Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-410

300-410 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Question and Answers

Question # 4

Refer to the exhibit.

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 5

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 6

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Full Access
Question # 7

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

Full Access
Question # 9

Drag and drop the DHCP messages from the left onto the correct uses on the right.

Full Access
Question # 10

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 11

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 12

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 14

Which SNMP verification command shows the encryption and authentication protocols that are used in

SNMPV3?

A.

show snmp group

B.

show snmp user

C.

show snmp

D.

show snmp view

Full Access
Question # 15

Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A.

nonbroadcast multiaccess

B.

packet switching

C.

policy-based routing

D.

forwarding information base

Full Access
Question # 16

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 17

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 18

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Full Access
Question # 19

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 20

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 21

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Drag and drop the MPLS terms from the left onto the correct definitions on the right.

Full Access
Question # 23

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 24

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 25

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 26

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

TypE. dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does the authoritative flag mean in regards to the NHRP information?

A.

It was obtained directly from the next-hop server.

B.

Data packets are process switches for this mapping entry.

C.

NHRP mapping is for networks that are local to this router.

D.

The mapping entry was created in response to an NHRP registration request.

E.

The NHRP mapping entry cannot be overwritten.

Full Access
Question # 27

Which transport layer protocol is used to form LDP sessions?

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Full Access
Question # 28

Refer to the exhibit.

In which circumstance does the BGP neighbor remain in the idle condition?

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Full Access
Question # 29

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 30

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 31

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 32

Refer to the exhibit.

Which statement about R1 is true?

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Full Access
Question # 33

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 34

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right.

Full Access
Question # 36

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Full Access
Question # 37

An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A.

sudo maglev-config update

B.

sudo maglev install config update

C.

sudo maglev reinstall

D.

sudo update config install

Full Access
Question # 38

Which protocol does VRF-Lite support?

A.

IS-IS

B.

ODR

C.

EIGRP

D.

IGRP

Full Access
Question # 39

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 40

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 41

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Full Access
Question # 42

Refer to the exhibit.

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

A.

no ip ssh disable

B.

ip ssh enable

C.

ip ssh version 2

D.

crypto key generate rsa

Full Access
Question # 43

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 44

Refer to the exhibit.

A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?

A.

no terminal monitor

B.

(config)#terminal no monitor

C.

#terminal no monitor

D.

(config)#no terminal monitor

Full Access
Question # 45

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Full Access
Question # 47

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Full Access
Question # 48

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 49

Refer to the exhibit.

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 50

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 51

Refer to the exhibit.

A network administrator is using the DNA Assurance Dashboard panel to troubleshoot an OSPF adjacency that failed between Edge_NYC interface GigabitEthernet1/3 with Neighbor Edge_SNJ. The administrator observes that the neighborship is stuck in exstart state. How does the administrator fix this issue?

A.

Configure to match the OSPF interface speed and duplex settings on both routers.

B.

Configure to match the OSPF interface MTU settings on both routers.

C.

Configure to match the OSPF interface unique IP address and subnet mask on both routers.

D.

Configure to match the OSPF interface network types on both routers.

Full Access
Question # 52

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 53

An engineer configured Reverse Path Forwarding on an interface and noticed that the routes are dropped when a route lookup fails on that interface for a prefix that is available in the routing table Which interface configuration resolves the issue?

A.

ip verify unicast source reachable-via rx

B.

ip verify unicast source reachable-via any

C.

ip verify unicast source reachable-via allow-default

D.

ip verify unicast source reachable-via 12-src

Full Access
Question # 54

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 55

Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted on the 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip route command. Which action stabilizes the service?

A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.

B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.

C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.

Full Access
Question # 56

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 57

How are MPLS Layer 3 VPN services deployed?

A.

The RD and RT values must match under the VRR

B.

The RD and RT values under a VRF must match on the remote PE router

C.

The import and export RT values under a VRF must always be the same.

D.

The label switch path must be available between the local and remote PE routers.

Full Access
Question # 58

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Full Access
Question # 59

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Full Access
Question # 60

Refer to the exhibit.

An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface. Which action resolves the issue?

A.

Modify line 10 of the access list to permit instead of deny.

B.

Remove line 60 from the access list.

C.

Modify line 30 of the access list to permit instead of deny.

D.

Remove line 70 from the access list.

