Cisco - Practicetest.400 101.v2015!12!07.by - Jeremiah.622q
Cisco - Practicetest.400 101.v2015!12!07.by - Jeremiah.622q
Number: 400-101
Passing Score: 900
Time Limit: 120 min
http://www.gratisexam.com/
Sections
1. Network Principles
2. Layer 2 Technologies
3. Layer 3 Technologies
4. VPN Technologies
5. Infrastructure Security
6. Infrastructure Services
7. Mix Questions
http://www.gratisexam.com/
Exam A
QUESTION 1
Refer to the exhibit.
Which two are causes of output queue drops on FastEthernet0/0? (Choose two.)
A. an oversubscribed input service policy on FastEthernet0/0
http://www.gratisexam.com/
B.
C.
D.
E.
Correct Answer: DE
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Output drops are caused by a congested interface. For example, the traffic rate on the outgoing interface cannot accept all packets that should be sent out, or a
service policy is applied that is oversubscribed. The ultimate solution to resolve the problem is to increase the line speed. However, there are ways to prevent,
decrease, or control output drops when you do not want to increase the line speed. You can prevent output drops only if output drops are a consequence of short
bursts of data. If output drops are caused by a constant high-rate flow, you cannot prevent the drops.
However, you can control them.
Reference. http://www.cisco.com/c/en/us/support/docs/routers/10000-series-routers/6343-queue- drops.html
QUESTION 2
Refer to the exhibit.
Correct Answer: A
Section: Network Principles
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
We can see that the connection is initiated by the Source IP address shown as 144.254.10.206. We also see that the destination protocol (DstP) shows 01BB,
which is in hex and translates to 443 in decimal. SSL/HTTPS uses port 443.
QUESTION 3
Refer to the exhibit.
http://www.gratisexam.com/
What is the PHB class on this flow?
A.
B.
C.
D.
EF
none
AF21
CS4
Correct Answer: D
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
This command shows the TOS value in hex, which is 80 in this case. The following chart shows some common DSCP/PHB Class values:
http://www.gratisexam.com/
Reference. http://www.tucny.com/Home/dscp-tos
QUESTION 4
Refer to the exhibit.
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
Here we can see that for the same traffic source/destination pair of 10.0.0.1 to 14.0.0.2 there were a total of 100 packets (shown by second entry without the *) and
that the packets were distributed evenly across the three different outgoing interfaces (34, 33, 33 packets, respectively.
QUESTION 5
What is a cause for unicast flooding?
A. Unicast flooding occurs when multicast traffic arrives on a Layer 2 switch that has directly connected multicast receivers.
B. When PIM snooping is not enabled, unicast flooding occurs on the switch that interconnects the PIM-enabled routers.
C. A man-in-the-middle attack can cause the ARP cache of an end host to have the wrong MAC address. Instead of having the MAC address of the default
gateway, it has a MAC address of the man-in-the-middle. This causes all traffic to be unicast flooded through the man-in-the-middle, which can then sniff all
packets.
D. Forwarding table overflow prevents new MAC addresses from being learned, and packets destined to those MAC addresses are flooded until space becomes
available in the forwarding table.
Correct Answer: D
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Causes of Flooding
The very cause of flooding is that destination MAC address of the packet is not in the L2 forwarding table of the switch. In this case the packet will be flooded out of
all forwarding ports in its VLAN (except the port it was received on). Below case studies display most common reasons for destination MAC address not being
known to the switch.
Cause 1: Asymmetric Routing
Large amounts of flooded traffic might saturate low-bandwidth links causing network performance issues or complete connectivity outage to devices connected
across such low-bandwidth links
Cause 2: Spanning-Tree Protocol Topology Changes
Another common issue caused by flooding is Spanning-Tree Protocol (STP) Topology Change Notification (TCN). TCN is designed to correct forwarding tables
after the forwarding topology has changed. This is necessary to avoid a connectivity outage, as after a topology change some destinations previously accessible via
particular ports might become accessible via different ports. TCN operates by shortening the forwarding table aging time, such that if the address is not relearned, it
will age out and flooding will occur
Cause 3: Forwarding Table Overflow
Another possible cause of flooding can be overflow of the switch forwarding table. In this case, new addresses cannot be learned and packets destined to such
addresses are flooded until some space becomes available in the forwarding table. New addresses will then be learned. This is possible but rare, since most
modern switches have large enough forwarding tables to accommodate MAC addresses for most designs.
Reference:
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6000-series-switches/23563-143.html
http://www.gratisexam.com/
QUESTION 6
Which Cisco IOS XE process administers routing and forwarding?
A.
B.
C.
D.
Forwarding manager
Interface manager
Cisco IOS
Host manager
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Some of the processes are listed in the table below:
Reference.
http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Softwa re_Packaging_Architecture.html
http://www.gratisexam.com/
QUESTION 7
Which circumstance can cause packet loss due to a microburst?
A.
B.
C.
D.
slow convergence
a blocked spanning-tree port
process switching
insufficient buffers
Correct Answer: D
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow
packet buffers of the network stack, both in network endpoints and routers and switches inside the network. Symptoms of micro bursts will manifest in the form of
ignores and/ or overruns (also shown as accumulated in "input error" counter within show interface output). This is indicative of receive ring and corresponding
packet buffer being overwhelmed due to data bursts coming in over extremely short period of time (microseconds).
Reference. http://ccieordie.com/?tag=micro-burst
QUESTION 8
Which two statements about proxy ARP are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: BC
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Disadvantages of Proxy ARP
Hosts have no idea of the physical details of their network and assume it to be a flat network in which they can reach any destination simply by sending an ARP
request. But using ARP for everything has disadvantages. These are some of the disadvantages:
It increases the amount of ARP traffic on your segment.
Hosts need larger ARP tables in order to handle IP-to-MAC address mappings.
http://www.gratisexam.com/
Security can be undermined. A machine can claim to be another in order to intercept packets, an act called "spoofing."
It does not work for networks that do not use ARP for address resolution.
It does not generalize to all network topologies. For example, more than one router that connects two physical networks.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/dynamic-address-allocation- resolution/13718-5.html
QUESTION 9
Which service is disabled by the no service tcp-small-servers command?
A.
B.
C.
D.
Correct Answer: D
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
The TCP small servers are:
Echo: Echoes back whatever you type through the telnet x.x.x.x echo command.
Chargen: Generates a stream of ASCII data. Use the telnet x.x.x.x chargen command.
DiscarD. Throws away whatever you type. Use the telnet x.x.x.x discard command.
DaytimE. Returns system date and time, if it is correct. It is correct if you run Network Time Protocol (NTP), or have set the date and time manually from the
exec level. Use the telnet x.x.x.x daytime command.
Reference. http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases- 110/12815-23.html
QUESTION 10
Which option is the most effective action to avoid packet loss due to microbursts?
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: A
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
You can't avoid or prevent them as such without modifying the sending host's application/network stack so it smoothes out the bursts. However, you can manage
microbursts by tuning the size of receive buffers / rings to absorb occasional microbursts.
QUESTION 11
Which two statements about packet fragmentation on an IPv6 network are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
The fragment header is shown below, being 64 bits total with a 32 bit identification field:
http://www.gratisexam.com/
Reference. http://www.openwall.com/presentations/IPv6/img24.html
http://www.gratisexam.com/
QUESTION 12
You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements about the backup are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AC
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
1 Gbps is the same as 1000 Mbps, and 1000Mb x .0002 = 2 Mbps. With TCP based data transfers, the receive window is always the limiting factor, as the sender is
generally able to send traffic at line rate, but then must wait for the acknowledgements to send more data.
QUESTION 13
Which two pieces of information does RTCP use to inform endpoint devices about the RTP flow? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
RTCP transports statistics for a media connection and information such as transmitted octet and packet counts, packet loss, packet delay variation, and round-trip
delay time. An application may use this information to control quality of service parameters, perhaps by limiting flow, or using a different codec.
Reference. http://en.wikipedia.org/wiki/RTP_Control_Protocol
http://www.gratisexam.com/
QUESTION 14
DRAG DROP
Drag and drop the argument of the ip cef load-sharing algorithm command on the left to the function it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 16
DRAG DROP
Drag and drop each description of IPv6 transition technology on the left to the matching IPv6 transition technology category on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
QUESTION 17
How many hash buckets does Cisco Express Forwarding use for load balancing?
http://www.gratisexam.com/
A.
B.
C.
D.
8
16
24
32
Correct Answer: B
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
In order to understand how the load balance takes place, you must first see how the tables relate. The Cisco Express Forwarding table points to 16 hash buckets
(load share table), which point to the adjacency table for parallel paths. Each packet to be switched is broken up into the source and destination address pair and
checked against the loadshare table.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/express-forwarding-cef/18285-loadbal- cef.html
QUESTION 18
Which three features require Cisco Express Forwarding? (Choose three.)
A.
B.
C.
D.
E.
F.
NBAR
AutoQoS
fragmentation
MPLS
UplinkFast
BackboneFast
http://www.gratisexam.com/
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
In the switch, the majority of packets are forwarded in hardware; most packets do not go through the switch CPU. For those packets that do go to the CPU, you can
http://www.gratisexam.com/
speed up spanning tree-based UDP flooding by a factor of about four to five times by using turbo-flooding. This feature is supported over Ethernet interfaces
configured for ARPA encapsulation.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/metro/me3400/software/release/12- 2_50_se/configuration/guide/scg/swiprout.html
QUESTION 20
Which option describes a limitation of Embedded Packet Capture?
A.
B.
C.
D.
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Restrictions for Embedded Packet Capture
In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform.
EPC only captures multicast packets on ingress and does not capture the replicated packets on egress.
Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/15-mt/epc-15-mt- book/nm-packet-capture.html
QUESTION 21
Refer to the exhibit.
A Cisco Catalyst 6500 Series Switch experiences high CPU utilization. What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
http://www.gratisexam.com/
D. The software routing table is full. Reduce the number of routes in the routing table.
Correct Answer: C
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
FIB TCAM Exception - If you try to install more routes than are possible into the FIB TCAM you will see the following error message in the logs:
CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched
%CFIB-SP-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched. %CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception,
Some entries will be software switched.
This error message is received when the amount of available space in the TCAM is exceeded. This results in high CPU. This is a FIB TCAM limitation. Once TCAM
is full, a flag will be set and FIB TCAM exception is received. This stops from adding new routes to the TCAM. Therefore, everything will be software switched. The
removal of routes does not help resume hardware switching. Once the TCAM enters the exception state, the system must be reloaded to get out of that state. You
can view if you have hit a FIB TCAM exception with the following command:
6500-2#sh mls cef exception status
Current IPv4 FIB exception state = TRUE
Current IPv6 FIB exception state = FALSE
Current MPLS FIB exception state = FALSE
When the exception state is TRUE, the FIB TCAM has hit an exception. The maximum routes that can be installed in TCAM is increased by the mls cef maximumroutes command.
Reference. https://supportforums.cisco.com/document/59926/troubleshooting-high-cpu-6500- sup720
QUESTION 22
Refer to the exhibit.
http://www.gratisexam.com/
Your network is suffering excessive output drops. Which two actions can you take to resolve the problem? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Installing a switch with larger buffers and correctly configuring the buffers can solve output queue problems.
For each queue we need to configure the assigned buffers. The buffer is like the `storage' space for the interface and we have to divide it among the different
queues. This is how to do it:
mls qos queue-set output <queue set> buffers Q1 Q2 Q3 Q4
In this example, there is nothing hitting queue 2 or queue 3 so they are not being utilized.
http://www.gratisexam.com/
QUESTION 23
DRAG DROP
Drag and drop the Cisco IOS XE subpackage on the left to the function it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
B.
C.
D.
E.
F.
Correct Answer: AC
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Managing and Configuring a Consolidated Package Using the request platform software package install Command
In the following example, the request platform software package install command is used to upgrade a consolidated package running on RP 0. The force option,
which forces the upgrade past any prompt (such as already having the same consolidated package installed), is used in this example.
Router# request platform software package install rp 0 file bootflash:asr1000rp1- adventerprisek9.02.01.00.122-33.XNA.bin force
To upgrade a consolidated package on the Cisco ASR 1000 Series Routers using the copy command, copy the consolidated package into the bootflash: directory
on the router using the copy command as you would on most other Cisco routers. After making this copy, configure the router to boot using the consolidated
package file.
In the following example, the consolidated package file is copied onto the bootflash: file system from TFTP. The config-register is then set to boot using boot
system commands, and the boot system commands instruct the router to boot using the consolidated package stored in the bootflash: file system. The new
http://www.gratisexam.com/
configuration is then saved using the copy running-config startup-config command, and the system is then reloaded to complete the process.
Router# dir bootflash:
Directory of bootflash:/
11 drwx 16384 Dec 4 2007 04:32:46 -08:00 lost+found
86401 drwx 4096 Dec 4 2007 06:06:24 -08:00.ssh
14401 drwx 4096 Dec 4 2007 06:06:36 -08:00.rollback_timer
28801 drwx 4096 Mar 18 2008 17:31:17 -07:00.prst_sync
43201 drwx 4096 Dec 4 2007 04:34:45 -08:00.installer
13 -rw- 45977 Apr 9 2008 16:48:46 -07:00 target_support_output.tgz.tgz
928862208 bytes total (712273920 bytes free)
Router# copy tftp bootflash:
Address or name of remote host []? 172.17.16.81
Source filename []? /auto/tftp-users/user/asr1000rp1-adventerprisek9.02.01.00.122-33.XNA.bin Destination filename [asr1000rp1adventerprisek9.02.01.00.122-33.XNA.bin]?
Reference:
http://www.cisco.com/c/en/us/td/docs/routers/asr1000/configuration/guide/chassis/asrswcfg/Packag e_Management.html#78189
QUESTION 25
Which two statements about Cisco Express Forwarding are true? (Choose two.)
A.
B.
C.
D.
E.
Cisco Express Forwarding tables contain reachability information and adjacency tables contain forwarding information.
Cisco Express Forwarding tables contain forwarding information and adjacency tables contain reachability information.
Changing MAC header rewrite strings requires cache validation.
Adjacency tables and Cisco Express Forwarding tables can be built separately.
Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
Correct Answer: AD
Section: Network Principles
Explanation
Explanation/Reference:
Explanation:
Main Components of CEF
Information conventionally stored in a route cache is stored in several data structures for Cisco Express Forwarding switching. The data structures provide
optimized lookup for efficient packet forwarding. The two main components of Cisco Express Forwarding operation are the forwarding information base (FIB) and
the adjacency tables.
