Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Enterprise > 300-410

300-410 Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Question and Answers

Question # 4

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 5

What is a prerequisite for configuring BFD?

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Full Access
Question # 6

Which list defines the contents of an MPLS label?

A.

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.

32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

C.

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Full Access
Question # 7

Refer to the exhibit.

Which statement about R1 is true?

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Full Access
Question # 8

Refer to the exhibit.

Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?

A.

Issue the eigrp stub command on R1

B.

Issue the no neighbor stub command on R2.

C.

Issue the eigrp command on R2.

D.

Issue the no eigrp stub command on R1.

Full Access
Question # 9

:585

Which type of ports are protected by IPv6 Source Guard?

A.

Layer 2 ports

B.

access ports

C.

Layer 3 ports

D.

trunk ports

Full Access
Question # 10

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 11

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 12

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Full Access
Question # 13

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 14

Refer to the exhibit.

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

A.

no ip ssh disable

B.

ip ssh enable

C.

ip ssh version 2

D.

crypto key generate rsa

Full Access
Question # 15

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

TypE. dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does the authoritative flag mean in regards to the NHRP information?

A.

It was obtained directly from the next-hop server.

B.

Data packets are process switches for this mapping entry.

C.

NHRP mapping is for networks that are local to this router.

D.

The mapping entry was created in response to an NHRP registration request.

E.

The NHRP mapping entry cannot be overwritten.

Full Access
Question # 16

Refer to the exhibit.

An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?

A.

Add the aaa authentication login default none command to the global configuration.

B.

Replace the capital “C” with a lowercase “c” in the aaa authentication login Console local command.

C.

Add the aaa authentication login default group tacacs+ local-case command to the globalconfiguration.

D.

Add the login authentication Console command to the line configuration

Full Access
Question # 17

Refer to the exhibit.

An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?

A.

An authentication error with the NTP server results in an incorrect timestamp.

B.

The keyword localtime is not defined on the timestamp service command.

C.

The NTP server is in a different time zone.

D.

The system clock is set incorrectly to summer-time hours.

Full Access
Question # 18

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Full Access
Question # 19

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

Full Access
Question # 20

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 21

Refer to the exhibit.

Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)

A.

Configure SNMP rw permission in addition to community ciscotest.

B.

Modify access list 1 and allow operations subnet in the access list.

C.

Modify access list 1 and allow SNMP in the access list.

D.

Configure SNMP rw permission in addition to version 1.

E.

Configure SNMP rw permission in addition to community ciscotest 1.

Full Access
Question # 22

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 24

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 25

Drag and drop the operations from the left onto the locations where the operations are performed on the right.

Full Access
Question # 26

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 27

Refer to the exhibit The route to 192 168 200 0 is flapping between R1 and R2 Which set of configuration changes resolves the flapping route?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

Refer to the exhibit.

The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

A.

set ip next-hop

B.

set ip default next-hop

C.

set ip next-hop recursive

D.

set ip next-hop verify-availability

Full Access
Question # 30

Drag and drop the MPLS terms from the left onto the correct definitions on the right.

Full Access
Question # 31

Which command displays the IP routing table information that is associated with VRF-Lite?

A.

show ip vrf

B.

show ip route vrf

C.

show run vrf

D.

show ip protocols vrf

Full Access
Question # 32

Which transport layer protocol is used to form LDP sessions?

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Full Access
Question # 33

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 34

Refer to the exhibit.

The administrator successfully logs into R1 but cannot access privileged mode commands. What should be configured to resolve the issue?

A.

aaa authorization reverse-access

B.

secret cisco123! at the end of the username command instead of password cisco123!

C.

matching password on vty lines as cisco123!

D.

enable secret or enable password commands to enter into privileged mode

Full Access
Question # 35

Refer to the exhibit.

The OSPF routing protocol is redistributed into the BGP routing protocol, but not all the OSPF routes are distributed into BGP Which action resolves the issue?

A.

Include the word external in the redistribute command

B.

Use a route-map command to redistribute OSPF external routes defined in an access list

C.

Include the word internal external in the redistribute command

D.

Use a route-map command to redistribute OSPF external routes defined in a prefix list.

Full Access
Question # 36

What is an advantage of using BFD?

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Full Access
Question # 37

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 38

Refer to the exhibit.

A network administrator sets up an OSPF routing protocol for a DMVPN network on the hub router. Which configuration required to establish a DMVPN tunnel with multiple spokes?

A.

ip ospf network point-to-multipoint on both spoke routers

B.

ip ospf network point-to-point on the hub router

C.

ip ospf network point-to-multipoint on One spoke router

D.

ip ospf network point-to-point on both spoke routers

Full Access
Question # 39

What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Full Access
Question # 40

Refer to the exhibits.