Full Access
Question # 61

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

A.

router bgp 64511

aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511

neighbor 192.168.100.1 summary-only

neighbor 192.168.200.2 summary-only

C.

interface E 0/0

ip bgp suppress-map BLOCK_SPECIFIC

!

interface E 0/1

ip bgp suppress-map BLOCK_SPECIFIC

!

ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24

!

route-map BLOCK_SPECIFIC permit 10

match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22

ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22

!

route-map BLOCK_SPECIFIC permit 10

match ip address prefix-list PL_BLOCK_SPECIFIC

!

router bgp 64511

aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Full Access
Question # 62

Refer to the exhibit.

PC-2 failed to establish a Telnet connection to the terminal server. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 63

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 64

What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Full Access
Question # 65

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Full Access
Question # 66

Refer to the exhibit.

The neighbor relationship is not coming up Which two configurations bring the adjacency up? (Choose two)

A.

NY

router ospf 1

area 0 authentication message-digest

B.

LA

interface E 0/0

ip ospf message-digest-key 1 md5 Cisco123

C.

NY

interface E 0/0

no ip ospf message-digest-key 1 md5 Cisco123

ip ospf authentication-key Cisco123

D.

LA

interface E 0/0

ip ospf authentication-key Cisco123

E.

LA

router ospf 1

area 0 authentication message-digest

Full Access
Question # 67

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 68

What are two functions of MPLS Layer 3 VPNs? (Choose two.)

A.

LDP and BGP can be used for Pseudowire signaling.

B.

It is used for transparent point-to-multipoint connectivity between Ethernet links/sites.

C.

BGP is used for signaling customer VPNv4 routes between PE nodes.

D.

A packet with node segment ID is forwarded along with shortest path to destination.

E.

Customer traffic is encapsulated in a VPN label when it is forwarded in MPLS network.

Full Access
Question # 69

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 70

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 71

Refer to the exhibit. The remote server is failing to receive the NetFlow data Which action resolves the issue?

A.

Modify the flow transport command transport udp 2055 to move under flow monitor profile.

B.

Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input.

C.

Modify the udp port under flow exporter profile to Ip transport udp 4739.

D.

Modify the flow record command record v4_r1 to move under flow exporter profile.

Full Access
Question # 72

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 73

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 74

A network administrator is tasked to permit http and https traffic only toward the internet from the User1 laptop to adhere to company’s security policy. The administrator can still ping to www.cisco .com Which interface should the access list 101 be applied to resolve this issue?

A.

Interface G0/48 in the incoming direction

B.

Interface G0/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

D.

Interface G0/0 in the incoming direction.

Full Access
Question # 75

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 76

Refer to the exhibit.

The R1 and R2 configurations are:

The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A.

R2

ip route 10.1.1.1 255.255.255.255 192.168.1.1

!

router bgp 200

neighbor 10.1.1.1 tti-security hops 1

neighbor 10.1.1.1 update-source loopback 0

B.

R2

ip route 10.1.1.1 255.255.255.255 192.168.1.1

!

router bgp 200

neighbor 10.1.1.1 disable-connected-check

neighbor 10.1.1.1 update-source loopback 0

C.

R2

ip route 10.1.1.2 255.255.255.255 192.168.1.2

!

router bgp 100neighbor 10.1.1.2 ttl-security hops 1

neighbor 10.1.1.2 update-source loopback 0

D.

R1

ip route 10.1.1.2 255.255.255.255 192.168.1.2

!

router bgp 100

neighbor 10.1.1.1 ttl-security hops 1

neighbor 10.1.1.2 update-source loopback 0

E.

R1

ip route 10.1.1.2 255.255.255.255 192.168.1.2

!

router bgp 100

neighbor 10.1.1.2 disable-connected-check

neighbor 10.1.1.2 update-source Loopback0

Full Access
Question # 77

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access
Question # 78

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

A.

Packets are not forwarded to the specific next hop.

B.

Packets are forwarded based on the routing table.

C.

Packets are forwarded based on a static route.

D.

Packets are forwarded to the specific next hop.

Full Access
Question # 79

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 80

Refer to the exhibit.

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 81

What are two functions of LDP? (Choose two.)

A.

It is defined in RFC 3038 and 3039.

B.

It requires MPLS Traffic Engineering.

C.

It advertises labels per Forwarding Equivalence Class.

D.

It must use Resource Reservation Protocol.

E.

It uses Forwarding Equivalence Class

Full Access
Question # 82

Refer to the exhibit.

Which action resolves the failed authentication attempt to the router?

A.

