1 and permits the rest
of the traffic:
R1(config)#route-map pbr permit 10
R1(config-route-map)#match ip address 101
R1(config-route-map)#set ip next-hop 10.1.100.2
R1(config-route-map)#exit
R1(config)#route-map pbr permit 20
3) Apply the route-map on the interface to the server in the EIGRP Network:
R1(config-route-map)#exit
R1(config)#int fa0/1
R1(config-if)#ip policy route-map pbr
R1(config-if)#exit
R1(config)#exit
26
Answer: First we need to find out 5 parameters (Bandwidth, Delay, Reliability, Load, MTU)
of the s0/0/0 interface (the interface of R2 connected to R4) for redistribution:
R2#show interface s0/0/0
Write down these 5 parameters, notice that we have to divide the Delay by 10 because the
metric unit is in tens of microsecond. For example, we get Bandwidth=1544 Kbit,
Delay=20000 us, Reliability=255, Load=1, MTU=1500 bytes then we would redistribute as
follows:
R2#config terminal
27
28
29
30
31
32
Question No : 33 - (Topic 3)
After you review the output of the command show ipv6 interface brief, you see that several
IPv6 addresses have the 16-bit hexadecimal value of "FFFE" inserted into the address.
Based on this information, what do you conclude about these IPv6 addresses?
A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.
Answer: A
Question No : 34 - (Topic 3)
An engineer has configured a router to use EUI-64, and was asked to document the IPv6
address of the router. The router has the following interface parameters:
33
Question No : 35 - (Topic 3)
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer
questions a customer has about its operation. The customer has disabled your access to
the show running-config command.
34
35
36
37
A. 1
B. 5
C. 9
D. 20
E. 54
F. 224
Answer: C
Question No : 36 - (Topic 3)
Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le
24?
A. 10.9.1.0/24
B. 10.8.0.0/24
C. 10.8.0.0/16
D. 10.8.0.0/23
Answer: B
A Composite Solution With Just One Click - Certification Guaranteed
38
Question No : 37 - (Topic 3)
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer
questions a customer has about its operation. The customer has disabled your access to
the show running-config command.
39
40
41
How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output
you have examined?
A. 1858
B. 1601
C. 600
A Composite Solution With Just One Click - Certification Guaranteed
42
Question No : 38 - (Topic 3)
You have been asked to evaluate how EIGRP is functioning in a customer network.
43
44
45
A. 333056
B. 1938688
C. 1810944
A Composite Solution With Just One Click - Certification Guaranteed
46
Question No : 39 - (Topic 3)
You have been asked to evaluate how EIGRP is functioning in a customer network.
47
48
49
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?
A. CISCO
B. EIGRP
C. key
A Composite Solution With Just One Click - Certification Guaranteed
50
Question No : 40 - (Topic 3)
A packet capture log indicates that several router solicitation messages were sent from a
local host on the IPv6 segment. What is the expected acknowledgment and its usage?
A. Router acknowledgment messages will be forwarded upstream, where the DHCP server
will allocate addresses to the local host.
B. Routers on the IPv6 segment will respond with an advertisement that provides an
external path from the local subnet, as well as certain data, such as prefix discovery.
C. Duplicate Address Detection will determine if any other local host is using the same IPv6
address for communication with the IPv6 routers on the segment.
D. All local host traffic will be redirected to the router with the lowest ICMPv6 signature,
which is statically defined by the network administrator.
51
Question No : 41 - (Topic 3)
Refer to the exhibit.
Which command only announces the 1.2.3.0/24 network out of FastEthernet 0/0?
A. distribute list 1 out
B. distribute list 1 out FastEthernet0/0
C. distribute list 2 out
D. distribute list 2 out FastEthernet0/0
Answer: D
52
53
54
Question No : 43 - (Topic 3)
You have been asked to evaluate how EIGRP is functioning in a customer network.
55
56
57
58
Traffic from R1 to R61 s Loopback address is load shared between R1-R2-R4-R6 and R1R3-R5-R6 paths. What is the ratio of traffic over each path?
A. 1:1
B. 1:5
C. 6:8
D. 19:80
Answer: D
Question No : 44 - (Topic 3)
Scenario:
You have been asked to evaluate an OSPF network setup in a test lab and to answer
questions a customer has about its operation. The customer has disabled your access to
the show running-config command.
59
60
61
62
Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine
which statement is true?