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Refer to the exhibits.

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two

commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

C.

The ip nhrp redirect commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Full Access
Question # 42

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) to the outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Which feature is used by LDP in the forwarding path within the MPLS cloud?

A.

IP forwarding

B.

TTL

C.

TDP

D.

LSP

Full Access
Question # 44

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Full Access
Question # 45

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 46

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Full Access
Question # 47

Refer to the exhibit.

An administrator is attempting to disable the automatic logout after a period of inactivity. After logging out the console stopped responding to all keyword inputs. Remote access through SSH still work resolves the issue?

A.

Configure the exec command on line con 0.

B.

Configure the absolute-timeout command on line con 0.

C.

Configure the default exec-timeout command on line con 0.

D.

Configure the no exec-timeout command on line con 0.

Full Access
Question # 48

Refer to the exhibit.

An engineer configures a static route on a router, but when the engineer checks the route

to the destination, a different next hop is chosen. What is the reason for this?

A.

Dynamic routing protocols always have priority over static routes.

B.

The metric of the OSPF route is lower than the metric of the static route.

C.

The configured AD for the static route is higher than the AD of OSPF.

D.

The syntax of the static route is not valid, so the route is not considered.

Full Access
Question # 49

Which transport layer protocol is used to form LDP sessions?

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Full Access
Question # 50

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A.

Copy the file to the destination router with the copy tftp: flash: command

B.

Enable the TFTP server on the source router with the tftp-server flash: command

C.

TFTP is not supported in recent IOS versions, so an alternative method must be used

D.

Configure a user on the source router with the username tftp password tftp command

E.

Configure the TFTP authentication on the source router with the tftp-server authentication local command

Full Access
Question # 51

Refer to the exhibit.

A network administrator is using the DNA Assurance Dashboard panel to troubleshoot an OSPF adjacency that failed between Edge_NYC interface GigabitEthernet1/3 with Neighbor Edge_SNJ. The administrator observes that the neighborship is stuck in exstart state. How does the administrator fix this issue?

A.

Configure to match the OSPF interface speed and duplex settings on both routers.

B.

Configure to match the OSPF interface MTU settings on both routers.

C.

Configure to match the OSPF interface unique IP address and subnet mask on both routers.

D.

Configure to match the OSPF interface network types on both routers.

Full Access
Question # 52

Refer to the exhibit.

Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 53

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

A.

Packets are not forwarded to the specific next hop.

B.

Packets are forwarded based on the routing table.

C.

Packets are forwarded based on a static route.

D.

Packets are forwarded to the specific next hop.

Full Access
Question # 54

Exhibit:

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 55

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Full Access
Question # 56

Drag and drop the MPLS VPN device types from the left onto the definitions on the right.

Full Access
Question # 57

Refer to the exhibit. A network administrator configured an IPv6 access list to allow TCP return traffic only, but it is not working as expected. Which changes resolve this issue?

A.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

B.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

C.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

D.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

Full Access
Question # 58

Which two protocols work in the control plane of P routers across the MPLS cloud? (choose two)

A.

LSP

B.

RSVP

C.

ECMP

D.

LDP

E.

MPLS OAM

Full Access
Question # 59

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Full Access
Question # 60

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 61

What are two characteristics of VRF instance? (Choose two.)

A.

All VRFs share customers routing and CEF tables .

B.

An interface must be associated to one VRF.

C.

Each VRF has a different set of routing and CEF tables

D.

It is defined by the VPN membership of a customer site attached to a P device.

E.

A customer site can be associated to different VRFs

Full Access
Question # 62

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 63

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 64

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Full Access
Question # 65

Refer to the exhibit.

An IT staff member comes into the office during normal office hours and cannot access devices through SSH Which action should be taken to resolve this issue?

A.

Modify the access list to use the correct IP address.

B.

Configure the correct time range.

C.

Modify the access list to correct the subnet mask

D.

Configure the access list in the outbound direction.

Full Access
Question # 66

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Full Access
Question # 67

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Full Access
Question # 68

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 69

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 70

Refer to the exhibit.

The network administrator must mutually redistribute routes at the Chicago router to the LA and NewYork routers. The configuration of the Chicago router is this:

After the configuration, the LA router receives all the NewYork routes, but NewYork router does not receive any LA routes. Which set of configurations fixes the problem on the Chicago router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Refer to the exhibit.

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Full Access
Question # 72

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 73

Refer to the exhibit.

PC-2 failed to establish a Telnet connection to the terminal server. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 75

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 76

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 77

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 78

Drag and drop the packet types from the left onto the correct descriptions on the right.

Full Access
Question # 79

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRPautonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Full Access
Question # 80

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 81

Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies?

A.