Configure aaa authorization login command on line vty 0 4

B.

Configure aaa authorization login command on line console 0

C.

Configure aaa authorization console global command

D.

Configure aaa authorization console command on line vty 0 4

Full Access
Question # 83

Refer to the exhibit.

The Math and Science departments connect through the corporate. IT router but users in the Math department must not be able to reach the Science department and vice versa Which configuration accomplishes this task?

A.

vrf definition Science

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

B.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

vrf forwarding Science

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

vrf forwarding Science

no shut

C.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

D.

vrf definition Science

address-family ipv4

!

interface E 0/2

vrf forwarding Science

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

vrf forwarding Science

ip address 192.168.2.1

Full Access
Question # 84

Exhibit:

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 85

Refer to the exhibit.

Troubleshoot and ensure that branch B only ever uses the MPLS B network to reach HQ. Which action achieves this requirement?

A.

Introduce an AS path filter on branch A routers so that only local prefixes are advertised into BGP

B.

increase the local preference for all HQ prefixes received at branch B from the MPLS B network to be higher than the local preferences used on the MPLS A network

C.

Introduce AS path prepending on the branch A MPLS B network connection so that any HQ advertisements from branch A toward the MPLS B network are prepended three times

D.

Modify the weight of all HQ prefixes received at branch B from the MPLS B network to be higher than the weights used on the MPLS A network

Full Access
Question # 86

Drag and drop the actions from the left into the correct order on the right to configure a policy to avoid following packet forwarding based on the normal routing path.

Full Access
Question # 87

Refer to the exhibit.

The network administrator can see the DHCP discovery packet in R1. but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the FaO/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)

A.

service dhcp-relay command on R1

B.

ip dhcp option 82 command on R2

C.

service dhcp command on R1

D.

ip dhcp relay information enable command on R1

E.

ip dhcp relay information trust-all command on R2

Full Access
Question # 88

Refer to Exhibit.

A network administrator has successfully configured DMVPN topology between a hub and two spoke routers. Which two configuration commands should establish direct communications between spoke 1 and spoke 2 without going through the hub? (Choose two).

A.

At the hub router, configure the ip nhrp shortcut command.

B.

At the spoke routers, configure the ip nhrp spoke-tunnel command.

C.

At the hub router, configure ip nhrp redirect the command

D.

At the spoke routers, configure the ip nhrp shortcut command.

E.

At the hub router, configure tne Ip nhrp spoke-tunnel command

Full Access
Question # 89

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 90

Refer to the exhibit.

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Full Access
Question # 91

Which two protocols work in the control plane of P routers across the MPLS cloud? (choose two)

A.

LSP

B.

RSVP

C.

ECMP

D.

LDP

E.

MPLS OAM

Full Access
Question # 92

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 93

Refer to the exhibit.

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Full Access
Question # 94

What does the PE router convert the Ipv4 prefix to within an MPLS VPN?

A.

VPN-IPv4 prefix combined with the 64-bit route distinguisher

B.

48-bit route combining the IP and PE router-id

C.

prefix that combines the ASN, PE router-id, and IP prefix

D.

eBGP path association between the PE and CE sessions

Full Access
Question # 95

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 96

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A.

VACL blocking broadcast frames from nonauthorized hosts

B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

Full Access
Question # 97

Refer to the exhibit.

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

Refer to exhibit.

Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when the show ip route profile

command is run. How must the services be stabilized?

A.

The issue with using BGP must be resolved by using another protocol and redistributing it into EIGRP on R3

B.

The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3

C.

The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3

D.

The issue with using iBGP must be fixed by running eBGP between R3 and R4

Full Access
Question # 99

Refer to the exhibit Which action resolves the issue?

A.

Configure host IP address in access-list 16

B.

Configure SNMPv3 on the router

C.

Configure SNMP authentication on the router

D.

Configure a valid SNMP community string

Full Access
Question # 100

Refer to the exhibit. Which action restores the routes from neighbors while still filtering 1.1.1.0/24?

A.

Add a second line in the access list to permit any.

B.

Modify the route map to permit the access list instead of deny it

C.

Modify the access list to deny instead of permit it.

D.

Add a second sequence in the route map permit 20

Full Access
Question # 101

Refer to the exhibit.

A network administrator notices these console messages from host 10.11.110.12 originating from interface E1/0. The administrator considers this an unauthorized attempt to access SNMP on R1. Which action prevents the attempts to reach R1 E1/0?