The FIB is conceptually similar to a routing table or information base. A router uses this lookup table to make destination-based switching decisions during Cisco
Express Forwarding operation. The FIB is updated when changes occur in the network and contains all routes known at the time. Adjacency tables maintain Layer 2
http://www.gratisexam.com/
next-hop addresses for all FIB entries. This separation of the reachability information (in the Cisco Express Forwarding table) and the forwarding information (in the
adjacency table), provides a number of benefits:
The adjacency table can be built separately from the Cisco Express Forwarding table, allowing both to be built without any packets being process-switched.
The MAC header rewrite used to forward a packet is not stored in cache entries, so changes in a MAC header rewrite string do not require validation of cache
entries.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15- mt/isw-cef-15-mt-book/isw-cef-overview.html
QUESTION 26
Refer to the exhibit.
If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the interface Fa0/1 port state?
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
First, the port will transition to the blocking state, immediately upon the change, then it will transition to the new RSTP states of learning and forwarding.
Port States
There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states are
merged into a unique 802.1w discarding state.
QUESTION 27
Which type of port would have root guard enabled on it?
A.
B.
C.
D.
A root port
An alternate port
A blocked port
A designated port
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
The root guard feature provides a way to enforce the root bridge placement in the network.
http://www.gratisexam.com/
The root guard ensures that the port on which root guard is enabled is the designated port. Normally, root bridge ports are all designated ports, unless two or more
ports of the root bridge are connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a root guard-enabled port, root guard
moves this port to a root-inconsistent STP state. This root- inconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In this
way, the root guard enforces the position of the root bridge.
Reference. http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree- protocol/10588-74.html
QUESTION 28
Refer to the exhibit.
http://www.gratisexam.com/
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. Which two ports are
forwarding traffic after STP converges? (Choose two.)
A. The port connecting switch SWD with switch SWE
B. The port connecting switch SWG with switch SWF
http://www.gratisexam.com/
Which three statements about the output are true? (Choose three.)
A.
B.
C.
D.
E.
F.
An mrouter port can be learned by receiving a PIM hello packet from a multicast router.
This switch is configured as a multicast router.
Gi2/0/1 is a trunk link that connects to a multicast router.
An mrouter port is learned when a multicast data stream is received on that port from a multicast router.
This switch is not configured as a multicast router. It is configured only for IGMP snooping.
IGMP reports are received only on Gi2/0/1 and are never transmitted out Gi2/0/1 for VLANs 10 and 20.
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
In this example, the switch has been configured as a multicast router since IGMP snooping has been enabled. All mrouters can learn about other mrouters by
receiving a PIM hello packet from another multicast router. Also, since two different VLANs are being used by the same port of gi 2/0/1, it must be a trunk link that
connects to another multicast router.
QUESTION 30
Refer to the exhibit.
http://www.gratisexam.com/
If a port is configured as shown and receives an untagged frame, of which VLAN will the untagged frame be a member?
A.
B.
C.
D.
VLAN 1
VLAN 2
VLAN 3
VLAN 4
Correct Answer: B
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When typing:
Switch(config-if)#switchport mode ?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
and
Switch(config-if)#switchport mode dynamic ?
auto Set trunking mode dynamic negotiation parameter to AUTO
desirable Set trunking mode dynamic negotiation parameter to DESIRABLE
So if we configure Fa0/1 as dynamic auto mode, it will not initiate any negotitation but waiting for the other end negotiate to be a trunk with DTP. If the other end
does not ask it to become a trunk then it will become an access port. Therefore when using the "show interface fastEthernet0/1 switchport" command we will see
two output lines "Administrative Mode. dynamic auto" and "Operational Mode. static access"
Note. To set this port to VLAN 2 as the output above just use one additional command. "switchport access vlan 2".
Now back to our question, from the output we see that Fa0/1 is operating as an access port on VLAN 2 so if it receive untagged frame it will suppose that frame is
coming from VLAN 2.
QUESTION 31
Refer to the exhibit.
http://www.gratisexam.com/
Which statement describes the effect on the network if FastEthernet0/1 goes down temporarily?
A.
B.
C.
D.
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Use the switchport backup interface interface configuration command on a Layer 2 interface to configure Flex Links, a pair of interfaces that provide backup to each
other. Use the no form of this command to remove the Flex Links configuration.
With Flex Links configured, one link acts as the primary interface and forwards traffic, while the other interface is in standby mode, ready to begin forwarding traffic
if the primary link shuts down. The interface being configured is referred to as the active link; the specified interface is identified as the backup link. The feature
provides an alternative to the Spanning Tree Protocol (STP), allowing users to turn off STP and still retain basic link redundancy.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12- 2_53_se/command/reference/2960ComRef/cli3.html#wp3269214
QUESTION 32
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
Which technology does the use of bi-directional BPDUs on all ports in the topology support?
A.
B.
C.
D.
E.
F.
RSTP
MST
Bridge Assurance
Loop Guard
Root Guard
UDLD
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
Spanning Tree Bridge Assurance
Turns STP into a bidirectional protocol
Ensures spanning tree fails "closed" rather than "open"
If port type is "network" send BPDU regardless of state
If network port stops receiving BPDU it's put in BA-inconsistent state
Bridge Assurance (BA) can help protect against bridging loops where a port becomes designated because it has stopped receiving BPDUs. This is similar to the
function of loop guard.
Reference. http://lostintransit.se/tag/convergence/
QUESTION 33
Which two statements are true about an EPL? (Choose two.)
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: CD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Ethernet private line (EPL) and Ethernet virtual private line (EVPL) are carrier Ethernet data services defined by the Metro Ethernet Forum. EPL provides a point-topoint Ethernet virtual connection (EVC) between a pair of dedicated usernetwork interfaces (UNIs), with a high degree of transparency. EVPL provides a point-topoint or point-to-multipoint connection between a pair of UNIs.
The services are categorized as an E-Line service type, with an expectation of low frame delay, frame delay variation and frame loss ratio. EPL is implemented
using a point-to-point (EVC) with no Service Multiplexing at each UNI (physical interface), i.e., all service frames at the UNI are mapped to a single EVC (a.k.a. allto-one bundling).
Reference. http://en.wikipedia.org/wiki/Ethernet_Private_Line
QUESTION 34
Which two statements describe characteristics of HDLC on Cisco routers? (Choose two.)
A.
B.
C.
D.
Correct Answer: AC
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Cisco High-Level Data Link Controller (HDLC) is the Cisco proprietary protocol for sending data over synchronous serial links using HDLC. Cisco HDLC also
provides a simple control protocol called Serial Line Address Resolution Protocol (SLARP) to maintain serial link keepalives. Cisco HDLC is the default for data
encapsulation at Layer 2 (data link) of the Open System Interconnection (OSI) stack for efficient packet delineation and error control.
The absence of a protocol type field in the HDLC header posed a problem for links that carried traffic from more than one Layer 3 protocol. Cisco, therefore, added
an extra Type field to the HDLC header, creating a Cisco-specific version of HDLC. Cisco routers can support multiple network layer protocols on the same HDLC
link. For example an HDLC link between two Cisco routers can forward both IPv4 and IPv6 packets because the Type field can identify which type of packet is
carried inside each HDLC frame.
Reference.
http://www.cisco.com/c/en/us/td/docs/routers/access/800/819/software/configuration/Guide/819_S CG/6ser_conf.html#pgfId-1073734
QUESTION 35
http://www.gratisexam.com/
Which mechanism can be used on Layer 2 switches so that only multicast packets with downstream receivers are sent on the multicast router-connected ports?
A.
B.
C.
D.
IGMP snooping
Router Guard
PIM snooping
multicast filtering
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Ideally, the Layer 2 device should forward the multicast transmission only out ports to which receivers are connected and also out any ports that are connected to
downstream multicast routers. This configuration requires a Layer 2 device to be able to determine the ports on which multicast routers and receivers for each
separate (S,G) or (*,G) multicast group are located. To facilitate intelligent forwarding of multicast traffic on the LAN, Cisco Catalyst switches support two
mechanisms:
IGMP snooping-- The switch listens in or "snoops" IGMP communications between receivers and multicast routers. This snooping enables the switch to
determine which ports are connected to receivers for each multicast group and which ports are connected to multicast routers.
Cisco Group Management Protocol (CGMP)-- The switch communicates with multicasts routers, with multicast routers relaying group membership
information to switches.
Reference. https://www.informit.com/library/content.aspx?
b=CCNP_Studies_Switching&seqNum=59
QUESTION 36
Which statement is true about Fast Link Pulses in Ethernet?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
To make sure that your connection is operating properly, IEEE 802.3 Ethernet employs normal link pulses (NLPs), which are used for verifying link integrity in a
http://www.gratisexam.com/
10BaseT system. This signaling gives you the link indication when you attach to the hub and is performed between two directly connected link interfaces (hub-tostation or station-to-station). NLPs are helpful in determining that a link has been established between devices, but they are not a good indicator that your cabling is
free of problems.
An extension of NLPs is fast link pulses. These do not perform link tests, but instead are employed in the autonegotiation process to advertise a device's
capabilities.
Reference. http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1904.html
QUESTION 37
Which statement is true regarding UDLD and STP timers?
http://www.gratisexam.com/
A.
B.
C.
D.
The UDLD message timer should be two times the STP forward delay to prevent loops.
UDLD and STP are unrelated features, and there is no relation between the timers.
The timers need to be synced by using the spanning-tree udld-sync command.
The timers should be set in such a way that UDLD is detected before the STP forward delay expires.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
UDLD is designed to be a helper for STP. Therefore, UDLD should be able to detect an unidirectional link before STP would unblock the port due to missed BPDUs.
Thus, when you configure UDLD timers, make sure your values are set so that unidirectional link is detected before "STP MaxAge + 2xForwardDelay" expires.
Reference. http://blog.ine.com/tag/stp/
QUESTION 38
Which switching technology can be used to solve reliability problems in a switched network?
A. fragment-free mode
B. cut-through mode
http://www.gratisexam.com/
C. check mode
D. store-and-forward mode
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Characteristics of Store-and-Forward Ethernet Switching
This section provides an overview of the functions and features of store-and-forward Ethernet switches.
Error Checking
Figure 1 shows a store-and-forward switch receiving an Ethernet frame in its entirety. At the end of that frame, the switch will compare the last field of the datagram
against its own frame-check- sequence (FCS) calculations, to help ensure that the packet is free of physical and data-link errors.
The switch then performs the forwarding process.
Whereas a store-and-forward switch solves reliability issues by dropping invalid packets, cut- through devices forward them because they do not get a chance to
evaluate the FCS before transmitting the packet.
Figure 1. Ethernet Frame Entering a Store-and-Forward Bridge or Switch (from Left to Right)
http://www.gratisexam.com/
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated. The numbers shown are STP link metrics. Which two ports are in
blocking state after STP converges? (Choose two.)
A. the port on switch SWD that connects to switch SWE
B. the port on switch SWF that connects to switch SWG
http://www.gratisexam.com/
Multicast sources send IGMP messages to their first-hop router, which then generates a PIM join message that is then sent to the RP.
Multicast receivers send IGMP messages to their first-hop router, which then forwards the IGMP messages to the RP.
IGMP messages are encapsulated in PIM register messages and sent to the RP.
Multicast receivers send IGMP messages to signal their interest to receive traffic for specific multicast groups.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
In the example shown above, the receivers (the designated multicast group) are interested in receiving the video data stream from the source. The receivers
indicate their interest by sending an Internet Group Management Protocol (IGMP) host report to the routers in the network. The routers are then responsible for
delivering the data from the source to the receivers.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_ovr.html
QUESTION 41
Which two statements are true about RSTP? (Choose two.)
A.
B.
C.
D.
E.
By default, RTSP uses a separate TCN BPDU when interoperating with 802.1D switches.
By default, RTSP does not use a separate TCN BPDU when interoperating with 802.1D switches.
If a designated port receives an inferior BPDU, it immediately triggers a reconfiguration.
By default, RTSP uses the topology change TC flag.
If a port receives a superior BPDU, it immediately replies with its own information, and no reconfiguration is triggered.
Correct Answer: BD
Section: Layer 2 Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
The RSTP does not have a separate topology change notification (TCN) BPDU. It uses the topology change (TC) flag to show the topology changes.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12- 1_9_ea1/configuration/guide/scg/swmstp.html
QUESTION 42
Refer to the exhibit.
Which two statements are true about the displayed STP state? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
A port enabled with portfast will not send topology changes when a port goes up or down, but here we see that 296 TCN's were sent so we know that Gi 0/15 does
not have portfast enabled. TCN's are sent using BPDU's over the root port, which we see is port channel 1.
QUESTION 43
DRAG DROP
http://www.gratisexam.com/
Drag and drop the multicast protocol definition on the left to the correct default time interval on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
Root guard
Loop guard
UplinkFast
UDLD
http://www.gratisexam.com/
E. BackboneFast
F. Bridge Assurance
Correct Answer: CE
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
It is good to know the UplinkFast and BackboneFast behavior before you start the migration process.
Here, the Access1 switch runs Cisco IOS. This output is taken before migration to the rapid-PVST+ mode:
http://www.gratisexam.com/
http://www.gratisexam.com/
You can see in the show spanning-tree summary command output that UplinkFast and BackboneFast are enabled, but are inactive in rapid-PVST mode.
Reference. http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series- switches/72836-rapidpvst-mig-config.html#upback1
QUESTION 45
Which statement is true about LLDP?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Cisco Discovery Protocol Versus LLDP-MED TLV Comparison
Reference.
http://www.cisco.com/en/US/technologies/tk652/tk701/technologies_white_paper0900aecd804cd4 6d.html
QUESTION 46
Which statement is true when using a VLAN ID from the extended VLAN range (10064094)?
A.
B.
C.
D.
VLANs in the extended VLAN range can be used with VTPv2 in either client or server mode.
VLANs in the extended VLAN range can only be used as private VLANs.
STP is disabled by default on extended-range VLANs.
VLANs in the extended VLAN range cannot be pruned.
Correct Answer: D
http://www.gratisexam.com/
Cisco switches that run PVST+ do not transmit BPDUs on nonnative VLANs when using a dot1q trunk.
When removing VLAN 1 from a trunk, management traffic such as CDP is no longer passed in that VLAN.
DTP only supports autonegotiation on 802.1q and does not support autonegotiation for ISL.
DTP is a point-to-point protocol.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Ethernet trunk interfaces support different trunking modes. You can set an interface as trunking or nontrunking or to negotiate trunking with the neighboring
interface. To autonegotiate trunking, the interfaces must be in the same VTP domain.
Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a Point-to-Point Protocol. However, some internetworking devices might forward
DTP frames improperly, which could cause misconfigurations.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12- 2_55_se/configuration/guide/scg3750/swvlan.html
QUESTION 48
Which three statements are true about an EtherChannel? (Choose three.)