RIB

B.

FEC

C.

LDP

D.

CEF

Full Access
Question # 82

Refer to the exhibit. An engineer troubleshoots a connectivity problem that is impacting the communication from the users at segment 172.16.3.16/28 to the server farm at 192.168.5.16/ 28. Which configuration resolves the issue on router R1?

A.

router ospf 1

redistribute rip metric 14

B.

router rip

redistribute ospf 1 metric 16

C.

router ospf 1

redistribute rip metric 16

D.

router rip

redistribute ospf 1 metric 14

Full Access
Question # 83

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 84

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Full Access
Question # 85

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Full Access
Question # 86

Refer to the exhibit.

Which interface configuration must be configured on the HUB router to enable MVPN with mGRE mode?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A.

VACL blocking broadcast frames from nonauthorized hosts

B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

Full Access
Question # 88

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 89

Refer to the exhibit.

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 90

Refer to the exhibit.

A company with autonomous system number AS65401 has obtained IP address block 209.165.200.224/27 fro, ARIN. The company needed more IP addresses and was assigned block209.165.202.128/27 from ISP2. An engineer is ISP1 reports they are receiving ISP2 routes from AS65401. Which configuration onR1 resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 91

Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue?

A.

HQ_R3(config)# ip sla responderHQ_R3(config)# ip sla responder icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 192.168.100.2

C.

HQ R3(config)# Ip sla responderHQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5

D.

BRANCH(config)# Ip sla 1BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1

Full Access
Question # 92

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 93

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

A.

router bgp 64511aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511neighbor 192.168.100.1 summary-onlyneighbor 192.168.200.2 summary-only

C.

interface E 0/0ip bgp suppress-map BLOCK_SPECIFIC!interface E 0/1ip bgp suppress-map BLOCK_SPECIFIC!ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC!router bgp 64511aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Full Access
Question # 94

Refer to the exhibit.

An engineer configured BGP between routers R1 and R3 The BOP peers cannot establish neighbor adjacency to be able to exchange routes. Which configuration resolves this issue?

A.

R3router bgp 6502address-family ipv6neighbor AB01:2011:7:100::1 activate

B.

R1router bgp 6501address-family ipv6neighbor AB01:2011:7:100;:3 activate

C.

R3router bgp 6502neighbor AB01:2011:7:100::1 ebgp-muttlhop 255

D.

R1router bgp 6501 neighborAB01:2011:7:100::3ebgp-multihop255

Full Access
Question # 95

Refer to the exhibit.

Troubleshoot and ensure that branch B only ever uses the MPLS B network to reach HQ. Which action achieves this requirement?

A.

Introduce an AS path filter on branch A routers so that only local prefixes are advertised into BGP

B.

increase the local preference for all HQ prefixes received at branch B from the MPLS B network to be higher than the local preferences used on the MPLS A network

C.

Introduce AS path prepending on the branch A MPLS B network connection so that any HQ advertisements from branch A toward the MPLS B network are prepended three times

D.

Modify the weight of all HQ prefixes received at branch B from the MPLS B network to be higher than the weights used on the MPLS A network

Full Access
Question # 96

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 97

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 98

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 99

Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Full Access
Question # 100

An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A.

match the passwords

B.

match the hello timers

C.

match the MTUs

D.

match the network types

Full Access
Question # 101

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 102

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 103

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 104

Refer to the exhibit.

A user cannot SSH to the router. What action must be taken to resolve this issue?

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Full Access
Question # 105

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Full Access
Question # 106

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responderHQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responderHQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 107

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 108

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 109

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

Full Access
Question # 110

What must a network architect consider for RTs when planning for a single customer full-mesh VPN m an MPLS Layer 3 network?

A.

RT must be globally unique within the same VPN

B.

RT must be globally identical within the same VPN

C.

RT values must be Afferent from the RD values in the same VPN

D.

Each RT value must be identical to an RD value within the same VPN.

Full Access
Question # 111

Refer to the exhibit. A network engineer receives a report that Spoke 1 users can perform bank transactions with the server located at the Center site, but Spoke 2 users cannot. Which action resolves the issue?

A.

Configure the Spoke 2 users IP on the router B OSPF domain

B.

Configure encapsulation dot1q 78 on the router C interface.

C.

Configure IPv6 on the routers B and C interfaces

D.

Configure OSPFv2 on the routers B and C interfaces

Full Access
Question # 112

What is a function of BFD?

A.

peer recovery after a Layer 3 protocol adjacency failure

B.

peer recovery after a Layer 2 adjacency failure

C.

failure detection independent of routing protocols and media types

D.

failure detection dependent on routing protocols and media types

Full Access
Question # 113

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/3ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/1ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/3ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/1ip policy route-map PBR1

Full Access
Question # 114

Refer to the exhibit.