A.

Configure IOS control plane protection using ACL 90 on interface E1/0

B.

Configure IOS management plane protection using ACL 90 on interface E1/0

C.

Create an inbound ACL on interface E1/0 to deny SNMP from host 10.11.110.12

D.

Add a permit statement including the host 10.11.110.12 into ACL 90

Full Access
Question # 102

Refer to the exhibit.

The none area 0 routers in OSPF still receive more specific routes of 10.1.1.0.10.1.2.0.10.1.3.0 from area 0. Which action resolves the issue?

A.

Configure route summarization on OSPF-enabled interfaces.

B.

Summarize by using the summary-address 10.1.0.0 255.255.252.0 command.

C.

Summarize by using the area range command on ABRs

D.

Configure the summary-address 10.1.0.0 255.255.252.0 command under OSPF process.

Full Access
Question # 103

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Full Access
Question # 104

Which IPv6 first hop security feature controls the traffic necessary for proper discovery of neighbor device operation and performance?

A.

RA Throttling

B.

Source or Destination Guard

C.

ND Multicast Suppression

D.

IPv6 Snooping

Full Access
Question # 105

A customer reports that traffic is not passing on an EIGRP enabled multipoint interface on a router configured as below:

interface Serial0/0

no ip address

interface Server0/0/0.9 multipoint

ip address 10.1.1.1 255.255.255.248

ip split-horizon eigrp 1

Which action resolves the issue?

A.

Enable poison reverse

B.

Enable split horizon

C.

Disable poison reverse

D.

Disable split horizon

Full Access
Question # 106

Refer to the exhibit. An engineer is trying to log in to R1 via R3 loopback address. Which action resolves the issue?

A.

Add transport input SCP

B.

Add transport input none

C.

Remove the IPv6 traffic filter from R1, which is blocking the Telnet.

D.

Remove the IPv6 traffic from R1, which is blocking the SSH

Full Access
Question # 107

Refer to the exhibit.

An engineer must configure OSPF with R9 and R10 and configure redistribution between OSPF and RIP causing a routing loop Which configuration on R9 and R10 meets this objective?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 108

Refer to the exhibit. AS 111 mut not be used as a transit AS, but ISP-1 is getting ISP-2 routes from AS 111. Which configuration stops Customer AS from being used as a transit path on ISP-1?

A.

ip as-path access-list 1 permit ^$

B.

ip as-path access-list 1 permit_111_

C.

ip as-path access-list 1 permit."

D.

ip as-path access-list 1 permit ^111$

Full Access
Question # 109

Which mechanism provides traffic segmentation within a DMVPN network?

A.

RSVP

B.

BGP

C.

MPLS

D.

iPsec

Full Access
Question # 110

Refer to the exhibit.

A shoe retail company implemented the uRPF solution for an antispoofing attack. A network engineer received the call that the branch A server is under an IP spoofing attack. Which configuration must be implemented to resolve the attack?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 111

Refer to the exhibit.

A network administrator must block ping from user 3 to the App Server only. An inbound standard access list is applied to R1 interface G0/0 to block ping. The network administrator was notified that user 3 cannot even ping user 9 anymore. Where must the access list be applied in the outgoing direction to resolve the issue?

A.

R2 interface G1/0

B.

R2 interface G0/0

C.

SW1 interface G1/10

D.

SW1 interface G2/21

Full Access
Question # 112

Refer to the exhibit. The ISP router is fully configured for customer A and customer B using the VRF-Lite feature. What is the minimum configuration required for customer A to communicate between routers A1 and A2?

A.

A1

interface fa0/0

description To->ISP

ip add 172.31.100.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.100.1 0.0.0.255 area 0

A2

interface fa0/0

description To->ISP

ip add 172.31.200.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.200.1 0.0.0.255 area 0

B.

A1

interface fa0/0

description To->ISP

ip vrf forwarding A

ip add 172.31.100.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.100.1 0.0.0.255 area 0

A2

interface fa0/0

description To->ISP

ip vrf forwarding A

ip add 172.31.200.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.200.1 0.0.0.255 area 0

C.

A1

interface fa0/0

description To->ISP

ip add 172.31.200.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.200.1 0.0.0.255 area 0

A2

interface fa0/0

description To->ISP

ip add 172.31.100.1 255.255.255.0

no shut

!

router ospf 100

net 172.31.100.1 0.0.0.255 area 0

D.