A. R5's Loopback and R6's Loopback are both present in R5's Routing table
B. R5's Loopback and R6's Loopback are both present in R6's Routing table
C. Only R5's loopback is present in R5's Routing table
D. Only R6's loopback is present in R5's Routing table
E. Only R5's loopback is present in R6's Routing table
Answer: A
Question No : 45 - (Topic 4)
Which encapsulation supports an interface that is configured for an EVN trunk?
A. 802.1Q
B. ISL
C. PPP
D. Frame Relay
E. MPLS
F. HDLC
A Composite Solution With Just One Click - Certification Guaranteed
63
Question No : 46 - (Topic 4)
A company has just opened two remote branch offices that need to be connected to the
corporate network. Which interface configuration output can be applied to the corporate
router to allow communication to the remote sites?
A. interface Tunnel0
bandwidth 1536
ip address 209.165.200.230 255.255.255.224
tunnel source Serial0/0
tunnel mode gre multipoint
B. interface fa0/0
bandwidth 1536
ip address 209.165.200.230 255.255.255.224
tunnel mode gre multipoint
C. interface Tunnel0
bandwidth 1536
ip address 209.165.200.231 255.255.255.224
tunnel source 209.165.201.1
tunnel-mode dynamic
D. interface fa 0/0
bandwidth 1536
ip address 209.165.200.231 255.255.255.224
tunnel source 192.168.161.2
tunnel destination 209.165.201.1
tunnel-mode dynamic
Answer: A
Question No : 47 - (Topic 4)
Refer to the following output:
Router#show ip nhrp detail
10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47
TypE. dynamic, Flags: authoritative unique nat registered used
A Composite Solution With Just One Click - Certification Guaranteed
64
Question No : 48 - (Topic 4)
Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol,
NHRP, and Cisco Express Forwarding?
A. FlexVPN
B. DMVPN
C. GETVPN
D. Cisco Easy VPN
Answer: B
Question No : 49 - (Topic 4)
A network engineer executes the show crypto ipsec sa command. Which three pieces of
information are displayed in the output? (Choose three.)
A. inbound crypto map
B. remaining key lifetime
C. path MTU
D. tagged packets
E. untagged packets
F. invalid identity packets
Answer: A,B,C
65
Question No : 50 - (Topic 4)
Which three characteristics are shared by subinterfaces and associated EVNs? (Choose
three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Answer: A,B,C
Question No : 51 - (Topic 4)
A user is having issues accessing file shares on a network. The network engineer advises
the user to open a web browser, input a prescribed IP address, and follow the instructions.
After doing this, the user is able to access company shares. Which type of remote access
did the engineer enable?
A. EZVPN
B. IPsec VPN client access
C. VPDN client access
D. SSL VPN client access
Answer: D
Question No : 52 - (Topic 4)
Which common issue causes intermittent DMVPN tunnel flaps?
A. a routing neighbor reachability issue
B. a suboptimal routing table
C. interface bandwidth congestion
D. that the GRE tunnel to hub router is not encrypted
Answer: A
A Composite Solution With Just One Click - Certification Guaranteed
66
Question No : 53 - (Topic 5)
Refer to the following command:
router(config)# ip http secure-port 4433
Which statement is true?
A. The router will listen on port 4433 for HTTPS traffic.
B. The router will listen on port 4433 for HTTP traffic.
C. The router will never accept any HTTP and HTTPS traffic.
D. The router will listen to HTTP and HTTP traffic on port 4433.
Answer: A
Question No : 54 - (Topic 5)
What are the three modes of Unicast Reverse Path Forwarding?
A. strict mode, loose mode, and VRF mode
B. strict mode, loose mode, and broadcast mode
C. strict mode, broadcast mode, and VRF mode
D. broadcast mode, loose mode, and VRF mode
Answer: A
Question No : 55 - (Topic 5)
What does the following access list, which is applied on the external interface FastEthernet
1/0 of the perimeter router, accomplish?
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
67
Question No : 56 - (Topic 5)
A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53,
and 49 to 172.20.14.225. Which command should be applied to the configuration to allow
this?
A. router(config-if)#ip helper-address 172.20.14.225
B. router(config-if)#udp helper-address 172.20.14.225
C. router(config-if)#ip udp helper-address 172.20.14.225
D. router(config-if)#ip helper-address 172.20.14.225 69 53 49
Answer: A
Question No : 57 - (Topic 5)
Which address is used by the Unicast Reverse Path Forwarding protocol to validate a
packet against the routing table?