An engineer must advertise routes into IPv6 MP-BGP and failed. Which configuration resolves the issue on R1?

A.

router bgp 65000no bgp default ipv4-unicastaddress-family ipv6 multicastnetwork 2001:DB8::/64

B.

router bgp 65000no bgp default ipv4-unicastaddress-family ipv6 unicastnetwork 2001:DB8::/64

C.

router bgp 64900no bgp default ipv4-unicastaddress-family ipv6 unicastnetwork 2001:DB8::/64

D.

router bgp 64900no bgp default ipv4-unicastaddress-family ipv6 multicastneighbor 2001:DB8:7000::2 translate-update ipv6 multicast

Full Access
Question # 115

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 116

Refer to the exhibit.

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

A.

Configure logging history 2

B.

Configure logging history 3

C.

Configure logging history 4

D.

Configure logging history 5

Full Access
Question # 117

Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted onthe 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip route command. Which action stabilizes the service?

A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.

B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.

C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.

Full Access
Question # 118

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Full Access
Question # 119

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 120

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 121

What does the PE router convert the Ipv4 prefix to within an MPLS VPN?

A.

VPN-IPv4 prefix combined with the 64-bit route distinguisher

B.

48-bit route combining the IP and PE router-id

C.

prefix that combines the ASN, PE router-id, and IP prefix

D.

eBGP path association between the PE and CE sessions

Full Access
Question # 122

:584

Reler Iothe exhibit The engineer is trying to transfer the newIOSfile to the router R3 but is getting an error Which configuration achieves the file transfer?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 123

Refer to the exhibit.

A network administrator is trying to switch to the privileged EXEC level on R1 but failed. Which configuration resolves the issue?

A.

Enable password Cisco@123

B.

tacass server enable-password Cisco@123

C.

tacacs-server enable-password Cisco@123

D.

enable-password Cisco@123

Full Access
Question # 124

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 125

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Full Access
Question # 126

Refer to the exhibit.

An engineer must configure OSPF with R9 and R10 and configure redistribution between OSPF and RIP causing a routing loop Which configuration on R9 and R10 meets this objective?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 127

Refer to the exhibit.

A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?

A.

Remove ipv6 inspect ipv6-firewall in from interface gi0/1

B.

Add permit udp any eq domain any log in the access list.

C.

inspect ipv6 inspect name ipv6-firewall udp 53 in global config.

D.

Add permit any eq domain 53 any log in the access list.

Full Access
Question # 128

Refer to the exhibit.

The administrator is trying to overwrite an existing file on the TFTP server that was previously uploaded by another router. However, the attempt to update the file fails. Which action resolves this issue?

A.

Make the packages.conf file executable by all on the TFTP server

B.

Make the packages.conf file writable by all on the TFTP server

C.

Make sure to run the TFTP service on the TFTP server

D.

Make the TFTP folder writable by all on the TFTP server

Full Access
Question # 129

Refer to exhibit.

Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when the show ip route profile

command is run. How must the services be stabilized?

A.

The issue with using BGP must be resolved by using another protocol and redistributing it into EIGRP on R3

B.

The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3

C.

The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3

D.

The issue with using iBGP must be fixed by running eBGP between R3 and R4

Full Access
Question # 130

Refer to the exhibit A network engineer received a call from the vendor for a failed attempt to remotely log in to their managed rooter loopback interface from 192 168.40 15 Which action must the network engineer take to resolve the issue?

A.

The IP access list VENDOR must be applied to interface loopback 100

B.

The time-range configuration must be changed to use absolute instead of periodic

C.

The EIGRP configuration must be updated to include a network statement for loopback 100

D.

The source IP summarization must be updated to include the vendor source IP address

Full Access
Question # 131

An engineer notices that R1 does not hold enough log messages to Identity the root cause during troubleshooting Which command resolves this issue?

A.

#logging buffered 4096 critical

B.

(config)#logging buffered 16000 informational

C.

#logging buffered 16000 critical

D.

(config)#logging buffered 4096 informational

Full Access
Question # 132

Which 0S1 model is used to insert an MPLS label?

A.

between Layer 5 and Layer 6

B.

between Layer 1 and Layer 2

C.

between Layer 3 and Layer 4

D.

between Layer 2 and Layer 3

Full Access
Question # 133

Refer to the exhibit. A customer reports that networks in the 10.0.1.0/24 space do not appear in the RIP database. What action resolves the issue?

A.

Remove summarization of 10.0.0.078.

B.

Permit 10.0.1.0/24 address in the ACL.

C.

Remove ACL on R1 blocking 10.0.1.0/24 network.

D.

Configure 10.0.1.0/24 network under RIP.