A1

interface fa0/0

description To->ISP

ip vrf forwarding A

ip add 172.31.100.1 255.255.255.0

no shut

!

router ospf 100 vrf A

net 172.31.200.1 0.0.0.255 area 0

A2

interface fa0/0

description To->ISP

ip vrf forwarding A

ip add 172.31.100.1 255.255.255.0

no shut

!

router ospf 100 vrf A

net 172.31.200.1 0.0.0.255 area 0

Full Access
Question # 113

The summary route is not shown in the RouterB routing table after this below configuration on Router_A

.

Which Router_A configuration resolves the issue by advertising the summary route to Router B?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 114

What are two characteristics of a VRF instance? (Choose two)

A.

It is defined by the VPN membership of a customer site attached to a P device.

B.

Each VRF has a different set of routing and CEF tables.

C.

AII VRFS share customers routing and CEF tables.

D.

An interface must be associated to one VRF

E.

A customer site can be associated to different VRFs.

Full Access
Question # 115

Refer to the exhibit.

A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log message stream it is impossible to capture the problem Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two)

A.

debug condition interface

B.

debug condition ip

C.

debug condition ospf neighbor

D.

debug condition session-id ADJCHG

E.

debug condition all

Full Access
Question # 116

Refer to the exhibit.

The R1 OSPF neighbor is not receiving type 5 external LSAs for 132.108.2.0/24 and 132.108.3.0/24 networks. Which configuration command resolves the issue?

A.

access-list 1 permit 132.108.0.0 0.0.1.255

B.

access-list 1 permit 132.108.0.0 0.0.3.255

C.

access-list 1 permit 132.108.2.0 0.0.0.255

D.

access-list 1 permit 132.108.4.0 0.0.3.255

Full Access
Question # 117

A.

access-list 20 permit 10.221.10.12

B.

snmp-server group NETVIEW v2c priv read NETVIEW access 20

C.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

D.

access-list 20 permit 10.221.10.11

Full Access
Question # 118

Refer to the exhibit.

The branch router is configured with a default route toward the internet and has no routes configured for the HQ site that is connected through interface G2/0. The HQ router is fully configured and does not require changes. Which configuration on the branch router makes the intranet website (TCP port 80) available to the branch office users?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 119

Refer to the exhibit.

A network administrator must configure DMVPN tunnels between the hub and spoke with dynamic spoke-to-spoke tunnel capabilities using EIGRP. Which tunnel interface command must the network administrator configure to establish an EIGRP peer?

A.

no ip next-hop-self eigrp 1

B.

ip next-hop-self eigrp 1

C.

no Ip nhrp ntxt-hop-self

D.

ip nhrp next-hop-self

Full Access
Question # 120

Users report issues with reachability between areas as soon as an engineer configured summary routes between areas in a multiple area OSPF autonomous system. Which action resolves the issue?

A.

Configure the summary-address command on the ASBR.

B.

Configure the summary-address command on the ABR.

C.

Configure the area range command on the ABR.

D.

Configure the area range command on the ASBR.

Full Access
Question # 121

Drag and drop the ICMPv6 neighbor discovery messages from the left onto the correct packet types on the right.

Full Access
Question # 122

Refer to the exhibit.

The administrator configured the network devise for end-to-end reachability, but the ASBRs are not propagation routes to each other. Which set of configuration resolves this issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 123

What is a MPLS PHP label operation?

A.

Downstream node signals to remove the label.

B.

It improves P router performance by not performing multiple label lookup.

C.

It uses implicit-NULL for traffic congestion from source to destination forwarding

D.

PE removes the outer label before sending to the P router.

Full Access
Question # 124

Exhibits:

Refer to the exhibit The administrator configured the network devices for end-to-end reachability, but the ASBRs are not propagating routes to each other Which set of configurations resolves this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 125

Refer to the exhibit. R1 must advertise all loopback interfaces IP addresses to neighbors, but EIGRP neighbors receive a summary route. Which action resolves the issue?

A.

Redistribute connected routes into EIGRP Enable

B.

EIGRP on loopback Interfaces.

C.

Disable auto summarization on R1.

D.

Remove the 10.100.1.0/24 static route.

Full Access
Question # 126

Refer to the exhibit.

An engineer must configure PBR on R1 to reach to 10.2.2.0/24 via R3 AS64513 as the primary path and a backup route through default route via R2 AS64513. All BGP routes are in the routing table of R1. but a static default route overrides BGP routes. Which PBR configuration achieves the objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 127

Refer to the exhibit.