A.
B.
C.
D.
PAGP and LACP can be configured on the same switch if the switch is not in the same EtherChannel.
EtherChannel ports in suspended state can receive BPDUs but cannot send them.
An EtherChannel forms between trunks that are using different native VLANs.
LACP can operate in both half duplex and full duplex, if the duplex setting is the same on both ends.
http://www.gratisexam.com/
Answer E. Ports with different spanning-tree path costs can form an EtherChannel if they are otherwise compatibly configured. Setting different spanning-tree path
costs does not, by itself, make ports incompatible for the formation of an EtherChannel.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15- 0_2_EX/layer2/configuration_guide/b_lay2_152ex_2960-x_cg/
b_lay2_152ex_2960- x_cg_chapter_010.html
QUESTION 49
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
A. The switchport priority extend cos command on interface FastEthernet0/0 prevents traffic to and from the PC from taking advantage of the high-priority data
queue that is assigned to the IP phone.
B. The switchport priority extend cos command on interface FastEthernet0/0 enables traffic to and from the PC to use the high priority data queue that is assigned
to the IP phone.
C. When the switch is configured to trust the CoS label of incoming traffic, the trusted boundary feature is disabled automatically.
D. The mls qos cos override command on interface FastEthernet0/0 configures the port to trust the CoS label of traffic to and from the PC.
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
In some situations, you can prevent a PC connected to the Cisco IP Phone from taking advantage of a high-priority data queue. You can use the switchport priority
extend cos interface configuration command to configure the telephone through the switch CLI to override the priority of the traffic received from the PC.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12- 1_22_ea2/configuration/guide/2950scg/swqos.html
QUESTION 50
http://www.gratisexam.com/
DRAG DROP
Drag and drop the PPPoE packet type on the left to the corresponding description on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
D. 0180.C200.0000
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
If the native vlan is 1:
A STP BPDU for VLAN 1 will be sent untagged to MAC 0180.c200.0000 (this is the common spanning tree)
A PVST+ BPDU for VLAN 1 will be sent untagged to MAC 0100.0ccc.cccd
A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID = to the VLAN)
If the native vlan is not 1:
A STP BPDU for VLAN 1 will be sent untagged (on the native vlan) to MAC 0180.c200.0000 (this is the common spanning tree)
A PVST+ BPDU for VLAN1 will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID=1)
A PVST+ BPDU for the native vlan will be sent untagged to MAC 0100.0ccc.cccd (with a PVID=native vlan)
A PVST+ BPDU for all other vlans will be sent with a 802.1Q tag to MAC 0100.0ccc.cccd (with a PVID = to the VLAN)
QUESTION 52
Refer to the exhibit.
http://www.gratisexam.com/
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated.
The numbers shown are STP link metrics.
After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less optimal path. What can you do to optimize the STP tree in this
switched network?
http://www.gratisexam.com/
A.
B.
C.
D.
Change the priority of switch SWA to a lower value than the default value.
Change the priority of switch SWB to a higher value than the default value.
Change the priority of switch SWG to a higher value than the default value.
Change the priority of switch SWD to a lower value than the default value.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
In this topology, we see that all port paths and priorities are the same, so the lowest MAC address will be used to determine the best STP path. From SWG, SWE
will be chosen as the next switch in the path because it has a lower MAC address than SWF. From SWE, traffic will go to SWC because it has a lower MAC
address, and then to SWD, instead of going from SWE directly to SWD. If we lower the priority of SWD (lower means better with STP) then traffic will be sent
directly to SWD.
QUESTION 53
Which three statements are true about VSS? (Choose three.)
A.
B.
C.
D.
E.
F.
VSS separates the control planes of the active and the standby chassis.
Configuration changes can be made on both active and standby chassis.
When the VSS active chassis recovers after a failure, it initiates a switchover and takes on the active role again.
VSS unifies the control planes of the active and the standby chassis.
HSRP configuration is not required to run VSS.
The VSS standby chassis monitors the VSS active chassis using the VSL.
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
The Root Bridge continues to set the Topology Change flag (TCN bit) in all Configuration BPDUs that it sends out for a total of Forward Delay + Max Age seconds
(default = 35 (20+15) seconds). This flag instructs all bridges to shorten their MAC address table (Bridge table) aging process from the default value of 300 seconds
to the current Forward Delay value of the bridge (default=15 seconds).
The TCA flag is set by the upstream bridge to tell the downstream bridges to stop sending TCN BPDUs. The TC flag is set in configuration BPDU by the Root
Bridge to shorten the bridge table age-out period from default 300 seconds to Forward Delay seconds.
QUESTION 55
Refer to the exhibit.
http://www.gratisexam.com/
Which technology can be used on the switch to enable host A to receive multicast packets for 239.2.2.2 but prevent host B from receiving them?
A.
B.
C.
D.
IGMP filtering
MLD snooping
IGMP snooping
MLD filtering
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic. The feature allows a network switch to listen in on the
IGMP conversation between hosts and routers. By listening to these conversations the switch maintains a map of which links need which IP multicast streams.
Multicasts may be filtered from the links which do not need them and thus controls which ports receive specific multicast traffic.
QUESTION 56
Which option describes the purpose of the PPP endpoint discriminator?
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
In situations in which many clients use the same username to initiate an MP connection, or when interoperating with non-Cisco routers, you need to control the
order in which the bundle name is created. It is necessary to configure the access server to create a bundle name based on the endpoint discriminator first, the
username second, or both. The endpoint discriminator identifies the system transmitting the packet and advises the network access server (NAS) that the peer on
this link could be the same as the peer on another existing link. Because every client has a unique endpoint discriminator, only multiple links from the same client
are bundled into a single unique MP connection. For example, consider when two PC clients initiate a multilink connection to an access server using the same
username. If the multilink bundle name is established based on the endpoint discriminator first, then on the username or on both, the NAS can accurately bundle
the links from each client using the endpoint discriminator as a bundle name. This bundle name is unique to the peer system transmitting the packet.
Reference. http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10238- mppp-bundle-name.html
QUESTION 57
Which option describes how a VTPv3 device responds when it detects a VTPv2 device on a trunk port?
A.
B.
C.
D.
Correct Answer: C
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When a VTP version 3 device on a trunk port receives messages from a VTP version 2 device, the VTP version 3 device sends a scaled-down version of the VLAN
database on that particular trunk in a VTP version 2 format. A VTP version 3 device does not send out VTP version 2-formatted packets on a trunk port unless it
first receives VTP version 2 packets on that trunk. If the VTP version 3 device does not receive VTP version 2 packets for an interval of time on the trunk port, the
VTP version 3 device stops transmitting VTP version 2 packets on that trunk port.
http://www.gratisexam.com/
Even when a VTP version 3 device detects a VTP version 2 device on a trunk port, the VTP version 3 device continues to send VTP version 3 packets in addition to
VTP version 3 device 2 packets, to allow two kinds of neighbors to coexist on the trunk. VTP version 3 sends VTP version 3 and VTP version 2 updates on VTP
version 2-detected trunks.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SX/configuration/guide/book/vtp.html
QUESTION 58
Which three statements about bridge assurance are true? (Choose three.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
1
2
15
255
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
MLD uses the Internet Control Message Protocol (ICMP) to carry its messages. All MLD messages are link-local with a hop limit of 1, and they all have the alert
option set. The alert option implies an implementation of the hop-by-hop option header.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imc- lsm-xe-3s-book/ipv6-mcast-mld-xe.html
QUESTION 60
DRAG DROP
Drag and drop the LACP elements on the left into the correct priority order in the hot-standby port-selection process on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
The multicast address 0100.0cdd.dddd is used as the destination address for periodic advertisements.
An inactive VLAN that is configured on an access port passes periodic Cisco Discovery Protocol advertisements.
The multicast address 0100.0ccc.ccd is used as the destination address for periodic advertisements.
A VLAN must be active on an access port before periodic Cisco Discovery Protocol advertisements are passed.
Correct Answer: D
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
All CDP packets include a VLAN ID. If you configure CDP on a Layer 2 access port, the CDP packets sent from that access port include the access port VLAN ID. If
you configure CDP on a Layer 2 trunk port, the CDP packets sent from that trunk port include the lowest configured VLAN ID allowed on that trunk port.
CDP messages on the active physical interfaces (Ethernet NIC) to a well-known multicast address (0100.0CCC.CCCC.
QUESTION 62
http://www.gratisexam.com/
Which three TLVs does LLDP use to discover network devices? (Choose three.)
A.
B.
C.
D.
E.
F.
Management address
Port description
Network policy
System name
Location information
Power management
Correct Answer: D
http://www.gratisexam.com/
Correct Answer: AD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When a caller A dials in to an access server B, The Access server sends across the link an initial Type 1 authentication packet called a Challenge. This Challenge
packet contains a randomly generated number, an ID sequence number to identify the challenge (sent in clear text) and the authentication name of the challenger.
Reference. http://www.rhyshaden.com/ppp.htm
QUESTION 65
Which statement about WAN Ethernet Services is true?
A.
B.
C.
D.
Correct Answer: A
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
The MEF has defined a set of bandwidth profiles that can be applied at the UNI or to an EVC. A bandwidth profile is a limit on the rate at which Ethernet frames can
traverse the UNI or the EVC.
Reference. http://www.ciscopress.com/articles/article.asp?p=101367&seqNum=2
QUESTION 66
DRAG DROP
Drag and drop each STP port role on the left to the matching statement on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Attach the specific ports that are part of the data path.
Use an in-line filter.
Use an appropriate ACL.
Add memory to the Supervisor.
Reconfigure the buffers to accommodate the additional traffic.
Configure a policy map, class map, and an access list to express the match conditions.
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer: BD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
When the TC bit is received, every bridge is then notified and reduces the aging time to forward_delay (15 seconds by default) for a certain period of time (max_age
+ forward_delay). It is more beneficial to reduce the aging time instead of clearing the table because currently active hosts, that effectively transmit traffic, are not
cleared from the table.
Once the root is aware that there has been a topology change event in the network, it starts to send out its configuration BPDUs with the topology change (TC) bit
set. These BPDUs are relayed by every bridge in the network with this bit set. As a result all bridges become aware of the topology change situation and it can
reduce its aging time to forward_delay. Bridges receive topology change BPDUs on both forwarding and blocking ports.
An important point to consider here is that a TCN does not start a STP recalculation. This fear comes from the fact that TCNs are often associated with unstable
STP environments; TCNs are a consequence of this, not a cause. The TCN only has an impact on the aging time. It does not change the topology nor create a
loop.
Reference: http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree- protocol/12013-17.html#topic1
QUESTION 74
Which two statements about RSTP and MSTP BPDUs are true? (Choose two.)
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs.
MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs.
RSTP switches can process MSTP version 3 BPDUs.
When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs.
Correct Answer: AC
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
A switch running both MSTP and RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches. If this switch
receives a legacy 802.1D configuration BPDU (a BPDU with the protocol version set to 0), it sends only 802.1D BPDUs on that port. An MST switch can also detect
that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (version 3) associated with a different region, or an RST BPDU (version
2).
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12- 1_9_ea1/configuration/guide/scg/swmstp.html
QUESTION 75
Which three options are sources from which a SPAN session can copy traffic? (Choose three.)
A.
B.
C.
D.
E.
F.
ports
EtherChannels
VLANs
subnets
primary IP addresses
secondary IP addresses
http://www.gratisexam.com/
The inband interface to the control plane CPU -- You can monitor the inband interface only from the default VDC. Inband traffic from all VDCs is monitored.
VLANs -- When a VLAN is specified as a SPAN source, all supported interfaces in the VLAN are SPAN sources.
Remote SPAN (RSPAN) VLANs
Fabric port channels connected to the Cisco Nexus 2000 Series Fabric Extender
Satellite ports and host interface port channels on the Cisco Nexus 2000 Series Fabric Extender
-- These interfaces are supported in Layer 2 access mode, Layer 2 trunk mode, and Layer 3 mode.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx- os/system_management/configuration/guide/sm_nx_os_cg/
sm_14span.html#wp1239492
QUESTION 76
Which three capabilities are provided by MLD snooping? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Which two statements about the implementation are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Previous implementations of Cisco IOS Multilink PPP (MLP) include support for Link Fragmentation Interleaving (LFI). This feature allows the delivery of delaysensitive packets, such as the packets of a Voice call, to be expedited by omitting the PPP Multilink Protocol header and sending the packets as raw PPP packets
in between the fragments of larger data packets. This feature works well on bundles consisting of a single link. However, when the bundle contains multiple links
there is no way to keep the interleaved packets in sequence with respect to each other.
The Multiclass Multilink PPP (MCMP) feature in Cisco IOS Release 12.2(13)T addresses the limitations of MLP LFI on bundles containing multiple links by
introducing multiple data classes. With multiclass multilink PPP interleaving, large packets can be multilink-encapsulated and fragmented into smaller packets to
satisfy the delay requirements of real-time voice traffic; small real-time packets, which are not multilink encapsulated, are transmitted between fragments of the
large packets. The interleaving feature also provides a special transmit queue for the smaller, delay- sensitive packets, enabling them to be transmitted earlier than
other flows. Interleaving provides the delay bounds for delay-sensitive voice packets on a slow link that is used for other best-effort traffic.
References:
http://www.cisco.com/c/en/us/td/docs/ios/dial/configuration/guide/12_4t/dia_12_4t_book/dia_multi class_link_ppp.pdf
http://www.cisco.com/c/en/us/td/docs/routers/access/500/520/software/configuration/guide/520_SC G_Book/520scg_concepts.html
QUESTION 78
Which two statements are characteristics of Ethernet private LAN circuits? (Choose two.)
A. They support communication between two or more customer endpoints.
http://www.gratisexam.com/
Correct Answer: BE
Section: Layer 2 Technologies
Explanation
Explanation/Reference:
Explanation:
Inverse Address Resolution Protocol (Inverse ARP or InARP) is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link
Layer (Layer 2) addresses. It is primarily used in Frame Relay (DLCI) and ATM networks, in which Layer 2 addresses of virtual circuits are sometimes obtained
from Layer 2 signaling, and the corresponding Layer 3 addresses must be available before those virtual circuits can be used.
Since ARP translates Layer 3 addresses to Layer 2 addresses, InARP may be described as its inverse. In addition, InARP is implemented as a protocol extension
to ARP: it uses the same packet format as ARP, but different operation codes.
Reference: http://en.wikipedia.org/wiki/Address_Resolution_Protocol
http://www.gratisexam.com/
QUESTION 80
Refer to the exhibit.
PIM neighbor 10.1.5.6 is the RPF neighbor for the group 232.1.1.1 for the shared tree.