Full Access
Question # 134

:578

Refer to the exhibit. The primary link between R1 and R2wentdownbutR3isstill advertising the 192.166.200.0/24 networktoR1 and the 192.166.100.0/24 networktoR2, which createsaloop. Which action resolves the issue?

A.

Configure the eigrp stub command under theElGRP process on R3

B.

Configure the summaryaddress 192.168.0.0 255.255.0.0 100 command on R3

C.

Configure the eigrp stub leak-map command under the EIGRPprocess on R1

D.

Configurethe eigrp stub command under theElGRP process on R2

Full Access
Question # 135

Refer to the exhibit.

An engineer cannot copy the IOS.bin file from the FTP server to the switch.

Which action resolves the issue?

A.

Allow file permissions to download the file from the FTP server.

B.

Add the IOS.bin file, which does not exist on FTP server.

C.

Make memory space on the switch flash or USB drive to download the file.

D.

Use the copy flash:/ ftp://cisco@10.0.0.2/IOS.bin command.

Full Access
Question # 136

Refer to the exhibit. An engineer notices a connectivity problem between routers R1 and R2. The frequency of this problem is high during peak business hours. Which action resolves the issue?

A.

Increase the MTU on the interfaces that connect R1 and R2.

B.

Increase the available bandwidth between R1 and R2.

C.

Decrease the EIGRP keepallve and hold down timers on R1 and R2.

D.

Set static EIGRP neighborship between R1 and R2.

Full Access
Question # 137

Refer to the exhibit. An engineer must troubleshoot a connectivity issue impacting the redistribution of the subnet 172.16.2.48/28 into the OSPF domain. Which configuration on router R1 advertises this subnet into the OSPF domain?

A.

R1(config)#route-map CCNP permit 10R1(config-route-map)#match route-type internalR1(config-router)#router ospf 10R1(config-router)#redistribute eigrp 100 subnets route-map CCNP

B.

R1(config)#route-map CCNP permit 10R1(config-route-map)#match route-type level-2R1(config-router)#router ospf 10R1(config-router)#redistribute eigrp 100 subnets route-map CCNP

C.

R1(config)#route-map CCNP deny 10R1(config-route-map)#match tag 200R1(config)#route-map CCNP permit 10R1(config-router)#router ospf 10R1(config-router)#redistribute eigrp 100 subnets route-map CCNP

D.

R1(config)#route-map CCNP permit 10R1(config-route-map)#match tag 200R1(config-route-map)#exitR1(config-router)#router ospf 10R1(config-router)#redistribute eigrp 100 subnets route-map CCNP

Full Access
Question # 138

Refer to the exhibit A network engineer notices that R1 and R2 cannot establish an eBGP peering. The following messages appear in the log:

Which configuration must the engineer apply to R1 to restore the eBGP peering?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 139

Refer to the exhibit. Which configuration is required for R2 to get the IP address from the DHCP server?

A.

ip access-list extended R2WANpermit tcp any any eq 68

B.

ip access-list extended R2WANpermit udp any any eq 68

C.

ip access-list extended R2WANpermit udp any any eq 67

D.

interface GigabitEthernet0/0ip access-group R2WAN out

Full Access
Question # 140

Refer to the exhibit.

While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.

Which command resolves this issue?

A.

access-class INTERNET in

B.

ip access-group INTERNET in

C.

ipv6 traffic-filter INTERNET in

D.

ipv6 access-class INTERNET in

Full Access
Question # 141

Refer to the exhibit. An engineer cannot determine the time of the problem on R1 due to a mismatch between the router local clock and legs. Which command synchronizes the time between new log entries and the local clock on R1?

A.

service timestamps debug datetime msec show.timezone

B.

service timestamps log datetime locatetime msec

C.

service timestamps datebug datetime localtime msec

D.

service timestamps log datetime msec show-timezone

Full Access
Question # 142

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Full Access
Question # 143

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 144

Refer to the exhibit.

An engineer must establish multipoint GRE tunnels between hub router R6 and branch routers R1, R2, and R3. Which configuration accomplishes this task on R1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 145

The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123.

The administrator has configured the following on R1:

ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 146

:589

Aswitchhas been configured to provide DHCP relay on VLAN 100 to a server with an IP address of 10.1.1.1. The DHCP server is sending syslog reports of multiple TFTP requests that also originate from the switch. As a result, the server CPU exceeded a configured threshold. Which action does the network administrator recommend to bring the server CPU threshold down?

A.

Configure the switch with an access list on VLAN100 to deny TFTP.

B.

Configure the switch with a VACL on VLAN100 to deny TFTP.

C.

Configure the switch with ip forward-protocol udp 67 globally.

D.

Configure the switch with no ip forward-protocol udp 69 on VLAN100.