An engineer is troubleshooting a TACACS problem.

Which action resolves the issue?

A.

Configure a matching TACACS server IP.

B.

Configure a matching preshared key.

C.

Generate authentication from a relative source interface.

D.

Apply a configured AAA profile to the VTY.

Full Access
Question # 128

Refer to the exhibit.

Which action makes 10.1.3.2 the feasible successor to reach 10. 200. 1 0/24 for location S42T447E33F95?

A.

Increase path bandwidth lower than 1011 2 and lower than 1012 2 between RtrA and the destination

B.

Increase path bandwidth higher than 10.1 2 2 and lower than 101.1.2 between RtrA and the destination.

C.

Increase path bandwidth higher than 1011 2 and lower than 1012 2 between RtrA and the destination

D.

Increase path bandwidth higher than 10.1 2 2 and higher than 10.1.1.2 between RtrA and the destination

Full Access
Question # 129

Refer to the exhibit.

Refer to the exhibit R1 cannot authenticate via TACACS Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 130

A DMVPN network is preconfigured with tunnel 0 IP address 192.168.1.254 on the HUB, IP connectivity, crypto policies, profiles, and EIGRP AS 100. The NHRP password is ccnp123, and the network ID and tunnel key is EIGRP ASN Do not introduce a static route. Configure DMVPN connectivity between routers BR1 and BR2 to the HUB router using physical interface as the tunnel source to achieve these goals:

Full Access
Question # 131

Refer to the exhibit. The IT manager received reports from users about slow application through network x. which action resolves the issue?

A.

Use the variance 2 command to enable load balancing.

B.

Increase the bandwidth from the service provider.

C.

Move the servers into the users subnet.

D.

Upgrade the IOS on router E.

Full Access
Question # 132

Refer to the exhibit. A network engineer is provisioning end-to-end traffic service for two different enterprise networks with these requirements

  • The OSPF process must differ between customers on HQ and Branch office routers, and adjacencies should come up instantly.
  • The enterprise networks are connected with overlapping networks between HO and a branch office

Which configuration meets the requirements for a customer site?

A

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 133

Refer to the exhibit.

R1 is configured with IP SLA to check the availability of the server behind R6 but it kept failing. Which configuration resolves the issue?

A.

R1(config)# ip sla 700

R1(config-track)# delay down 30 up 20

B.

R1(config)# ip sla 700

R1(config-track)# delay down 20 up 30

C.

R1(config)# track 700 ip sla 700

R1(config-track)# delay down 30 up 20

D.

R1(config)# track 700 ip sla 700

R1(config-track)# delay down 20 up 30

Full Access
Question # 134

Refer to the exhibit.

Router R2 should be learning the route for 10.123.187.0/24 via EIGRP. Which action resolves the issue without introducing more issues?

A.

Use distribute-list to modify the route as an internal EIGRP route

B.

Redistribute the route in EIGRP with metric, delay, and reliability

C.

Use distribute-list to filter the external router in OSPF

D.

Remove route redistribution in R2 for this route in OSPF

Full Access
Question # 135

Refer to the exhibit A CoPP policy is implemented to allow specific control traffic, but the traffic is not matching as expected and is getting unexpected behavior of control traffic. Which action resolves the issue?

A.

Use match-any instruction in class-map

B.

Create a separate class map against each ACL.

C.

Create a separate class map lor ICMP traffic.

D.

Use default-class to match ICMP traffic

Full Access
Question # 136

Refer to the exhibit.

An administrator is configuring a GRE tunnel to establish an EIGRP neighbor to a remote router. The

other tunnel endpoint is already configured. After applying the configuration as shown, the tunnel

started flapping. Which action resolves the issue?

A.

Modify the network command to use the Tunnel0 interface netmask

B.

Advertise the Loopback0 interface from R2 across the tunnel

C.

Stop sending a route matching the tunnel destination across the tunnel

D.

Readdress the IP network on the Tunnel0 on both routers using the /31 netmask

Full Access
Question # 137

Refer to me exhibit. The hub and spoke are connected via two DMVPN tunnel interfaces The NHRP is configured and the tunnels are detected on the hub and the spoke Which configuration command adds an IPsec profile on both tunnel interfaces to encrypt traffic?