PIM neighbor 10.1.5.6 is the one that is seen as the RPF neighbor when performing the command show ip rpf 10.1.4.7.
PIM neighbor 10.1.5.6 is the winner of an assert mechanism.
The RPF neighbor 10.1.5.6 is invalid.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
show ip mroute Field Descriptions
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult3.html
QUESTION 81
Refer to the exhibit.
http://www.gratisexam.com/
Which option explains why the forwarding address is set to 0.0.0.0 instead of 110.100.1.1?
A. The interface Ethernet0/1 is in down state.
http://www.gratisexam.com/
B. The next-hop ip address 110.100.1.1 is not directly attached to the redistributing router.
C. The next-hop interface (Ethernet0/1) is specified as part of the static route command; therefore, the forwarding address is always set to 0.0.0.0.
D. OSPF is not enabled on the interface Ethernet0/1.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
From the output of the "show ip ospf database" command (although this command is not shown) we can conclude this is an ASBR (with Advertising Router is itself)
and E0/1 is the ASBR's next hop interface for other routers to reach network 192.168.10.0.
The Forwarding Address is determined by these conditions:
* The forwarding address is set to 0.0.0.0 if the ASBR redistributes routes and OSPF is not enabled on the next hop interface for those routes.
* These conditions set the forwarding address field to a non-zero address:
+ OSPF is enabled on the ASBR's next hop interface AND
+ ASBR's next hop interface is non-passive under OSPF AND
+ ASBR's next hop interface is not point-to-point AND
+ ASBR's next hop interface is not point-to-multipoint AND + ASBR's next hop interface address falls under the network range specified in the router ospf
command.
* Any other conditions besides these set the forwarding address to 0.0.0.0. -> We can see E0/1 interface is not running OSPF because it does not belong to
network 110.110.0.0 0.0.255.255 which is declared under OSPF process -> F.A address is set to 0.0.0.0.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13682- 10.html
QUESTION 82
Refer to the exhibit.
http://www.gratisexam.com/
You have configured two routing protocols across this point-to-point link. How many BFD sessions will be established across this link?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Cisco devices will use one Bidirectional Forwarding Detection (BFD) session for multiple client protocols in the Cisco implementation of BFD for Cisco IOS
Releases 12.2(18)SXE, 12.0(31)S, and 12.4(4)T. For example, if a network is running OSPF and EIGRP across the same link to the same peer, only one BFD
session will be established, and BFD will share session information with both routing protocols.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html#wp1053749
QUESTION 83
Refer to the exhibit.
2001:DB8::1/128 is a local host route, and it can be redistributed into a dynamic routing protocol.
2001:DB8::1/128 is a local host route, and it cannot be redistributed into a dynamic routing protocol.
2001:DB8::1/128 is a local host route that was created because ipv6 unicast-routing is not enabled on this router.
2001:DB8::1/128 is a route that was put in the IPv6 routing table because one of this router's loopback interfaces has the IPv6 address 2001:DB8::1/128.
http://www.gratisexam.com/
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The local routes have the administrative distance of 0. This is the same adminstrative distance as connected routes. However, when you configure redistributed
connected under any routing process, the connected routes are redistributed, but the local routes are not. This behavior allows the networks to not require a large
number of host routes, because the networks of the interfaces are advertised with their proper masks. These host routes are only needed on the router that owns
the IP address in order to process packets destined to that IP address.
It is normal for local host routes to be listed in the IPv4 and IPv6 routing table for IP addresses of the router's interfaces. Their purpose is to create a corresponding
CEF entry as a receive entry so that the packets destined to this IP address can be processed by the router itself. These routes cannot be redistributed into any
routing protocol.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/ip-routing/116264-technote-ios-00.html
QUESTION 84
Refer to the exhibit.
http://www.gratisexam.com/
Routers R1, R2, and R3 are configured as shown, and traffic from R2 fails to reach 172.29.168.3.
Which action can you take to correct the problem?
A. Correct the static route on R1.
B. Correct the default route on R2.
http://www.gratisexam.com/
http://www.gratisexam.com/
The OSPF reference bandwidth is too small to account for the higher speed links through R2.
The default OSPF cost through R1 is less than the cost through R2.
The default OSPF cost through R1 is more than the cost through R2.
The link between R2 and R1 is congested.
Correct Answer: A
http://www.gratisexam.com/
For which reason could a BGP-speaking device in autonomous system 65534 be prevented from installing the given route in its BGP table?
A.
B.
C.
D.
E.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
BGP is considered to be a 'Path Vector' routing protocol rather than a distance vector routing protocol since it utilises a list of AS numbers to describe the path that
a packet should take. This list is called the AS_PATH. Loops are prevented because if a BGP speaking router sees it's own AS in the AS_PATH of a route it rejects
the route.
QUESTION 87
http://www.gratisexam.com/
The prefix is reachable via an EIGRP peer that is in the routing domain of the router.
The EIGRP peer that advertises the prefix to the router has multiple paths to the destination.
The EIGRP peer that advertises the prefix to the router is closer to the destination than the router.
The EIGRP peer that advertises the prefix cannot be used as a next hop to reach the destination.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The advertised metric from an EIGRP neighbor (peer) to the local router is called Advertised Distance (or reported distance) while the metric from the local router to
that network is called Feasible Distance. For example, R1 advertises network 10.10.10.0/24 with a metric of 20 to R2. For R2, this is the advertised distance. R2
calculates the feasible distance by adding the metric from the advertised router (R1) to itself. So in this case the feasible distance to network 10.10.10.0/24 is 20 +
50 = 70.
Before a router can be considered a feasible successor, it must pass the feasibility condition rule. In short, the feasibility condition says that if we learn about a
prefix from a neighbor, the advertised distance from that neighbor to the destination must be lower than our feasible distance to that same destination.
Therefore we see the Advertised Distance always smaller than the Feasible Distance to satisfy the feasibility condition.
QUESTION 88
Which two statements about the function of the stub feature in EIGRP are true? (Choose two.)
A. It stops the stub router from sending queries to peers.
B. It stops the hub router from sending queries to the stub router.
C. It stops the stub router from propagating dynamically learned EIGRP prefixes to the hub routers.
http://www.gratisexam.com/
D. It stops the hub router from propagating dynamically learned EIGRP prefixes to the stub routers.
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
When using the EIGRP Stub Routing feature, you need to configure the distribution and remote routers to use EIGRP, and to configure only the remote router as a
stub. Only specified routes are propagated from the remote (stub) router. The router responds to queries for summaries, connected routes, redistributed static
routes, external routes, and internal routes with the message "inaccessible." A router that is configured as a stub will send a special peer information packet to all
neighboring routers to report its status as a stub router.
Without the stub feature, even after the routes that are sent from the distribution router to the remote router have been filtered or summarized, a problem might
occur. If a route is lost somewhere in the corporate network, EIGRP could send a query to the distribution router, which in turn will send a query to the remote router
even if routes are being summarized. If there is a problem communicating over the WAN link between the distribution router and the remote router, an EIGRP stuck
in active (SIA) condition could occur and cause instability elsewhere in the network. The EIGRP Stub Routing feature allows a network administrator to prevent
queries from being sent to the remote router.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/eigrpstb.html
QUESTION 89
In which type of EIGRP configuration is EIGRP IPv6 VRF-Lite available?
A.
B.
C.
D.
stub
named mode
classic mode
passive
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The EIGRP IPv6 VRF Lite feature provides EIGRP IPv6 support for multiple VRFs. EIGRP for IPv6 can operate in the context of a VRF. The EIGRP IPv6 VRF Lite
feature provides separation between routing and forwarding, providing an additional level of security because no communication between devices belonging to
different VRFs is allowed unless it is explicitly configured. The EIGRP IPv6 VRF Lite feature simplifies the management and troubleshooting of traffic belonging to a
specific VRF.
The EIGRP IPv6 VRF Lite feature is available only in EIGRP named configurations.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2mt/ipv6-15- 2mt-book/ip6-eigrp.html#GUID-92B4FF4F-2B68-41B0-93C8http://www.gratisexam.com/
AAA4F0EC1B1B
QUESTION 90
Two routers are trying to establish an OSPFv3 adjacency over an Ethernet link, but the adjacency is not forming. Which two options are possible reasons that
prevent OSPFv3 to form between these two routers? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
An OSPFv3 interface must have a compatible configuration with a remote interface before the two can be considered neighbors. The two OSPFv3 interfaces must
match the following criteria:
Hello interval
Dead interval
Area ID
Optional capabilities
The OSPFv3 header includes an instance ID field to identify that OSPFv3 packet for a particular OSPFv3 instance. You can assign the OSPFv3 instance. The
interface drops all OSPFv3 packets that do not have a matching OSPFv3 instance ID in the packet header.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx- os/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html
QUESTION 91
Refer to the exhibit.
http://www.gratisexam.com/
AS #1 and AS #2 have multiple EBGP connections with each other. AS #1 wants all return traffic that is destined to the prefix 10.10.10.1/32 to enter through the
router R1 from AS #2. In order to achieve this routing policy, the AS 1 advertises a lower MED from R1, compared to a higher MED from R3, to their respective
BGP neighbor for the prefix 10.10.10.0/24. Will this measure guarantee that the routing policy is always in effect?
A.
B.
C.
D.
Yes, because MED plays a deterministic role in return traffic engineering in BGP.
Yes, because a lower MED forces BGP best-path route selection in AS #2 to choose R1 as the best path for 10.10.10.0/24.
Yes, because a lower MED in AS #2 is the highest BGP attribute in BGP best-path route selection.
No, AS #2 can choose to alter the weight attribute in R2 for BGP neighbor R1, and this weight value is cascaded across AS #2 for BGP best-path route
http://www.gratisexam.com/
selection.
E. No, AS #2 can choose to alter the local preference attribute to overwrite the best-path route selection over the lower MED advertisement from AS #1. This local
preference attribute is cascaded across AS #2 for the BGP best-path route selection.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
MED and AS path prepending can both be used to influence the way incoming traffic from other Autonomous Systems get sent to the local AS, but they provide no
guarantee as the other AS ultimately has the final word in how they send traffic. Since local preference is preferred over MED in the BGP decision process, the
other AS can configure local preference to override the MED settings you have configured.
QUESTION 92
Refer to the exhibit.
http://www.gratisexam.com/
^65000_65001$
65000_65001$
^65000_65001
^65001_65000$
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
The following table lists the regular expressions and their meanings:
http://www.gratisexam.com/
http://www.gratisexam.com/
Reference. http://blog.ine.com/2008/01/06/understanding-bgp-regular-expressions/
QUESTION 94
Which statement describes the BGP add-path feature?
A.
B.
C.
D.
It allows for installing multiple IBGP and EBGP routes in the routing table.
It allows a network engineer to override the selected BGP path with an additional path created in the config.
It allows BGP to provide backup paths to the routing table for quicker convergence.
It allows multiple paths for the same prefix to be advertised.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
BGP routers and route reflectors (RRs) propagate only their best path over their sessions. The advertisement of a prefix replaces the previous announcement of
that prefix (this behavior is known as an implicit withdraw). The implicit withdraw can achieve better scaling, but at the cost of path diversity.
Path hiding can prevent efficient use of BGP multipath, prevent hitless planned maintenance, and can lead to MED oscillations and suboptimal hot-potato routing.
Upon nexthop failures, path hiding also inhibits fast and local recovery because the network has to wait for BGP control plane convergence to restore traffic. The
BGP Additional Paths feature provides a generic way of offering path diversity; the Best External or Best Internal features offer path diversity only in limited
scenarios.
The BGP Additional Paths feature provides a way for multiple paths for the same prefix to be advertised without the new paths implicitly replacing the previous
paths. Thus, path diversity is achieved instead of path hiding.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg- xe-3s-book/irg-additional-paths.html
QUESTION 95
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A rib-failure occurs when BGP tries to install the bestpath prefix into the RIB, but the RIB rejects the BGP route because a route with better administrative distance
already exists in the routing table. An inactive Border Gateway Protocol (BGP) route is a route that is not installed in the RIB, but is installed in the BGP table as ribfailure.
Example Topology
Router 1 (R1) and router 2 (R2) have two parallel links; one links runs BGP AS 65535 and the other link runs Enhanced Interior Gateway Routing Protocol (EIGRP)
AS 1. Both BGP and EIGRP are advertising the network 10.1.1.1/32 on R1.
http://www.gratisexam.com/
R2 learns about the 1.1.1.1/32 route through both EIGRP and BGP, but installs only the EIGRP route in the routing table because of the lower administrative
distance. Since the BGP route is not installed in the R2 routing table, the route appears as a rib-failure in the R2 BGP table.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116146- config-bgp-next-hop-00.html
QUESTION 96
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
On R1 the routing table version (Tbl Ver) for 10.1.2.3 is 1, other routers have version 2, so it needs to send an update to the 10.1.2.3 peer.
QUESTION 97
Refer to the exhibit.
http://www.gratisexam.com/
Router A and router B are physically connected over an Ethernet interface, and ISIS is configured as shown. Which option explains why the ISIS neighborship is not
getting formed between router A and router B?
A.
B.
C.
D.
same area ID
same N selector
same domain ID
same system ID
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
With IS-IS, the LSP identifier is derived from the system ID (along with the pseudonode ID and LSP number). Each IS is usually configured with one NET and in one
area; each system ID within an area must be unique.
The big difference between NSAP style addressing and IP style addressing is that, in general, there will be a single NSAP address for the entire router, whereas
with IP there will be one IP address per interface. All ISs and ESs in a routing domain must have system IDs of the same length. All routers in an area must have
the same area address. All Level 2 routers must have a unique system ID domain-wide, and all Level 1 routers must have a unique system ID area-wide.
Reference.
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
QUESTION 98
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
When working with IPv6 prefixes in IS-IS, you can configure IS-IS to be in a single topology for both IPv4 and IPv6 or to run different topologies for IPv4 and IPv6.
By default, IS-IS works in single-topology mode when activating IPv4 and IPv6. This means that the IS-IS topology will be built based on IS Reachability TLVs.
When the base topology is built, then IPv4 prefixes (IP Reachability TLV) and IPv6 prefixes (IPv6 Reachability TLV) are added to each node as leaves, without
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
With IS-IS we will see ES-IS when one of the following is true:
1. One side is configured to send only L2 and another side is configured to send L1. In this case both sides show each-other as ES-IS.
2. There is an MTU Mismatch so we see ES-IS in only one side.
So in this question because we do not know about the other side's "show CLNS neighbor" A must be the better choose.
http://www.gratisexam.com/
QUESTION 100
Refer to the exhibit.
The interface FastEthernet0/1 of both routers R4 and R5 is connected to the same Ethernet segment with a multicast receiver. Which two statements are true?