Full Access
Question # 147

Refer to the exhibit.

An engineer applies a prefix-list filter that filters most of the network 10 prefixes instead of allowing them. Which action resolves the issue?

A.

Modify the ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 9 command.

B.

Modify the command Modify the Ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 32 command.

C.

Modify the Ip prefix-list ElGRP seq 20 permit 0.0.0.0/0 le 32 command.

D.

Modify the ip prefix-list ElGRP seq 20 permit 10.0.0.0/8 ge 9 command

Full Access
Question # 148

Refer to the exhibit.

A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers.

Which configuration prevents changes from unauthorized NMS and TFTP servers?

A.

access-list 20 permit 10.221.10.11access-list 20 deny any log!snmp-server group NETVIEW v3 priv read NETVIEW access 20snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20snmp-server community Cisc0Us3r RO 20snmp-server community Cisc0wrus3r RW 20snmp-server tftp-server-list 20

B.

access-list 20 permit 10.221.10.11access-list 20 deny any log!snmp-server group NETVIEW v3 priv read NETVIEW access 20snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20snmp-server community Cisc0wrus3r RO 20snmp-server community Cisc0Us3r RW 20snmp-server tftp-server-list 20

C.

access-list 20 permit 10.221.10.11access-list 20 deny any log

D.

access-list 20 permit 10.221.10.11

Full Access
Question # 149

Which two solutions are used to overcome a flapping link that causes a frequent label binding

exchange between MPLS routers? (Choose two)

A.

Create link dampening on links to protect the session.

B.

Increase input queue on links to protect the session.

C.

Create targeted hellos to protect the session.

D.

Increase a hold-timer to protect the session.

E.

Increase a session delay to protect the session.

Full Access
Question # 150

An engineer received a ticket about a router that has reloaded. The monitoring system graphs show different traffic patterns between logical and physical interfaces when the router is rebooted. Which action resolves the issue?

A.

Configure the snmp ifindex persist command globally.

B.

Clear the logical interfaces with snmp ifindex clear command

C.

Configure the snmp ifindex persist command on the physical interfaces.

D.

Trigger a new snmpwalk from the monitoring system to synchronize interface OlDs

Full Access
Question # 151

Refer to the exhibit.

An engineer is troubleshooting a TACACS problem.

Which action resolves the issue?

A.

Configure a matching TACACS server IP.

B.

Configure a matching preshared key.

C.

Generate authentication from a relative source interface.

D.

Apply a configured AAA profile to the VTY.

Full Access
Question # 152

Refer to the exhibit. An organization is installing a new L3 MPLS link to establish DM VPN Phase 2 tunnels between the hub and two spoke routers Which additional configuration should the engineer implement on each device to achieve optimal routing between the spokes?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 153

Refer to the exhibit. R1 must advertise all loopback interfaces IP addresses to neighbors, but EIGRP neighbors receive a summary route. Which action resolves the issue?

A.

Redistribute connected routes into EIGRP Enable

B.

EIGRP on loopback Interfaces.

C.

Disable auto summarization on R1.

D.

Remove the 10.100.1.0/24 static route.

Full Access
Question # 154

Refer to the exhibit. R10 attempts to copy an image file from R11 using TFTP, and the operation is timing out. Which action resolves the issue?

A.

Change R10 duplex to auto to resolve the duplex mismatch between routers R10 and R11.

B.

R10 must be configured to belong to the same VRF TFTP.

C.

R11 requires the TFTP server source-interface to be set to GigabitEthernetO/0.

D.

R11 requires the TFTP server command for the image to be set to the VRF TFTP.

Full Access
Question # 155

Refer to the exhibit An engineer configured NetFlow but cannot receive the flows from R1 Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 156

What is considered the primary advantage of running BFD?

A.

reduction in time needed to detect Layer 2 switched neighbor failures

B.

reduction in time needed to detect Layer 3 routing neighbor failures

C.

reduction in CPU needed to detect Layer 2 switch neighbor failures

D.

reduction in CPU needed to detect Layer 3 routing neighbor failures

Full Access
Question # 157

Which feature is required for IPv6 Source Guard to block traffic arriving on the server interface from unknown sources?

A.

Dynamic ARP Inspection

B.

IPv6 RA Guard

C.

IPv6 ND Inspection

D.

DHCPv6 Guard

Full Access
Question # 158

Refer to the exhibit. The IT router has been configured with the Science VRF and the interfaces have been assigned to the VRF. Which set of configurations advertises Science-1 and Science-2 routes using EIGRPAS 111?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 159

Refer to the exhibit. The default route is not advertised to the neighboring router. Which action resolves the issue?

A.

Configure the redistribute static metric 200 subnets command under OSPF.