A. source address
B. destination address
68
Question No : 58 - (Topic 5)
Refer to the following access list.
access-list 100 permit ip any any log
After applying the access list on a Cisco router, the network engineer notices that the router
CPU utilization has risen to 99 percent. What is the reason for this?
A. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding
switched.
B. A packet that matches access-list with the "log" keyword is fast switched.
C. A packet that matches access-list with the "log" keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.
Answer: C
Question No : 59 - (Topic 5)
For troubleshooting purposes, which method can you use in combination with the debug ip
packet command to limit the amount of output data?
A. You can disable the IP route cache globally.
B. You can use the KRON scheduler.
C. You can use an extended access list.
D. You can use an IOS parser.
E. You can use the RITE traffic exporter.
Answer: C
Question No : 60 - (Topic 5)
69
Question No : 61 - (Topic 6)
IPv6 has just been deployed to all of the hosts within a network, but not to the servers.
Which feature allows IPv6 devices to communicate with IPv4 servers?
A. NAT
B. NATng
C. NAT64
D. dual-stack NAT
E. DNS64
Answer: C
Question No : 62 - (Topic 6)
What is a function of NPTv6?
A. It interferes with encryption of the full IP payload.
B. It maintains a per-node state.
C. It is checksum-neutral.
D. It rewrites transport layer headers.
A Composite Solution With Just One Click - Certification Guaranteed
70
Question No : 63 - (Topic 6)
Which NetFlow component is applied to an interface and collects information about flows?
A. flow monitor
B. flow exporter
C. flow sampler
D. flow collector
Answer: A
Question No : 64 - (Topic 6)
A network engineer is configuring a solution to allow failover of HSRP nodes during
maintenance windows, as an alternative to powering down the active router and letting the
network respond accordingly. Which action will allow for manual switching of HSRP nodes?
A. Track the up/down state of a loopback interface and shut down this interface during
maintenance.
B. Adjust the HSRP priority without the use of preemption.
C. Disable and enable all active interfaces on the active HSRP node.
D. Enable HSRPv2 under global configuration, which allows for maintenance mode.
Answer: A
Question No : 65 - (Topic 6)
An organization decides to implement NetFlow on its network to monitor the fluctuation of
traffic that is disrupting core services. After reviewing the output of NetFlow, the network
engineer is unable to see OUT traffic on the interfaces. What can you determine based on
this information?
A. Cisco Express Forwarding has not been configured globally.
B. NetFlow output has been filtered by default.
C. Flow Export version 9 is in use.
A Composite Solution With Just One Click - Certification Guaranteed
71
Question No : 66 - (Topic 6)
When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?
A. username
B. password
C. community-string
D. encryption-key
Answer: A
Question No : 67 - (Topic 6)
A network engineer finds that a core router has crashed without warning. In this situation,
which feature can the engineer use to create a crash collection?
A. secure copy protocol
B. core dumps
C. warm reloads
D. SNMP
E. NetFlow
Answer: B
Question No : 68 - (Topic 6)
A network engineer executes the show ip flow export command. Which line in the output
indicates that the send queue is full and export packets are not being sent?
A. output drops
B. enqueuing for the RP
C. fragmentation failures
D. adjacency issues
A Composite Solution With Just One Click - Certification Guaranteed
72
Question No : 69 - (Topic 6)
A network engineer is notified that several employees are experiencing network
performance related issues, and bandwidth-intensive applications are identified as the root
cause. In order to identify which specific type of traffic is causing this slowness, information
such as the source/destination IP and Layer 4 port numbers is required. Which feature
should the engineer use to gather the required information?
A. SNMP
B. Cisco IOS EEM
C. NetFlow
D. Syslog
E. WCCP
Answer: C
Question No : 70 - (Topic 6)
A network engineer is asked to configure a "site-to-site" IPsec VPN tunnel. One of the last
things that the engineer does is to configure an access list (access-list 1 permit any) along
with the command ip nat inside source list 1 int s0/0 overload. Which functions do the two
commands serve in this scenario?
A. The command access-list 1 defines interesting traffic that is allowed through the tunnel.
B. The command ip nat inside source list 1 int s0/0 overload disables "many-to-one"
access for all devices on a defined segment to share a single IP address upon exiting the
external interface.
C. The command access-list 1 permit any defines only one machine that is allowed through
the tunnel.
D. The command ip nat inside source list 1 int s0/0 overload provides "many-to-one"
access for all devices on a defined segment to share a single IP address upon exiting the
external interface.