(Choose two)
A.
B.
C.
D.
Multicast traffic that is destined to a receiver with IP address 192.168.2.6 will flow through router R4.
Both routers R4 and R5 will send PIM join messages to the RP.
Only router R5 will send a multicast join message to the RP.
Multicast traffic that is destined to a receiver with IP address 192.168.2.6 will flow through router R5.
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Even though R4 is the active HSRP router, traffic will flow through R5 and only R5 will send the join messages. The Multicast DR is elected by the higher IP address
or priority. R5 has 192.168.2.2 and R4 has 192.168.2.1. R5 is the DR which send all packets to the RP.
http://www.gratisexam.com/
QUESTION 101
Refer to the exhibit.
This is the configuration of the ASBR of area 110.Which option explains why the remote ABR should not translate the type 7 LSA for the prefix 192.168.0.0/16 into a
type 5 LSA?
A.
B.
C.
D.
The remote ABR translates all type 7 LSA into type 5 LSA, regardless of any option configured in the ASBR.
The ASBR sets the forwarding address to 0.0.0.0 which instructs the ABR not to translate the LSA into a type 5 LSA.
The ASBR originates a type 7 LSA with age equal to MAXAGE 3600.
The ABR clears the P bit in the header of the type 7 LSA for 192.168.0.0/16.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
When external routing information is imported into an NSSA, LSA Type 7 is generated by the ASBR and it is flooded within that area only. To further distribute the
external information, type 7 LSA is translated into type 5 LSA at the NSSA border. The P-bit in LSA Type 7 field indicates whether the type 7 LSA should be
translated. This P-bit is automatically set by the NSSA ABR (also the Forwarding Address (FA) is copied from Type 7 LSA). The P-bit is not set only when the NSSA
ASBR and NSSA ABR are the same router for the area. If bit P = 0, then the NSSA ABR must not translate this LSA into Type 5.
he nssa-only keyword instructs the device to instigate Type-7 LSA with cleared P-bit, thereby, preventing LSA translation to Type 5 on NSSA ABR device.
Note. If a router is attached to another AS and is also an NSSA ABR, it may originate a both a type-5 and a type-7 LSA for the same network. The type-5 LSA will
be flooded to the backbone and the type-7 will be flooded into the NSSA. If this is the case, the P-bit must be reset (P=0) in the type-7 LSA so the type-7 LSA isn't
again translated into a type-5 LSA by another NSSA ABR.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-e/iro- 15-e-book/iro-ospfv3-nssa-cfg.html
QUESTION 102
What is the function of an EIGRP sequence TLV packet?
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
EIGRP sends updates and other information between routers using multicast packets to 224.0.0.10. For example in the topology below, R1 made a change in the
topology and it needs to send updates to R2 & R3. It sends multicast packets to EIGRP multicast address 224.0.0.10. Both R2 & R3 can receive the updates and
acknowledge back to R1 using unicast. Simple, right? But what if R1 sends out updates, only R2 replies but R3 never does? In the case a router sends out a
multicast packet that must be reliable delivered (like in this case), an EIGRP process will wait until the RTO (retransmission timeout) period has passed before
beginning a recovery action. This period is calculated from the SRTT (smooth round-trip time). After R1 sends out updates it will wait for this period to expire. Then
it makes a list of all the neighbors from which it did not receive an Acknowledgement (ACK). Next it sends out a packet telling these routers stop listening to
multicast until they are been notified that it is safe again. Finally the router will begin sending unicast packets with the information to the routers that didn't answer,
continuing until they are caught up. In our example the process will be like this:
1. R1 sends out updates to 224.0.0.10
2. R2 responds but R3 does not
3. R1 waits for the RTO period to expire
4. R1 then sends out an unreliable-multicast packet, called a sequence TLV (Type-Length-Value) packet, which tells R3 not to listen to multicast packets any more
5. R1 continues sending any other muticast traffic it has and delivering all traffic, using unicast to R3, until it acknowledges all the packets
6. Once R3 has caught up, R1 will send another sequence TLV, telling R3 to begin listening to multicast again.
The sequence TLV packet contains a list of the nodes that should not listen to multicast packets while the recovery takes place. But notice that the TLV packet in
step 6 does not contain any nodes in the list.
Note. In the case R3 still does not reply in step 4, R1 will attempt to retransmit the unicast 16 times or continue to retransmit until the hold time for the neighbor in
question expires. After this time, R1 will declare a retransmission limit exceeded error and will reset the neighbor.
(Reference. EIGRP for IP: Basic Operation and Configuration)
QUESTION 103
What are two reasons to define static peers in EIGRP? (Choose two.)
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: AD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
There are two ways we can create EIGRP neighbor relationship:
+ Use "network " command. This is the more popular way to create EIGRP neighbor relationship. That router will check which interfaces whose IP addresses
belong to the and turn EIGRP on that interface. EIGRP messages are sent via multicast packets.
+ Use "neighbor" commanD. The interface(s) that have this command applied no longer send or receive EIGRP multicast packets. EIGRP messages are sent via
unicast. The router only accepts EIGRP packets from peers that are explicitly configured with a neighbor statement. Consequently, any messages coming from
routers without a corresponding neighbor statement are discarded. This helps prevent the insertion of unauthorized routing peers -> A and D are correct.
QUESTION 104
Refer to the exhibit.
http://www.gratisexam.com/
The R3 configuration must include ebgp-multihop to the neighbor statement for R2.
The R2 BGP configuration must include bgp redistribute-internal.
R1 must be configured with next-hop-self for the neighbor going to R2.
The AS numbers configured on R1 and R2 must match.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Whenever you redistribute from BGP to something else, BGP will only advertise externally learned routes. To allow the redistribution of iBGP routes into an interior
gateway protocol such as EIGRP or OSPF, use the bgp redistribute-internal command in router configuration mode.
QUESTION 105
What is the purpose of EIGRP summary leaking?
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
When you do manual summarization, and still you want to advertise some specific routes to the neighbor, you can do that using leak-map. Please read more about
leaking routes here.
http://www.cisco.com/c/en/us/td/docs/ios/iproute_eigrp/command/reference/ire_book/ire_i1.html# wp1037685.
QUESTION 106
Refer to the exhibit.
You have just created a new VRF on PE3. You have enabled debug ip bgp vpnv4 unicast updates on PE1, and you can see the route in the debug, but not in the
BGP VPNv4 table. Which two statements are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
The route target extended community for VPLS auto-discovery defines the import and export policies that a VPLS instance uses. The export route target sets an
extended community attribute number that is appended to all routes that are exported from the VPLS instance. The import route target value sets a filter that
determines the routes that are accepted into the VPLS instance. Any route with a value in its import route target contained in its extended attributes field matching
the value in the VPLS instance's import route target are accepted. Otherwise the route is rejected.
QUESTION 107
Which two DHCP messages are always sent as broadcast? (Choose two.)
A.
B.
C.
D.
E.
DHCPOFFER
DHCPDECLINE
DHCPRELEASE
DHCPREQUEST
DHCPDISCOVER
Correct Answer: DE
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
DHCP discovery
The client broadcasts messages DHCPDISCOVER on the network subnet using the destination address 255.255.255.255 or the specific subnet broadcast address.
DHCP request
In response to the DHCP offer, the client replies with a DHCP request, broadcasts to the server, requesting the offered address. A client can receive DHCP offers
from multiple servers, but it will accept only one DHCP offer.
Reference. http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
QUESTION 108
With which ISs will an ISIS Level 1 IS exchange routing information?
A.
B.
C.
D.
Level 1 ISs
Level 1 ISs in the same area
Level 1 and Level 2 ISs
Level 2 ISs
Correct Answer: B
Section: Layer 3 Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
IS-IS differs from OSPF in the way that "areas" are defined and routed between. IS-IS routers are designated as being: Level 1 (intra-area); Level 2 (inter area); or
Level 1-2 (both). Level 2 routers are inter area routers that can only form relationships with other Level 2 routers. Routing information is exchanged between Level 1
routers and other Level 1 routers, and Level 2 routers only exchange information with other Level 2 routers. Level 1-2 routers exchange information with both levels
and are used to connect the inter area routers with the intra area routers.
Reference. http://en.wikipedia.org/wiki/IS-IS
QUESTION 109
Refer to the exhibit.
Why is the neighbor relationship between R1 & R2 and R1 & R3 an L2-type neighborship?
A.
B.
C.
D.
Correct Answer: A
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
With IS-IS, an individual router is in only one area, and the border between areas is on the link that connects two routers that are in different areas. A Level 2 router
may have neighbors in the same or in different areas, and it has a Level 2 link-state database with all information for inter-area routing. Level 2 routers know about
other areas but will not have Level 1 information from its own area.
Reference.
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
QUESTION 110
Which three statements about the designated router election in IS-IS are true? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
area ID
domain ID
system ID
NSAP selector
MAC address
IP address
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
Intermediate System to Intermediate System (IS-IS) was designed as the routing protocol for ISO's CLNP described in IS0 10589. IS-IS is a Link State routing
protocol akin to OSPF and was developed by DEC for use with DECnet Phase V. It was originally thought that TCP/IP would gradually make way for the seven layer
OSI architecture so an enhancement to IS-IS was developed called Integrated IS-IS also known as Dual IS-IS that could route both Connectionless-Mode Network
Service (CLNS) as well as IP.
Cisco IOS supports IS-IS authentication on 3 different levels; between neighbors, area-wide, and domain-wide, where each can be used by themselves or together.
summary-address address mask {level-1 | level-1-2 | level-2} is used to configure IP address summarization.
References:
http://www.rhyshaden.com/isis.htm
http://mynetworkingwiki.com/index.php/Configuring_IS-IS
QUESTION 113
Which statement describes the function of the tracking object created by the track 10 ip route 192.168.99.0/24 reachability command?
A.
B.
C.
D.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12- 2_52_se/configuration/guide/3560scg/sweot.html
QUESTION 114
Which group of neighbors can be configured as a BGP peer group?
A. a group of iBGP neighbors that have the same outbound route policies
http://www.gratisexam.com/
B. a group of iBGP and eBGP neighbors that have the same inbound distribute-list
C. a group of eBGP neighbors in the same autonomous system that have different outbound route policies
D. a group of iBGP neighbors that have different outbound route policies
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
You can group BGP neighbors who share the same outbound policies together in what is called a BGP peer group. Instead of configuring each neighbor with the
same policy individually, a peer group allows you to group the policies which can be applied to individual peers thus making efficient update calculation along with
simplified configuration.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13755- 29.html
QUESTION 115
Refer to the exhibit.
Notice that debug ip bgp updates have been enabled. What can you conclude from the debug output?
A.
B.
C.
D.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
If you enter the clear ip bgp out command for a BGP peer, that router resends its BGP prefixes to that peer. This does not cause a change in the best path on the
receiving BGP peer. Hence, there is no change in the Table Version on that peer.
http://www.gratisexam.com/
When you run the debug ip bgp updates on the receiving router, you see:
BGP(0): 10.1.3.4 rcvd UPDATE w/ attr: nexthop 10.1.3.4, origin i, metric 0, merged path 4, AS_PATH
BGP(0): 10.1.3.4 rcvd 10.100.1.1/32...duplicate ignored
The received update is recognized as a duplicate, so it is ignored and no best path change occurs.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116511- technote-tableversion-00.html
QUESTION 116
Which set of commands conditionally advertises 172.16.0.0/24 as long as 10.10.10.10/32 is in the routing table?
A.
B.
http://www.gratisexam.com/
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Advertise maps are used for conditional routing to advertise specified prefixes if something which is specified in exist map exists. In our question we need to
advertise 172.16.0.0/24 if 10.10.10.10/32 exists in the routing table so we have to use commanD. "neighbor x.x.x.x advertise- map <prefix-list of 172.16.0.0/24>
exist-map <prefix-list of 10.10.10.10/32>". Therefore B is correct.
QUESTION 117
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Before a BGP speaker installs a route to a network in the main IP routing table, the router must know how to reach the next hop that is used to get to that network.
Route reachability is verified by searching for a route to the next hop in the main IP routing table. Unlike IGP routing protocols, such as EIGRP and OSPF, which
assume that a route is reachable if they learned it through a valid adjacency, BGP does not install routes that it cannot verify as reachable. If a route to the next hop
for a BGP network is found in the main IP routing table, BGP assumes that the network is reachable, and that the particular BGP route might be stored in the main
IP routing table. If the router receives a route to a network that is not reachable, that route continues to be stored in the incoming BGP table, adj-RIB-In, and might
be seen using the show ip bgp command, but is not placed in the main IP routing table.
Reference. https://www.informit.com/library/content.aspx?
b=CCIE_Practical_Studies_II&seqNum=75
QUESTION 118
Which statement about the BGP originator ID is true?
A.
B.
C.
D.
The route reflector always sets the originator ID to its own router ID.
The route reflector sets the originator ID to the router ID of the route reflector client that injects the route into the AS.
The route reflector client that injects the route into the AS sets the originator ID to its own router ID.
The originator ID is set to match the cluster ID.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
An RR reflecting the route received from a RR-Client adds:
1. Originator ID- a 4-byte BGP attribute that is created by the RR. This attribute carries the Router ID of the originator of the route in the local AS. If the update
comes back to the originator, it ignores the update.
2. Cluster List- A Cluster List is a list of Cluster IDs that an update has traversed. When a route reflector sends a route received from a client to a non-client, it
appends the local Cluster ID. If a route reflector receives a route whose Cluster List contains the local Cluster ID, it ignores the update.
Reference. https://sites.google.com/site/amitsciscozone/home/bgp/bgp-route-reflectors
QUESTION 119
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: AD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Prior to January 2009, BGP autonomous system (AS) numbers that were allocated to companies were 2-octet numbers in the range from 1 to 65535 as described
in RFC 4271, A Border Gateway Protocol 4 (BGP-4). Due to increased demand for AS numbers, the Internet Assigned Number Authority (IANA) started to allocate
four-octet AS numbers in the range from 65536 to 4294967295. RFC 5396, Textual Representation of Autonomous System (AS) Numbers, documents three
methods of representing AS numbers. Cisco has implemented the following two methods:
Asplain -- Decimal value notation where both 2-byte and 4-byte AS numbers are represented by their decimal value. For example, 65526 is a 2-byte AS number
and 234567 is a 4-byte AS number.
Asdot -- Autonomous system dot notation where 2-byte AS numbers are represented by their decimal value and 4-byte AS numbers are represented by a dot
notation. For example, 65526 is a 2-byte AS number and 1.169031 is a 4-byte AS number (this is dot notation for the 234567 decimal number).