A.

tunnel protection ipsec profile DMVPN multipoint

B.

tunnel protection ipsec profile DMVPN tunnel1

C.

tunnel protection ipsec profile DMVPN shared

D.

tunnel protection ipsec profile DMVPN unique

Full Access
Question # 138

Refer to the exhibit R1 cannot establish a neighbor relationship with R2 Which action resolves the issue"?

A.

Configure the mtu Ignore command on the Interfaces of R1 and R2

B.

Configure the ip ospf network point-to-point command on the interfaces of R1 and R2

C.

Configure the ip ospf network broadcast command on the interfaces of R1 and R2

D.

Configure the neighbor 2.2.2.2 command on R1 under the OSPF process

Full Access
Question # 139

What are the two prerequisites to enable BFD on Cisco routers? (Choose two)

A.

A supported IP routing protocol must be configured on the participating routers.

B.

OSPF Demand Circuit must run BFD on all participating routers.

C.

ICMP must be allowed on all participating routers.

D.

UDP port 1985 must be allowed on all participating routers.

E.

Cisco Express Forwarding and IP Routing must be enabled on all participating routers.

Full Access
Question # 140

Refer to the exhibit After an engineer modified the configuration for area 7 to permit type 1 2 and 7 LSAs only users connected to router R9 reported that they could no longer access the internet. Which configuration restores internet access to users on R9 and permits only LSA type 1,2, and 7?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 141

Refer to the exhibit. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 142

Refer to the exhibit Which action ensures that 10 10 10 0/24 reaches 10 10 20 0/24 through the direct link between R1 and R2?

A.

Configure R1 and R2 LAN links as nonpassive.

B.

Configure R1 and R2 links under area 1

C.

Configure OSPF link cost to 1 between R1 and R2

D.

Configure OSPF path cost to 3 between R1 and R2

Full Access
Question # 143

Which function does LDP provide in an MPLS topology?

A.

It enables a MPLS topology to connect multiple VPNs to P routers.

B.

It provides hop-by-hop forwarding in an MPLS topology for LSRs.

C.

It exchanges routes for MPLS VPNs across different VRFs.

D.

It provides a means for LSRs to exchange IP routes.

Full Access
Question # 144

Which technique removes the outermost label of an MPLS-tagged packet before the packet is forwarded to an adjacent LER?

A.

label swap

B.

explicit-null

C.

label imposition

D.

PHP

Full Access
Question # 145

Configure individual VRFs for each customer according to the topology to achieve these goals :

R1

R2

SW1

SW2

SW3

Full Access
Question # 146

A network administrator is troubleshooting a failed AAA login issue on a Cisco Catalyst c3560 switch. When the network administrator tries to log in with SSH using TACACS+ username and password credentials, the switch is no longer authenticating and is failing back to the local account. Which action resolves this issue?

A.

Configure ip tacacs source-interface GigabitEthernet 1/1

B.

Configure ip tacacs source-ip 192.168.100.55

C.

Configure ip tacacs-server source-ip 192.168.100.55

D.

Configure ip tacacs-server source-interface GigabitEthernet 1/1

Full Access
Question # 147

Which feature minimizes DoS attacks on an IPv6 network?

A.

IPv6 Binding Security Table

B.

IPv6 Router Advertisement Guard

C.

IPv6 Prefix Guard

D.

IPv6 Destination Guard

Full Access
Question # 148

Refer to the exhibit. An engineer configured SNMP Commîmes on UserSW2 switch, but the SNMP server cannot upload modified configurations to the switch. Which configuration resolves this issue?

A.

snmp-server community Ciscowruser RW 11

B.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

C.

snmp-server community CiscOUs3r RW 11

D.

snmp-server group NETVIEW v2c priv read NETVIEW access 11

Full Access
Question # 149

Refer to the exhibit The enterprise users fail to authenticate with the TACACS server when a direct fiber link fails between RB and RD The NOC team observes

  • Users connected on AS65201 fail to authenticate with TACACS server 192 168 1 1
  • Users connected on AS65101 successfully authenticate with TACACS server 192 168 1 1
  • All AS65101 and AS65201 users are configured to authenticate with the TACACS server

Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 150

A company is expanding business by opening 35 branches over the Internet. A network engineer must configure DMVPN at the branch routers to connect with the hub router and allow NHRP to add spoke routers securely to the multicast NHRP mappings automatically Which configuration meets this requirement at the hub router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 151

A network administrator opens a telnet connection to the router and gets the message:

R1#telnet 10.1.1.2

Trying 10 1.1 2 Open

(Connection to 10.1.1.2 closed by foreign host)

Router R2 is configured with enable secret and password commands. Which action resolves the issue?