B.

Configure OSPF on the Dialer0 interface.

C.

Configure the network 0.0.0.0 255.255.255.255 area 0 command under OSPF.

D.

Configure the default-information originate command under OSPF.

Full Access
Question # 160

What is the role of a route distinguisher via a VRF-Lite setup implementation?

A.

It extends the IP address to identify which VFP instance it belongs to.

B.

It manages the import and export of routes between two or more VRF instances

C.

It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities

D.

It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities

Full Access
Question # 161

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Full Access
Question # 162

Refer to the exhibit. R1 should have BGP routes marked with an "i" (IGP origin code). Which configuration resolves the issue?

A.

R1

route-map RC permit 10

match ip address 1

set metric 1

B.

R1

route-map RC permit 10

match ip address 1

set origin igp

C.

R7

route-map RC permit 10

match ip address 1

set origin igp

D.

R7

route-map RC permit 10

match ip address 1

set metric 1

Full Access
Question # 163

Refer to the exhibit. Site1 must perform unequal cost load balancing toward the segments behind Site2 and Site3. Some of the routes are getting load balanced but others are not. Which configuration allows Site1 to load balance toward all the LAN segments of the remote routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 164

Refer to the exhibit.

A network engineer applied a filter for LSA traffic on OSPFv3 interarea routes on the area 5 ABR to protect advertising the internal routes of area 5 to the business partner network. All other areas should receive the area 5 internal routes. After the respective route filtering configuration is applied on the ABR, area 5 routes are not visible on any of the areas. How must the filter list be applied on the ABR to resolve this issue?

A.

in the “in” direction for area 5 on router R1

B.

in the “out” direction for area 5 on router R1

C.

in the “in” direction for area 20 on router R2

D.

in the “out” direction for area 20 on router R2

Full Access
Question # 165

Refer to the exhibit. An engineer configured two ASBRs, 10.4.17.6 and 10.4.15.5, in an OSPF network to redistribute identical routes from BGR However, only prefixes from 10.4.17.6 are installed into the routing table on R1. Which action must the engineer take to achieve load sharing for the BGP-originated prefixes?

A.

The ASBRs are advertising the redistributed prefixes with the iBGP metric and must be modified to Type 1 on ASBR 10.4.17.6.

B.

The ASBRs are advertising the redistributed prefixes with a different admin distance and must be changed to 110 on ASBR 10.4.15.5.

C.

The admin distance of the prefixes must be adjusted to 20 on ASBR 10.4.15.5 to advertise prefixes to R1 identically from both ASBRs.

D.

The ASBRs are advertising the redistributed prefixes as Type 1 and must be modified to Type 2

Full Access
Question # 166

Refer to the exhibit A network engineer notices that the configured track option is down Which configuration resolves the issue*?

A.

ip sla schedule 10 start-time now

B.

ip sla schedule 10 start-time pending life forever

C.

ip sla schedule 10 no timeout

D.

ip sla schedule 10 no threshold

Full Access
Question # 167

In a DMVPN network, the Spoke1 user observed that the voice traffic is coming to Spoke2 users via the hub router. Which command is required on both spoke routers to communicate directly to one another?

A.

ip nhrp map dynamic

B.

ip nhrp shortcut

C.

ip nhrp nhs multicast

D.

ip nhrp redirect

Full Access
Question # 168

Refer to the exhibit.

Which policy configuration on R1 forwards any traffic that is sourced from the 192 168 130 0'24 network to R2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 169

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 170

Refer to the exhibit.

Reachability between servers in a network deployed with DHCPv6 is unstable. Which command must be removed from the configuration to make DHCPv6 function?

A.

ipv6 dhcp server DHCPPOOL

B.

ipv6 address 2001:0:1:4::/64

C.

ipv6 nd ra suppress

D.

address prefix 2001:0:1:4::/64 lifetime infinite infinite

Full Access
Question # 171

Refer to the exhibit.

A network administrator notices these console messages from host 10.11.110.12 originating from interface E1/0. The administrator considers this an unauthorized attempt to access SNMP on R1. Which action prevents the attempts to reach R1 E1/0?

A.

Configure IOS control plane protection using ACL 90 on interface E1/0

B.

Configure IOS management plane protection using ACL 90 on interface E1/0

C.

Create an inbound ACL on interface E1/0 to deny SNMP from host 10.11.110.12

D.

Add a permit statement including the host 10.11.110.12 into ACL 90

Full Access
Question # 172

IPv6 is enabled in the infrastructure to support customers with an IPv6 network over WAN and to connect the head office to branch offices in the local network. One of the customers is already running IPv6 and wants to enable IPv6 over the DMVPN network infrastructure between the headend and branch sites. Which configuration command must be applied to establish an mGRE IPv6 tunnel neighborship?