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg- xe-3s-book/irg-4byte-asn.html
QUESTION 120
Refer to the exhibit.
http://www.gratisexam.com/
bgp update-delay 60
neighbor 10.100.1.1 maximum-prefix 200
neighbor 10.100.1.1 maximum-path 2
neighbor 10.100.1.1 ebgp-multihop 2
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The BGP Maximum-Prefix feature allows you to control how many prefixes can be received from a neighbor. By default, this feature allows a router to bring down a
peer when the number of received prefixes from that peer exceeds the configured Maximum-Prefix limit. This feature is commonly used for external BGP peers, but
can be applied to internal BGP peers also. When the maximum number of prefixes has been received, the BGP sessions closes into the IDLE state.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/25160-bgp- maximum-prefix.html
QUESTION 121
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Here we see that the next hop IP address to reach the 172.16.1.0 network advertised by the BGP peer is 192.168.1.1. However, the 192.168.1.1 IP is not in the
routing table of R3 so it adds the route to the BGP table but marks it as inaccessible, as shown.
QUESTION 122
Consider a network that mixes link bandwidths from 128 kb/s to 40 Gb/s. Which value should be set for the OSPF reference bandwidth?
A.
B.
C.
D.
E.
F.
Correct Answer: C
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
Unlike the metric in RIP which is determined by hop count and EIGRP's crazy mathematical formulated metric, OSPF is a little more simple. The default formula to
calculate the cost for the OSPF metric is (10^8/BW).
By default the metrics reference cost is 100Mbps, so any link that is 100Mbps will have a metric of
1. a T1 interface will have a metric of 64 so in this case if a router is trying to get to a FastEthernet network on a router that is through a T1 the metric would be 65
(64 +1). You do however have the ability to statically specify a metric on a per interface basis by using the ip ospf cost # where the cost is an integer between 165535.
So the big question is why would you want to statically configure a metric?
The biggest advantage of statically configuring an OSPF metric on an interface is to manipulate which route will be chosen dynamically via OSPF. In a nut shell it's
like statically configuring a dynamic protocol to use a specific route. It should also be used when the interface bandwidths vary greatly (some very low bandwidth
interfaces and some very high speed interfaces on the same router).
QUESTION 123
Which statement about a type 4 LSA in OSPF is true?
A.
B.
C.
D.
E.
It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ASBR.
It is an LSA that is originated by an ASBR, that is flooded throughout the AS, and that describes a route to the ASBR.
It is an LSA that is originated by an ASBR, that is flooded throughout the area, and that describes a route to the ASBR.
It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ABR.
It is an LSA that is originated by an ABR, that is flooded throughout the area, and that describes a route to the ASBR.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
LSA Type 4 (called Summary ASBR LSA) is generated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to
external routes through that ASBR.
QUESTION 124
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
Why is the prefix 1.1.1.1/32 not present in the routing table of R1?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A common problem when using Open Shortest Path First (OSPF) is routes in the database don't appear in the routing table. In most cases OSPF finds a
discrepancy in the database so it doesn't install the route in the routing table. Often, you can see the Adv Router is not-reachable message (which means that the
router advertising the LSA is not reachable through OSPF) on top of the link-state advertisement (LSA) in the database when this problem occurs. Here is an
example:
Adv Router is not-reachable
LS agE. 418
Options: (No TOS-capability, DC)
LS TypE. Router Links
Link State ID. 172.16.32.2
Advertising Router: 172.16.32.2
LS Seq Number: 80000002
Checksum: 0xFA63
Length: 60
Number of Links: 3
There are several reasons for this problem, most of which deal with mis-configuration or a broken topology. When the configuration is corrected the OSPF database
discrepancy goes away and the routes appear in the routing table.
Reason 1: Network Type Mismatch
Let's use the following network diagram as an example:
http://www.gratisexam.com/
http://www.gratisexam.com/
http://www.gratisexam.com/
You can see that for subnet 172.16.32.0/24, Router R1-7010 is generating a point-to-point link and Router R4-4K is generating a transit link. This creates a
discrepancy in the link-state database, which means no routes are installed in the routing table.
R1-7010(5)# show ip route
172.16.0.0/16 is variably subnetted, 3 subnets, 2 masks
C 172.16.32.0/24 is directly connected, Serial1/0
C 172.16.30.1/32 is directly connected, Loopback0
Solution
To solve this problem, configure both routers for the same network type. You can either change the network type of Router R1-7010 to broadcast, or change Router
R4-4K's serial interface to point-to- point.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7112- 26.html
QUESTION 125
Which authentication method does OSPFv3 use to secure communication between neighbors?
A.
B.
C.
D.
plaintext
MD5 HMAC
PKI
IPSec
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
In order to ensure that OSPFv3 packets are not altered and re-sent to the device, causing the device to behave in a way not desired by its system administrators,
OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6.
OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API
needed for use with OSPFv3.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro- 15-sy-book/ip6-route-ospfv3-auth-ipsec.html
QUESTION 126
Which three statements are true about OSPFv3? (Choose three.)
A. The only method to enable OSPFv3 on an interface is via the interface configuration mode.
http://www.gratisexam.com/
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The example below shows how to configure EIGRP HMAC-SHA2 on Cisco router:
Device(config)# router eigrp name1
Device(config-router)# address-family ipv4 autonomous-system 45000
Device(config-router-af)# af-interface ethernet 0/0
Device(config-router-af-interface)# authentication mode hmac-sha-256 0 password1
Device(config-router-af-interface)# end
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-sy/ire- 15-sy-book/ire-sha-256.html
QUESTION 129
http://www.gratisexam.com/
How many EIGRP routes will appear in the routing table of R2?
http://www.gratisexam.com/
A.
B.
C.
D.
0
1
2
3
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
EIGRPv6 on R2 was shut down so there is no EIGRP routes on the routing table of R2. If we turn on EIGRPv6 on R2 (with "no shutdown" command) then we would
see the prefix of the loopback interface of R1 in the routing table of R2.
Note. EIGRPv6 requires the "ipv6 unicast-routing" global command to be turned on first or it will not work.
QUESTION 130
Which two configuration changes should be made on the OTP interface of an EIGRP OTP route reflector? (Choose two.)
A. passive-interface
B. no split-horizon
http://www.gratisexam.com/
C. no next-hop-self
D. hello-interval 60, hold-time 180
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The EIGRP Over the Top feature enables a single end-to-end Enhanced Interior Gateway Routing Protocol (EIGRP) routing domain that is transparent to the
underlying public or private WAN transport that is used for connecting disparate EIGRP customer sites. When an enterprise extends its connectivity across multiple
sites through a private or a public WAN connection, the service provider mandates that the enterprise use an additional routing protocol, typically the Border
Gateway Protocol (BGP), over the WAN links to ensure end-to-end routing. The use of an additional protocol causes additional complexities for the enterprise, such
as additional routing processes and sustained interaction between EIGRP and the routing protocol to ensure connectivity, for the enterprise. With the EIGRP Over
the Top feature, routing is consolidated into a single protocol (EIGRP) across the WAN.
Perform this task to configure a customer edge (CE) device in a network to function as an EIGRP Route Reflector:
1. enable
2. configure terminal
3. router eigrp virtual-name
4. address-family ipv4 unicast autonomous-system as-number
5. af-interface interface-type interface-number
6. no next-hop-self
7. no split-horizon
8. exit
9. remote-neighbors source interface-type interface-number unicast-listen lisp-encap
10. network ip-address
11. end
Note. Use no next-hop-self to instruct EIGRP to use the received next hop and not the local outbound interface address as the next hop to be advertised to
neighboring devices. If no next-hop- self is not configured, the data traffic will flow through the EIGRP Route Reflector.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/xe-3s/ire- xe-3s-book/ire-eigrp-over-the-top.html
QUESTION 131
Which statement about the function of poison reverse in EIGRP is true?
A.
B.
C.
D.
It tells peers to remove paths that previously might have pointed to this router.
It tells peers to remove paths to save memory and bandwidth.
It provides reverse path information for multicast routing.
It tells peers that a prefix is no longer reachable.
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Poison Reverse in EIGRP states: "Once you learn of a route through an interface, advertise it as unreachable back through that same interface". For more
information please read here. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol- eigrp/16406-eigrp-toc.html#splithorizon.
QUESTION 132
What is the preferred method to improve neighbor loss detection in EIGRP?
A.
B.
C.
D.
EIGRP natively detects neighbor down immediately, and no additional feature or configuration is required.
BFD should be used on interfaces that support it for rapid neighbor loss detection.
Fast hellos (subsecond) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.
Fast hellos (one-second hellos) are preferred for EIGRP, so that it learns rapidly through its own mechanisms.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a
single, standardized method of link/device/protocol failure detection at any protocol layer and over any media.
Reference. "Bidirectional Forwarding Detection for EIGRP"
http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper0900aecd8 0243fe7.html
QUESTION 133
How does EIGRP derive the metric for manual summary routes?
A.
B.
C.
D.
It uses the best composite metric of any component route in the topology table.
It uses the worst composite metric of any component route in the topology table.
It uses the best metric vectors of all component routes in the topology table.
It uses the worst metric vectors of all component routes in the topology table.
Correct Answer: A
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
For example if your router has a routing table like this:
Now suppose you want to manually summarize all the routes above, you can use this command (on the router that advertised these routes to our router):
Router(config-if)#ip summary-address eigrp 1 192.168.8.0 255.255.248.0
After that the routing table of your router will look like this:
D 192.168.8.0/21 [90/2195456] via 192.168.0.1, 00:01:42, Serial0/0
And we can see the manual summary route takes the smallest metric of the specific routes.
QUESTION 134
Refer to the exhibit.
Which part of the joined group addresses list indicates that the interface has joined the EIGRP multicast group address?
http://www.gratisexam.com/
A.
B.
C.
D.
FF02::1
FF02::1:FF00:200
FF02::A
FF02::2
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
FF02::A is an IPv6 link-local scope multicast addresses. This address is for all devices on a wire that want to "talk" EIGRP with one another.
Focusing specifically on FF02::A and how routers join it, we can see and say three things:
Local: FF02::A is local to the wire.
Join: Each device "joins" FF02::A by just "deciding to listen" to the IPv6 link-local scope multicast address FF02::A. Then, by extension, it listens to the
corresponding MAC address for that multicast IPv6 address (33:33:00:00:00:0A).
Common interest: As we can see, these varying groups have something in common that they would all like to hear about. For FF02::A, the common interest -the "connection" among the devices joining that group is that they all want to listen to or participate in EIGRP.
Reference. http://www.networkcomputing.com/networking/understanding-ipv6-what-is-solicited- node-multicast/a/d-id/1315703
QUESTION 135
EIGRP allows configuration of multiple MD5 keys for packet authentication to support easy rollover from an old key to a new key. Which two statements are true
regarding the usage of multiple authentication keys? (Choose two.)
A.
B.
C.
D.
Received packets are authenticated by the key with the smallest key ID.
Sent packets are authenticated by all valid keys, which means that each packet is replicated as many times as the number of existing valid keys.
Received packets are authenticated by any valid key that is chosen.
Sent packets are authenticated by the key with the smallest key ID.
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Suppose two routers are connected with each other via Fa0/0 interfaces and they are configured to authenticate via MD5. Below is a simple configuration on both
routers so that they will work:
Router1(config)#key chain KeyChainR1
http://www.gratisexam.com/
Router1(config-keychain)#key 1
Router1(config-keychain-key)#key-string FirstKey
Router1(config-keychain-key)#key 2
Router1(config-keychain-key)#key-string SecondKey
Router2(config)#key chain KeyChainR2
Router2(config-keychain)#key 1
Router2(config-keychain-key)#key-string FirstKey
Router2(config-keychain-key)#key 2
Router2(config-keychain-key)#key-string SecondKey
Apply these key chains to R1 & R2:
Router1(config)#interface fastEthernet 0/0
Router1(config-if)#ip authentication mode eigrp 1 md5
Router1(config-if)#ip authentication key-chain eigrp 1 KeyChainR1 Router2(config)#interface fastEthernet 0/0
Router2(config-if)#ip authentication mode eigrp 1 md5
Router2(config-if)#ip authentication key-chain eigrp 1 KeyChainR2
There are some rules to configure MD5 authentication with EIGRP:
+ The key chain names on two routers do not have to match (in this case the name "KeyChainR1 & "KeyChainR2 do not match)
+ The key number and key-string on the two potential neighbors must match (for example "key 1 & "key-string FirstKey" must match on "key 1" & "key-string
FirstKey" of neighboring router) Also some facts about MD5 authentication with EIGRP
+ When sending EIGRP messages the lowest valid key number is used -> D is correct.
+ When receving EIGRP messages all currently configured valid keys are verified but the lowest valid one will be used -> Although answer C does not totally
mention like that but it is the most suitable answer because A and B are totally wrong.
Answer A is not correct because we need valid key to authenticate. As mentioned above, although answer C is not totally correct but it puts some light on why
answer B is not correct: each packet is NOT "replicated as many times as the number of existing valid keys". All currently configured valid keys are verified but the
lowest valid one will be used.
QUESTION 136
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
interface FastEthernet0/1
ip ospf mtu-ignore
!
D. R1
!
no router ospf 1
router ospf 10
network 10.1.1.5 0.0.0.0 area 0
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Because the passive interface default command is used, by default all interfaces are passive and no neighbors will form on these interfaces. We need to disable
passive interface on the link to R2 by using the "no passive-interface Fastethernet0/0" on R1 under OSPF.
QUESTION 137
Refer to the exhibit.
Which two statements about the device that generated the output are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: AD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
In this example we can see that the s, T, and I flags are set. Here is a list of the flags and their meanings:
show ip mroute Field Descriptions
http://www.gratisexam.com/
http://www.gratisexam.com/
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_ssm.html
QUESTION 138
Refer to the exhibit.
http://www.gratisexam.com/
Which three statements about the output are true? (Choose three.)
A. This switch is currently receiving a multicast data stream that is being forwarded out VLAN 150.
B. A multicast receiver has requested to join one or more of the multicast groups.
http://www.gratisexam.com/
C.
D.
E.
F.
Group 224.0.1.40 is a reserved address, and it should not be used for multicast user data transfer.
One or more multicast groups are operating in PIM dense mode.
One or more of the multicast data streams will be forwarded out to neighbor 10.85.20.20.
Group 239.192.1.1 is a reserved address, and it should not be used for multicast user data transfer.
In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the PIM rendezvous point.
In a BIDIR-PIM network, the RPF interface can be the interface that is used to reach the PIM rendezvous point or the interface that is used to reach the source.
In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the source.
There is no RPF interface concept in BIDIR-PIM networks.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
RPF stands for "Reverse Path Forwarding". The RPF Interface of a router with respect to an address is the interface that the MRIB indicates should be used to
reach that address. In the case of a BIDIR-PIM multicast group, the RPF interface is determined by looking up the Rendezvous Point Address in the MRIB. The
RPF information determines the interface of the router that would be used to send packets towards the Rendezvous Point Link for the group.