Answer: D
Question No : 71 - (Topic 6)
A Composite Solution With Just One Click - Certification Guaranteed
73
Question No : 72 - (Topic 6)
After a recent DoS attack on a network, senior management asks you to implement better
logging functionality on all IOS-based devices. Which two actions can you take to provide
enhanced logging results? (Choose two.)
A. Use the msec option to enable service time stamps.
B. Increase the logging history
.
C. Set the logging severity level to 1.
D. Specify a logging rate limit.
E. Disable event logging on all noncritical items.
Answer: A,B
Question No : 73 - (Topic 6)
Which two functions are completely independent when implementing NAT64 over NAT-PT?
(Choose two.)
A. DNS
B. NAT
C. port redirection
D. stateless translation
E. session handling
Answer: A,B
74
Question No : 75 - (Topic 6)
A network engineer is trying to implement broadcast-based NTP in a network and executes
the ntp broadcast client command. Assuming that an NTP server is already set up, what is
the result of the command?
A. It enables receiving NTP broadcasts on the interface where the command was
executed.
B. It enables receiving NTP broadcasts on all interfaces globally.
C. It enables a device to be an NTP peer to another device.
D. It enables a device to receive NTP broadcast and unicast packets.
Answer: A
Question No : 76 - (Topic 6)
Refer to the exhibit.
75
Question No : 77 - (Topic 6)
A company's corporate policy has been updated to require that stateless, 1-to-1, and IPv6
to IPv6 translations at the Internet edge are performed. What is the best solution to ensure
compliance with this new policy?
A. NAT64
B. NAT44
C. NATv6
D. NPTv4
E. NPTv6
Answer: E
Question No : 78 - (Topic 6)
A network engineer executes the ipv6 flowset command. What is the result?
A. Flow-label marking in 1280-byte or larger packets is enabled.
B. Flow-set marking in 1280-byte or larger packets is enabled.
C. IPv6 PMTU is enabled on the router.
D. IPv6 flow control is enabled on the router.
Answer: A
Question No : 79 - (Topic 6)
A Composite Solution With Just One Click - Certification Guaranteed
76
Question No : 80 - (Topic 6)
A network engineer has left a NetFlow capture enabled over the weekend to gather
information regarding excessive bandwidth utilization. The following command is entered:
switch#show flow exporter Flow_Exporter-1
What is the expected output?
A. configuration of the specified flow exporter
B. current status of the specified flow exporter
C. status and statistics of the specified flow monitor
D. configuration of the specified flow monitor
Answer: B
Question No : 81 - (Topic 6)
Which type of traffic does DHCP snooping drop?
A. discover messages
B. DHCP messages where the source MAC and client MAC do not match
C. traffic from a trusted DHCP server to client
D. DHCP messages where the destination MAC and client MAC do not match
Answer: B
77
Question No : 83 - (Topic 7)
Which PPP authentication method sends authentication information in cleartext?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
Answer: D
Question No : 84 - (Topic 7)
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has
assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface.
Which option also is required on the tunnel interface before it is operational?
A. tunnel destination address
B. keepalives
C. IPv6 address
D. tunnel protection
Answer: A
A Composite Solution With Just One Click - Certification Guaranteed
78
Question No : 85 - (Topic 7)
Which type of handshake does CHAP authentication use to establish a PPP link?
A. one-way
B. two-way
C. three-way
D. four-way
Answer: C
Question No : 86 - (Topic 7)
The following configuration is applied to a router at a branch site:
ipv6 dhcp pool dhcp-pool
dns-server 2001:DB8:1:B::1
dns-server 2001:DB8:3:307C::42
domain-name example.com
!
If IPv6 is configured with default settings on all interfaces on the router, which two dynamic
IPv6 addressing mechanisms could you use on end hosts to provide end-to-end
connectivity? (Choose two.)
A. EUI-64
B. SLAAC
C. DHCPv6
D. BOOTP
Answer: A,B
Question No : 87 - (Topic 7)
A Composite Solution With Just One Click - Certification Guaranteed
79
Question No : 88 - (Topic 7)
A router receives a routing advertisement for the same prefix and subnet from four different
routing protocols. Which advertisement is installed in the routing table?
A. RIP
B. OSPF
C. iBGP
D. EIGRP
Answer: D
Question No : 89 - (Topic 7)
Which two commands would be used to troubleshoot high memory usage for a process?
(Choose two.)