A.

tunnel protection mode ipv6

B.

ipv6 unicast-routing

C.

ipv6 nhrp holdtime 30

D.

tunnel mode gre multipoint ipv6

Full Access
Question # 173

A network administrator performed a Compact Flash Memory upgrade on a Cisco Catalyst 6509 Switch. Everything is functioning normally except SNMP, which was configured to monitor the bandwidth of key interfaces but the interface indexes are changed. Which global configuration resolves the issue?

A.

snmp-server ifindex permanent

B.

snmp ifindex permanent

C.

snmp-server ifindex persist

D.

snmp ifindex persist

Full Access
Question # 174

An engineer configured routing between multiple OSPF domains and introduced a routing loop that caused network instability. Which action resolves the problem?

A.

Set a tag using the redistribute command toward a domain and deny inbound m the other domain by a matching tag

B.

Set a tag using the redistribute command toward a different domain and deny the matching tag when exiting from that domain

C.

Set a tag using the network command in a domain and use the route-map command to deny the matching lag when exiting toward a different domain

D.

Set a tag using the network command in a domain and use the route-map command to deny the matching tag when entering into a different domain

Full Access
Question # 175

:586

While BGP internet routes are redistributed to a lower class of router via RIP. packets are being dropped and routes are failing to be distributed in RIP. Which action resolves the issue?

A.

Use OSPF instead of RIP to accept all BGP routes.

B.

Use the input-queue command to prevent the loss of packets.

C.

Use WFQ in the output queue of the high-performance router.

D.

Use RIP V2 to be able to use classless networks from BGP

Full Access
Question # 176

Refer to the exhibit. The 130.130.130.0/24 route shows in the R2 routing table but is getting filtering toward R3. Which action resolves the issue?

A.

Automatic route summarization must be enabled on R2.

B.

The incoming filter list for all interfaces must be set on R2.

C.

IGP synchronization must be disabled on R2.

D.

The outgoing filter list for all interfaces must be set on R2.

Full Access
Question # 177

Refer to the exhibit.

An engineer must filter incoming EIGRP updates to allow only a set of specific prefixes. The distribute list is tested, and it filters out all routes except network 10.10.10.0/24. How should the engineer temporarily allow all prefixes to be learned by the routers again without adjusting the existing access list?

A.

A permit 20 statement should be added before completing the ACL with the required prefixes, and then the permit 20 statement can be removed.

B.

A permit any statement should be added before completing the ACL with the required prefixes and then the permit any statement can be removed.

C.

A continue statement should be added within the permit 10 statement before completing the ACL with the required prefixes, and then the continue statement can be removed.

D.

An extended access list must be used instead of a standard access list to accomplish the task

Full Access
Question # 178

Refer to the exhibit.

Which set of commands restore reachability to loopback0?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 179

Refer to the exhibit.

An administrator is configuring a GRE tunnel to establish an EIGRP neighbor to a remote router. The

other tunnel endpoint is already configured. After applying the configuration as shown, the tunnel

started flapping. Which action resolves the issue?

A.

Modify the network command to use the Tunnel0 interface netmask

B.

Advertise the Loopback0 interface from R2 across the tunnel

C.

Stop sending a route matching the tunnel destination across the tunnel

D.

Readdress the IP network on the Tunnel0 on both routers using the /31 netmask

Full Access
Question # 180

Refer to the exhibit.

An error message "an OSPF-4-FLOOD_WAR” is received on SW2 from SW1. SW2 is repeatedly receiving its own link-state advertisement and flushes it from the network. Which action resolves the issue?

A.

Change area 5 to a normal area from a nonstub area

B.

Resolve different subnet mask issue on the link

C.

Configure Layer 3 port channel on interfaces between switches

D.

Resolve duplicate IP address issue in the network

Full Access
Question # 181

Refer to the exhibit.

Redistribution is enabled between the routing protocols, and nowPC2 PC3, and PC4 cannot reach PC1. What are the two solutions to fix the problem? (Choose two.)

A.

Filter RIP routes back into RIP when redistributing into RIP in R2

B.

Filter OSPF routes into RIP FROM EIGRP when redistributing into RIP in R2.

C.

Filter all routes except RIP routes when redistributing into EIGRP in R2.

D.

Filter RIP AND OSPF routes back into OSPF from EIGRP when redistributing into OSPF in R2

E.

Filter all routes except EIGRP routes when redistributing into OSPF in R3.

Full Access
Question # 182

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 183

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 184

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 185

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 186

Refer to the exhibit.

Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 187

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 188

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 189

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?

A.

BGP

B.

LLDP

C.

EIGRP

D.

NHRP

Full Access