Reference. https://tools.ietf.org/html/rfc5015
QUESTION 140
Which technology is an application of MSDP, and provides load balancing and redundancy between the RPs?
http://www.gratisexam.com/
A.
B.
C.
D.
static RP
PIM BSR
auto RP
anycast RP
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Using Anycast RP is an implementation strategy that provides load sharing and redundancy in Protocol Independent Multicast sparse mode (PIM-SM) networks.
Anycast RP allows two or more rendezvous points (RPs) to share the load for source registration and the ability to act as hot backup routers for each other.
Multicast Source Discovery Protocol (MSDP) is the key protocol that makes Anycast RP possible.
Reference.
www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/anycast.html
QUESTION 141
Which two statements are true about IPv6 multicast? (Choose two.)
A.
B.
C.
D.
Receivers interested in IPv6 multicast traffic use IGMPv6 to signal their interest in the IPv6 multicast group.
The PIM router with the lowest IPv6 address becomes the DR for the LAN.
An IPv6 multicast address is an IPv6 address that has a prefix of FF00::/8.
The IPv6 all-routers multicast group is FF02:0:0:0:0:0:0:2.
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Multicast addresses in IPv6 have the prefix ff00::/8.
http://www.gratisexam.com/
Reference. http://en.wikipedia.org/wiki/Multicast_address
QUESTION 142
DRAG DROP
Drag and drop the IPv6 address on the left to the correct IPv6 address type on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
QUESTION 146
DRAG DROP
Drag and drop the router preference on the left to the correct routing sequence (from most preferred to least preferred) on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 147
DRAG DROP
Drag and drop the OSPF network type on the left to the correct traffic type category on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Which two pieces of information in this Wireshark capture indicate that you are viewing EIGRP traffic? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
EIGRP uses protocol number 88, which shows as EIGRP in the capture. Also, we in the capture that the destination IP address is 224.0.0.10, which is the
Enhanced Interior Gateway Routing Protocol (EIGRP) group address is used to send routing information to all EIGRP routers on a network segment.
QUESTION 149
When BGP route reflectors are used, which attribute ensures that a routing loop is not created?
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
weight
local preference
multiexit discriminator
originator ID
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
As the iBGP learned routes are reflected, routing information may loop. The route reflector model has the following mechanisms to avoid routing loops:
Originator ID is an optional, nontransitive BGP attribute. It is a 4-byte attributed created by a route reflector. The attribute carries the router ID of the originator of
the route in the local autonomous system. Therefore, if a misconfiguration causes routing information to come back to the originator, the information is ignored.
Cluster-list is an optional, nontransitive BGP attribute. It is a sequence of cluster IDs that the route has passed. When a route reflector reflects a route from its
clients to nonclient peers, and vice versa, it appends the local cluster ID to the cluster-list. If the cluster-list is empty, a new cluster-list is created. Using this
attribute, a route reflector can identify if routing information is looped back to the same cluster due to misconfiguration. If the local cluster ID is found in the
cluster-list, the advertisement is ignored.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfbgp.html
QUESTION 150
Refer to the exhibit.
http://www.gratisexam.com/
It forces the CE router to use a backup link instead of sending traffic via MPLS VPN.
It informs the PE router that the LSA metric has been recently decreased to 1 and that partial SPF calculation cannot be delayed.
It forces the CE router to install the LSA with the downward bit set into its routing table as a discard route.
It informs the PE router that the LSA was already redistributed into BGP by another PE router and that the LSA must not be redistributed into BGP again.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
From RFC 4577, specifically section 4.2.5.1
When a type 3 LSA is sent from a PE router to a CE router, the DN bit [OSPF-DN] in the LSA Options field MUST be set. This is used to ensure that if any CE
router sends this type 3 LSA to a PE router, the PE router will not redistribute it further.
When a PE router needs to distribute to a CE router a route that comes from a site outside the latter's OSPF domain, the PE router presents itself as an ASBR
(Autonomous System Border Router), and distributes the route in a type 5 LSA. The DN bit [OSPF-DN] MUST be set in these LSAs to ensure that they will be
ignored by any other PE routers that receive them.
http://www.gratisexam.com/
QUESTION 151
Which regular expression will match prefixes that originated from AS200?
A.
B.
C.
D.
E.
^$
^200_
_200$
^200)
_200_
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Example on how to deny all prefixes originated in Autonomous System 200
router bgp 100
neighbor 10.1.1.1 remote-as 65535
neighbor 10.1.1.1 route-map map1 in
!
route-map map1 permit 10
match as-path 1
!
ip as-path access-list 5 deny _200$
ip as-path access-list 5 permit .*
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/termserv/configuration/guide/12_4t/tsv_12_4t_book/tsv_r eg_express.html
QUESTION 152
Which statement describes the difference between a stub area and a totally stub area?
A. The ABR advertises a default route to a totally stub area and not to a stub area.
B. Stub areas do not allow LSA types 4 and 5, while totally stub areas do not allow LSA types 3, 4, and 5.
C. Totally stub areas allow limited external routes in the area via a special type 7 LSA, while stub .
areas do not
D. Stub areas do not allow external LSAs, ASBR summary LSAs, or summary LSAs with the exception of a default route originated by the ABR via a summary
LSA.
Correct Answer: B
http://www.gratisexam.com/
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
IS-IS runs directly over the data link alongside IP. On Ethernet, IS-IS packets are always 802.3 frames, with LSAPs 0xFEFE while IP packets are either Ethernet II
frames or SNAP frames identified with the protocol number 0x800. OSPF runs over IP as protocol number 89.
IS-IS runs directly over layer 2 and hence:
- cannot support virtual links unless some explicit tunneling is implemented
- packets are kept small so that they don't require hop-by-hop fragmentation
- uses ATM/SNAP encapsulation on ATM but there are hacks to make it use VcMux encapsulation
- some operating systems that support IP networking have been implemented to differentiate Layer 3 packets in kernel. Such Oss require a lot of kernel
modifications to support IS-IS for IP routing.
- can never be routed beyond the immediate next hop and hence shielded from IP spoofing and similar Denial of Service attacks.
Reference. https://tools.ietf.org/html/draft-bhatia-manral-diff-isis-ospf-00
QUESTION 154
http://www.gratisexam.com/
Which command do you use to connect a dense-mode domain to a sparse-mode multicast domain?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
For IP PIM multicast, Cisco recommends Sparse-Mode over Dense-Mode. In the midst of our network migration, we have a new network operating in Sparse-Mode
with Anycast rendezvous point (RP) but our existing network is still operating in Dense-Mode. To bridge two different modes across both PIM domains, we should
use the ip pim dense-mode proxy-register command on the interface leading toward the bordering dense mode region. This configuration will enable the border
router to register traffic from the dense mode region (which has no concept of registration) with the RP in the sparse mode domain.
Reference. http://networkerslog.blogspot.com/2010/12/bridging-dense-mode-pim-to-sparse- mode.html
QUESTION 155
Which two statements about the function of a PIM designated router are true? (Choose two.)
A.
B.
C.
D.
E.
It forwards multicast traffic from the source into the PIM network.
It registers directly connected sources to the PIM rendezvous point.
It sends PIM Join/Prune messages for directly connected receivers.
It sends IGMP queries.
It sends PIM asserts on the interfaces of the outgoing interface list.
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
In PIM ASM and SSM modes, the software chooses a designated router (DR) from the routers on each network segment. The DR is responsible for forwarding
multicast data for specified groups and sources on that segment.
In ASM mode, the DR is responsible for unicasting PIM register packets to the RP. When a DR receives an IGMP membership report from a directly connected
receiver, the shortest path is formed to the RP, which may or may not go through the DR. The result is a shared tree that connects all sources transmitting on the
http://www.gratisexam.com/
IP packets with a TTL count in the header that is equal to or greater than 253
IP packets with a TTL count in the header that is equal to 253
IP packets with a TTL count in the header that is equal to or greater than 2
IP packets with a TTL count in the header that is equal to 2
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_btsh.html
QUESTION 157
Refer to the exhibit.
http://www.gratisexam.com/
A tunnel is configured between R3 to R4 sourced with their loopback interfaces. The ip pim sparse- dense mode command is configured on the tunnel interfaces
and multicast-routing is enabled on R3 and R4. The IP backbone is not configured for multicast routing.
The RPF check has failed toward the multicast source.
Which two conditions could have caused the failure? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
For a successful RPF verification of multicast traffic flowing over the shared tree (*,G) from RP, an ip mroute rp-address nexthop command needs to be
configured for the RP address, that points to the tunnel interface.
http://www.gratisexam.com/
1
4
8
16
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
By default, EIGRP load-shares over four equal-cost paths. For load sharing to happen, the routes to load-share over must show up in the IP forwarding table or with
the show ip route command. Only when a route shows up in the forwarding table with multiple paths to it will load sharing occur.
Reference. http://www.informit.com/library/content.aspx?
b=CCIE_Practical_Studies_I&seqNum=126
QUESTION 159
When EIGRP is used as the IPv4 PE-CE protocol, which two requirements must be configured before the BGP IPv4 address family can be configured? (Choose
two.)
A.
B.
C.
D.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A VRF must be created, and a route distinguisher and route target must be configured in order for the PE routers in the BGP network to carry EIGRP routes to the
http://www.gratisexam.com/
EIGRP CE site. The VRF must also be associated with an interface in order for the PE router to send routing updates to the CE router.
Prerequisites
Before this feature can be configured, MPLS and CEF must be configured in the BGP network, and multiprotocol BGP and EIGRP must be configured on all PE
routers that provide VPN services to CE routers.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/seipecec.html#wp1083316
QUESTION 160
Which three EIGRP packet types are valid? (Choose three.)
A.
B.
C.
D.
E.
F.
open
notification
keep-alive
hello
query
reply
http://www.gratisexam.com/
C. redistributed
D. invalid
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A topology table entry for a destination can have one of two states. A route is considered in the Passive state when a router is not performing a route recomputation.
The route is in Active state when a router is undergoing a route recomputation. If there are always feasible successors, a route never has to go into Active state and
avoids a route recomputation.
When there are no feasible successors, a route goes into Active state and a route recomputation occurs. A route recomputation commences with a router sending
a query packet to all neighbors. Neighboring routers can either reply if they have feasible successors for the destination or optionally return a query indicating that
they are performing a route recomputation. While in Active state, a router cannot change the next-hop neighbor it is using to forward packets. Once all replies are
received for a given query, the destination can transition to Passive state and a new successor can be selected.
Reference. http://docwiki.cisco.com/wiki/Enhanced_Interior_Gateway_Routing_Protocol
QUESTION 162
Refer to the exhibit.
http://www.gratisexam.com/
If EIGRP is configured between two routers as shown in this output, which statement about their EIGRP relationship is true?
A.
B.
C.
D.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The 5 K values used in EIGRP are:
K1 = Bandwidth modifier
K2 = Load modifier
K3 = Delay modifier
http://www.gratisexam.com/
K4 = Reliability modifier
K5 = Additional Reliability modifier
However, by default, only K1 and K3 are used (bandwidth and delay). In this output we see that K1, K3, and K4 (Reliability) are all set.
QUESTION 163
Which type of OSPF packet is an OSPF link state update packet?
A.
B.
C.
D.
E.
type 1
type 2
type 3
type 4
type 5
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Link State Update packets are OSPF packet type 4. These packets implement the flooding of link state advertisements. Each Link State Update packet carries a
collection of link state advertisements one hop further from its origin. Several link state advertisements may be included in a single packet.
Reference. http://www.freesoft.org/CIE/RFC/1583/107.htm
QUESTION 164
If two OSPF type 3 prefixes have the same metric, and are within the same process, which prefix(es) are installed into the routing table?
A.
B.
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
OSPF allows multiple equal-cost paths to the same destination. Since all link-state information is flooded and used in the SPF calculation, multiple equal cost paths
can be computed and used for routing, and each route will be installed in the routing table.
QUESTION 165
Which OSPF feature supports LSA rate limiting in milliseconds to provide faster convergence?
A.
B.
C.
D.
LSA throttling
incremental SPF
fast hello
SPF tuning
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The OSPF Link-State Advertisement (LSA) Throttling feature provides a dynamic mechanism to slow down link-state advertisement (LSA) updates in OSPF during
times of network instability. It also allows faster Open Shortest Path First (OSPF) convergence by providing LSA rate limiting in milliseconds.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsolsath.html
QUESTION 166
Which two options are BGP attributes that are updated when router sends an update to its eBGP peer? (Choose two.)
A.
B.
C.
D.
weight
local preference
AS_path
next-hop
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
AS_Path describes the inter-AS path taken to reach a destination. It gives a list of AS Numbers traversed when reaching to a destination. Every BGP speaker when
advertising a route to a peer will include its own AS number in the NLRI. The subsequent BGP speakers who advertise this route will add their own AS number to
the AS_Path, the subsequent AS numbers get prepended to the list. The end result is the AS_Path attribute is able to describe all the autonomous systems it has
traversed, beginning with the most recent AS and ending with the originating AS.
http://www.gratisexam.com/
NEXT_HOP Attribute specifies the next hop IP address to reach the destination advertised in the NLRI. NEXT_HOP is a well-known mandatory attribute that is
included in every eBGP update.
Reference. http://netcerts.net/bgp-path-attributes-and-the-decision-process/
QUESTION 167
Refer to the exhibit.
If ISIS is configured utilizing default metrics, what is the cost for Router 4 to reach the 10.2.2.0/24 network?
A.
B.
C.
D.
1
20
30
63
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
By default, every link is an IS-IS network has a metric of 10.
QUESTION 168
Refer to the exhibit.
Which three statements about this configuration are true? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Which route type is displayed when you enter the command show ip route supernets-only on a device with this configuration?
A.
B.
C.
D.
E.
Connected
OSPF
RIP
EIGRP
An empty route set
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
This command shows supernets only; it does not show subnets. In this case, the routing table would contain the 10.0.0.0/24 subnet, but not the 10.0.0.0/8 supernet.
QUESTION 170
Which statement about passive interfaces is true?
A.
B.
C.
D.
The interface with the OSPF passive interface configuration appears as a not-so-stubby network.
The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets.
The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units.
Passive interface can be configured on the interface for IS-IS.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
With IS-IS, passive interfaces are used to prevent unnecessary LSA packets out that interface, but the IP address of passive interfaces are still included in updates
going out the other interfaces. This behavior is what enables the best practice of configuring loopback interfaces as passive, but still having the loopback be
reachable.
QUESTION 171
Refer to the exhibit.