A. router#show memory allocating-process table
B. router#show memory summary
C. router#show memory dead
D. router#show memory events
E. router#show memory processor statistics
Answer: A,B
Question No : 90 - (Topic 7)
80
Question No : 91 - (Topic 7)
Which statement describes what this command accomplishes when inside and outside
interfaces are correctly identified for NAT?
ip nat inside source static tcp 192.168.1.50 80 209.165.201.1 8080 extendable
A. It allows host 192.168.1.50 to access external websites using TCP port 8080.
B. It allows external clients coming from public IP 209.165.201.1 to connect to a web server
at 192.168.1.50.
C. It allows external clients to connect to a web server hosted on 192.168.1.50.
D. It represents an incorrect NAT configuration because it uses standard TCP ports.
Answer: C
Question No : 92 - (Topic 7)
Refer to the following configuration command.
router (config-line)# ntp master 10
Which statement about this command is true?
A. The router acts as an authoritative NTP clock and allows only 10 NTP client
connections.
B. The router acts as an authoritative NTP clock at stratum 10.
C. The router acts as an authoritative NTP clock with a priority number of 10.
D. The router acts as an authoritative NTP clock for 10 minutes only.
A Composite Solution With Just One Click - Certification Guaranteed
81
Question No : 93 - (Topic 7)
Which three benefits does the Cisco Easy Virtual Network provide to an enterprise
network? (Choose three.)
A. simplified Layer 3 network virtualization
B. improved shared services support
C. enhanced management, troubleshooting, and usability
D. reduced configuration and deployment time for dot1q trunking
E. increased network performance and throughput
F. decreased BGP neighbor configurations
Answer: A,B,C
Question No : 94 - (Topic 7)
Refer to the exhibit. The network setup is running the RIP routing protocol. Which two
events will occur following link failure between R2 and R3? (Choose two.)
82
Question No : 95 - (Topic 7)
Refer to the exhibit. Which statement is true?
Question No : 96 - (Topic 7)
Which outbound access list, applied to the WAN interface of a router, permits all traffic
except for http traffic sourced from the workstation with IP address 10.10.10.1?
A. ip access-list extended 200
deny tcp host 10.10.10.1 eq 80 any
83
Question No : 97 - (Topic 7)
Refer to the exhibit. Which statement about the command output is true?
84
Question No : 99 - (Topic 7)
Two aspects of an IP SLA operation can be tracked: state and reachability. Which
statement about state tracking is true?
A. When tracking state, an OK return code means that the track's state is up; any other
return code means that the track's state is down.
B. When tracking state, an OK or over threshold return code means that the track's state is
up; any other return code means that the track's state is down.
C. When tracking state, an OK return code means that the track's state is down; any other
return code means that the track's state is up.
D. When tracking state, an OK or over threshold return code means that the track's state is
down; any other return code means that the track's state is up.
Answer: A
85
86
A. link-local
B. site-local
87
88
89
90
91
92
93
Which option prevents routing updates from being sent to the DHCP router, while still
allowing routing update messages to flow to the Internet router and the distribution
switches?
A. DHCP(config-router)# passive-interface default DHCP(config-router)# no passiveinterface Gi1/0 Internet(config-router)# passive-interface Gi0/1 Internet (config-router)#
passive-interface Gi0/2
B. Core(config-router)# passive-interface Gi0/0 Core(config-router)# passive-interface
Gi3/1 Core(config-router)# passive-interface Gi3/2 DHCP(config-router)# no passiveinterface Gi1/0
94
Which command allows hosts that are connected to FastEthernet0/2 to access the
95
A. Either a firewall between the two routers or an ACL on the router is blocking IP protocol
number 47.
B. Either a firewall between the two routers or an ACL on the router is blocking UDP 57.
C. Either a firewall between the two routers or an ACL on the router is blocking TCP 47.
D. Either a firewall between the two routers or an ACL on the router is blocking IP protocol
number 57.
Answer: A
96
97
98
Answer:
99
Answer:
100
101
Answer:
102
103
Which option prevents routing updates from being sent to the access layer switches?
A. DWS1(config-router)# passive-interface default DWS2(config-router)# passive-interface
default
B. ALS1(config-router)# passive-interface default ALS2(config-router)# passive-interface
default
C. DWS1(config-router)# passive-interface gi1/1 DWS1(config-router)# passive-interface
104
Which option represents the minimal configuration that allows inbound traffic from the
172.16.1.0/24 network to successfully enter router R, while also limiting spoofed 10.0.0.0/8
hosts that could enter router R?
A. (config)#ip cef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx allow-default
B. (config)#ip cef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx
C. (config)#no ip cef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx
D. (config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via any
Answer: A
105
106
107
108