A.

Configure the logging synchronous command on line vty.

B.

Configure the exec command on line vty.

C.

Configure the login local command on line vty

D.

Configure the enable password command on line vty.

Full Access
Question # 152

Refer to the exhibit. The IT router has been configured with the Science VRF and the interfaces have been assigned to the VRF. Which set of configurations advertises Science-1 and Science-2 routes using EIGRPAS 111?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 153

Refer to the exhibit.

While troubleshooting a BGP route reflector configuration, an engineer notices that reflected routes are missing from neighboring routers. Which two BGP configurations are needed to resolve the issue? (Choose two)

A.

neighbor 10.1.1.14 route-reflector-client

B.

neighbor R2 route-reflector-client

C.

neighbor 10.1.1.2 allowas-in

D.

neighbor R4 route-reflector-client

E.

neighbor 10.1.1.2 route-reflector-client

Full Access
Question # 154

Refer to the exhibit. The client server but the show command does not show the IPv6 DHCP bindings on the server. Which action resolves the issue?

A.

Extend the DHCP lease time because R1 removed the IPv6 address earlier after the lease expired.

B.

Configure H1 as the DHCP client that manually assigns the IPv6 address on interlace e0/0..

C.

Use the 2001:DBB:BAD:C0DE::/64 prefix for the DHCP pool on R1.

D.

Configure authorized DHCP servers to avoid IPv6 addresses from a rogue DHCP server.

Full Access
Question # 155

Refer to the exhibit.

An error message "an OSPF-4-FLOOD_WAR” is received on SW2 from SW1. SW2 is repeatedly receiving its own link-state advertisement and flushes it from the network. Which action resolves the issue?

A.

Change area 5 to a normal area from a nonstub area

B.

Resolve different subnet mask issue on the link

C.

Configure Layer 3 port channel on interfaces between switches

D.

Resolve duplicate IP address issue in the network

Full Access
Question # 156

Drag and drop the descriptions from the left onto the corresponding MPLS components on the right.

Full Access
Question # 157

Refer to the exhibit The route to 192 168 200 0 is flapping between R1 and R2 Which set of configuration changes resolves the flapping route?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 158

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 159

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 160

Which list defines the contents of an MPLS label?

A.

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.

32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

C.

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Full Access
Question # 161

What is a prerequisite for configuring BFD?

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Full Access
Question # 162

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 163

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Full Access
Question # 164

When provisioning a device in Cisco DNA Center, the engineer sees the error message “Cannot select the device. Not compatible with template”.

What is the reason for the error?

A.

The template has an incorrect configuration.

B.

The software version of the template is different from the software version of the device.

C.

The changes to the template were not committed.

D.

The tag that was used to filter the templates does not match the device tag.

Full Access
Question # 165

Refer to the exhibits.

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two

commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

C.

The ip nhrp redirect commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Full Access
Question # 166

What is the role of a route distinguisher via a VRF-Lite setup implementation?

A.

It extends the IP address to identify which VFP instance it belongs to.

B.

It manages the import and export of routes between two or more VRF instances

C.

It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities

D.

It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities

Full Access
Question # 167

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A.

service timestamps log uptime

B.

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.

service timestamps log datetime localtime show-timezone

D.

clock calendar-valid

Full Access
Question # 168

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A.

Copy the file to the destination router with the copy tftp: flash: command

B.

Enable the TFTP server on the source router with the tftp-server flash: command

C.

TFTP is not supported in recent IOS versions, so an alternative method must be used

D.

Configure a user on the source router with the username tftp password tftp command

E.

Configure the TFTP authentication on the source router with the tftp-server authentication local command

Full Access
Question # 169

What is an advantage of using BFD?

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Full Access
Question # 170

Refer to the exhibit.

An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?

A.

Add the aaa authentication login default none command to the global configuration.

B.

Replace the capital “C” with a lowercase “c” in the aaa authentication login Console local command.

C.

Add the aaa authentication login default group tacacs+ local-case command to the global

configuration.

D.

Add the login authentication Console command to the line configuration

Full Access
Question # 171

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 172

Refer to the exhibit.

Why is user authentication being rejected?

A.

The TACACS+ server expects “user”, but the NT client sends “domain/user”.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

C.

The TACACS+ server is down, and the user is in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Full Access