Which two routes are included in the route update? (Choose two.)
A.
B.
C.
D.
10.3.0.0
10.3.2.0
10.3.4.0
10.3.6.0
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
This access list will permit the 10.3.4.0, 10.3.5.0, 10.3.6.0, and 10.3.7.0 subnets.
QUESTION 172
Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.)
A.
B.
C.
D.
It is used in IS-IS.
It is used in OSPF.
It is used in EIGRP.
It is used for accepting TLV.
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
area range
To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use the no form of
this command.
Syntax Description
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf.html#w p1017596
QUESTION 174
Packets from a router with policy-based routing configured are failing to reach the next hop.
Which two additions can you make to the router configuration to enable the packets to flow correctly? (Choose two.)
A.
B.
C.
D.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Here is an example:
Router(config)#route-map Engineers permit 20
Router(config-route-map)#match ip address 2
Router(config-route-map)#set interface Ethernet1
Here, instead of specifying a next-hop, it specifies that any packets matching this rule will be forwarded directly out the interface Ethernet1. This means that either
http://www.gratisexam.com/
the destination device must be on this segment, or there must be a router configured with Proxy ARP that can forward the packet to the ultimate destination.
QUESTION 175
Which two options are EIGRP route authentication encryption modes? (Choose two.)
A.
B.
C.
D.
MD5
HMAC-SHA-256bit
ESP-AES
HMAC-AES
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Packets exchanged between neighbors must be authenticated to ensure that a device accepts packets only from devices that have the same preshared
authentication key. Enhanced Interior Gateway Routing Protocol (EIGRP) authentication is configurable on a per-interface basis; this means that packets
exchanged between neighbors connected through an interface are authenticated. EIGRP supports message digest algorithm 5 (MD5) authentication to prevent the
introduction of unauthorized information from unapproved sources. MD5 authentication is defined in RFC 1321. EIGRP also supports the Hashed Message
Authentication Code-Secure Hash Algorithm-256 (HMAC-SHA-256) authentication method.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/xe-3s/ire- xe-3s-book/ire-sha-256.html
QUESTION 176
Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link- layer address of the neighbor is known?
A.
B.
C.
D.
neighbor solicitation
neighbor advertisement
router advertisement
router solicitation
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
IPv6 Neighbor Solicitation Message
A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when
http://www.gratisexam.com/
a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer
address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The
destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The
neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 184
Refer to the exhibit.
Which action must you take to enable full reachability from router C to router D?
A.
B.
C.
D.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
For full connectivity, we need to configure mutual redistribution to advertise the EIGRP routes into OSPF and to advertise the OSPF routes into the EIGRP network.
This needs to be done at the two border routers that connect to both the EIGRP and OSPF domains.
QUESTION 185
Refer to the exhibit.
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Here we can see that this router is running out of memory due to the large size of the BGP routing database. In this case, this router is receiving over 200,000
routes from each of the 4 peers.
QUESTION 186
Refer to the exhibit.
This is the expected output when the interface Ethernet0/0 of R1 is configured with OSPF Priority 0.
There is a duplicate router ID.
There is an MTU mismatch.
There is an OSPF timer (hello/dead) mismatch.
This is the expected output when R1 is the DR.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
Sometimes it is desirable for a router to be configured so that it is not eligible to become the DR or BDR. You can do this by setting the OSPF priority to zero with
the ip ospf priority priority# interface subcommand. If two OSPF neighbors both have their OSPF interface priority set to zero, they establish two-way adjacency
instead of full adjacency.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13683- 11.html
QUESTION 187
In a nonbackbone OSPF area, all traffic that is destined to the Internet is routed by using a default route that is originated by the ABR. Which change in the
configuration of the OSPF area type causes traffic from that area that is destined to the Internet to be dropped?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The ABR for the NSSA generates the default route, but not by default. To force the ABR to generate the default route, use the area <area id> nssa defaultinformation originate command. The ABR generates a Type 7 LSA with the link-state ID 0.0.0.0 and is advertised inside the NSSA. This default route will be
propagated inside the NSSA as Type 7 LSA
Reference. http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13692- 21.html#nssas
QUESTION 188
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
When the link between RtrB and RtrC goes down, multicast receivers stop receiving traffic from the source for multicast group 229.1.1.1.Which solution will resolve
this?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
For multicast traffic to flow, PIM must be enabled on all routers in the path of the multicast stream.
http://www.gratisexam.com/
QUESTION 189
Which measure does ISIS use to avoid sending traffic with a wrong MTU configuration?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Intermediate System-to-Intermediate System (IS-IS) hellos are padded to the full maximum transmission unit (MTU) size. The benefit of padding IS-IS Hellos (IIHs)
to the full MTU is that it allows for early detection of errors due to transmission problems with large frames or due to mismatched MTUs on adjacent interfaces.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to- intermediate-system-is-is/47201-isis-mtu.html
QUESTION 190
Which regular expression will match prefixes from the AS 200 that is directly connected to our AS?
A.
B.
C.
D.
E.
^$
^200)
_200$
_200_
^200_
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/termserv/configuration/guide/12_4t/tsv_12_4t_book/tsv_r eg_express.html
QUESTION 191
Refer to the exhibit.
Assuming that the peer is configured correctly and the interface is up, how many neighbors will be seen in the EIGRPv6 neighbor table on this IPv6-only router?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
one neighbor, which will use a local router-id of 6010. AB8. . /64
one neighbor, which will use a local router-id of 6020. AB8. . /64
none, because EIGRPv6 only supports authenticated peers
none, because of the mismatch of timers
none, because there is no EIGRP router ID configured
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Configuring EIGRP for IPv6 has some restrictions; they are listed below:
The interfaces can be directly configured with EIGRP for IPv6, without the use of a global IPv6 address. There is no network statement in EIGRP for IPv6.
The router ID needs to be configured for an EIGRPv6 protocol instance before it can run.
EIGRP for IPv6 has a shutdown feature. Ensure that the routing process is in "no shut" mode to start running the protocol.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing- protocol-eigrp/113267-eigrp-ipv6-00.html
QUESTION 192
What does a nonzero forwarding address indicate in a type-5 LSA?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The value of the forwarding address specified by the autonomous system boundary router (ASBR) can be either 0.0.0.0 or non-zero. The 0.0.0.0 address indicates
that the originating router (the ASBR) is the next hop. The forwarding address is determined by these conditions:
The forwarding address is set to 0.0.0.0 if the ASBR redistributes routes and OSPF is not enabled on the next hop interface for those routes.
These conditions set the forwarding address field to a non-zero address:
OSPF is enabled on the ASBR's next hop interface AND
http://www.gratisexam.com/
internal routes that are learned from a peer that is outside the range of local network statements
external routes that are learned from a peer that is inside the range of local network statements
locally created routes that are outside the range of local network statements
external routes that are learned from a peer that is outside the range of local network statements
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Auto-Summarization of External Routes
EIGRP will not auto-summarize external routes unless there is a component of the same major network that is an internal route. To illustrate, let us look at Figure
15.
Router Three is injecting external routes to 192.1.2.0/26 and 192.1.2.64/26 into EIGRP using the redistribute connected command, as shown in the configurations
below.
Router Three
interface Ethernet0
http://www.gratisexam.com/
http://www.gratisexam.com/
....
10.0.0.0/8 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0
D 192.1.2.0/24 [90/11023872] via 10.1.50.2, 00:00:36, Serial0
Reference. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing- protocol-eigrp/16406-eigrp-toc.html
QUESTION 194
Refer to the exhibit.
How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15?
A.
B.
C.
D.
No action is required, since Gig0/0 is not listed with a nondefault hello and hold time.
Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface Gig0/0.
Add the commands hello-interval 5 and hold-time 15 under "af-interface Gig0/0" under the address family.
Add the commands default hello-interval and default hold-time under the af-interface Gig0/0 statement under the address family.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
To configure the hello interval for an interface, use the hello-interval command in interface configuration mode
To configure the hold time for an interface, use the hold-time command in interface configuration mode.
Reference. http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 1/routing/command/reference/b_routing_cr41crs/
b_routing_cr41crs_chapter_010.html#wp2323069
QUESTION 195
What is the range of addresses that is used for IPv4-mapped IPv6 addresses?
A.
B.
C.
D.
E.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
IPv4-Mapped Addresses
::FFFF:0:0/96 are the IPv4-mapped addresses [RFC4291]. Addresses within this block should not appear on the public Internet.
Reference. https://tools.ietf.org/html/rfc5156
QUESTION 196
Which statement about the overload bit in IS-IS is true?
A.
B.
C.
D.
The IS-IS adjacencies on the links for which the overload bit is set are brought down.
Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic.
A router setting the overload bit becomes unreachable to all other routers in the IS-IS area.
The overload bit in IS-IS is used only for external prefixes.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must
faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic
towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit
comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks)
addresses on an "overloaded" router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this
router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding
transit traffic.
Reference. https://routingfreak.wordpress.com/category/ospf-vs-is-is/
QUESTION 197
Refer to the exhibit.
R2 is directly connected to the receiver for this group and is the winner of an assert mechanism.
R2 is directly connected to the receiver for this group, and it forwards the traffic onto Ethernet3/0, but it is forwarding duplicate traffic onto Ethernet3/0.
R2 has the A flag (Accept flag) set on Ethernet 3/0. This is fine, since the group is in BIDIR PIM mode.
R2 is directly connected to the receiver for this group and is the loser of an assert mechanism.
The A flag is set until the SPT threshold is reached for this multicast group.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
show ip mroute Field Descriptions
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult3.html
QUESTION 198
Which three statements about IS-IS are true? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
QUESTION 199
Refer to the exhibit.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The following is sample output from the show ip rpf command in a Multi-Topology Routing (MTR) routing environment. In Cisco IOS releases that support MTR, the
"RPF topology" field was introduced to indicate which RIB topology is being used for the RPF lookup. For the "RPF topology" field in this example, the first topology
listed (ipv4 multicast base) indicates where the nexthop of the RPF lookup is being conducted and the second topology listed (ipv4 unicast data) indicates where the
route originated from.
Router# show ip rpf 10.30.30.32
RPF information for ? (10.30.30.32)
RPF interfacE. Ethernet1/0
RPF neighbor: ? (10.1.1.32)
RPF route/mask: 10.30.30.32/32
RPF typE. unicast (ospf 100)
Doing distance-preferred lookups across tables
RPF topology: ipv4 multicast base, originated from ipv4 unicast data
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network, one or more end (stub) networks are connected to a remote
router (the spoke) that is connected to one or more distribution routers (the hub). The remote router is adjacent only to one or more distribution routers. The only
route for IP traffic to follow into the remote router is through a distribution router. This type of configuration is commonly used in WAN topologies where the
distribution router is directly connected to a WAN. The distribution router can be connected to many more remote routers. Often, the distribution router will be
connected to 100 or more remote routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a distribution router, so it becomes
unnecessary for the remote router to hold a complete routing table. Generally, the distribution router need not send anything more than a default route to the remote
router.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/eigrpstb.html
QUESTION 201
Which BGP feature allows BGP routing tables to be refreshed without impacting established BGP sessions?
A.
B.
C.
D.
BGP synchronization
soft reconfiguration
confederations
hard reset
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Clearing a BGP session using a hard reset invalidates the cache and results in a negative impact on the operation of networks as the information in the cache
becomes unavailable.
Soft reset is recommended because it allows routing tables to be reconfigured and activated without clearing the BGP session. Soft reset is done on a per-neighbor
basis.
Reference.
http://www.cisco.com/en/US/products/ps6599/products_data_sheet09186a0080087b3a.html
QUESTION 202
Which two options describe two functions of a neighbor solicitation message? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Neighbor solicitation messages are sent on the local link when a node wants to determine the link- layer address of another node on the same local link (see the
figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of
the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that
corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor advertisement message, which has a value of 136 in the Type
field of the ICMP packet header, on the local link. The source address in the neighbor advertisement message is the IPv6 address of the node (more specifically,
the IPv6 address of the node interface) sending the neighbor advertisement message. The destination address in the neighbor advertisement message is the IPv6
http://www.gratisexam.com/
address of the node that sent the neighbor solicitation message. The data portion of the neighbor advertisement message includes the link-layer address of the
node sending the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node can communicate.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b- xe-3s-book/ip6-neighb-disc-xe.html
QUESTION 203
Which three options are three of the default EIGRP administrative distances? (Choose three.)
A.
B.
C.
D.
E.
F.
Internal, 90
External, 170
Summary, 5
Outside Local, 100
Inside Local, 180
Inside Global, 1
http://www.gratisexam.com/
Reference. http://en.wikipedia.org/wiki/Administrative_distance
QUESTION 204
Refer to the exhibit.
http://www.gratisexam.com/
Which two statements about this route table are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
IBGP routes have an Administrative distance of 200, while EBGP have an AD of 20. Here we see that the BGP routes have an AD value of 200.
With OSPF, external routes fall under two categories, external type 1 and external type 2. The difference between the two is in the way the cost (metric) of the route
is being calculated. The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A type 1 cost is the addition of the
external cost and the internal cost used to reach that route. The metric for E2 routes do not change when advertising to other routers.
QUESTION 205
Refer to the exhibit.
http://www.gratisexam.com/
Which two statements about this configuration are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
In this example, the prefix list is configured to only allow the two specific routes of 172.16.0.0/16 and the default route. Any other routes will be filtered.
QUESTION 206
Refer to the exhibit.
http://www.gratisexam.com/
R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration changes can you make to ensure that R1 can reach all routes from R2?
(Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
In this example, the access list is using a 0.0.3.255 wildcard mask, so only the loopback IP's of 172.16.0.0 172.16.3.255 will be included. We need to add another
statement to allow loopback 4 to be advertised, or modify the wildcard mask to include them all.
QUESTION 207
http://www.gratisexam.com/
R1, R2, and R3 have full network connectivity to each other, but R2 prefers the path through R3 to reach network 172.17.1.0/24. Which two actions can you take so
that R2 prefers the path through R1 to reach 172.17.1.0/24? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
http://www.gratisexam.com/
Asynchronous mode requires half as many packets as Demand mode for failure detection.
Asynchronous mode can be used in place of the echo function.
Asynchronous mode supports a larger number of BFD sessions.
Asynchronous mode requires one fourth as many packets as Demand mode for failure detection.
Asynchronous mode's round-trip jitter is less than that of Demand mode.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Pure Asynchronous mode is advantageous in that it requires half as many packets to achieve a particular Detection Time as does the Echo function. It is also used
when the Echo function cannot be supported for some reason.
Reference. https://tools.ietf.org/html/rfc5880
QUESTION 209
Which action does route poisoning take that serves as a loop-prevention method?
A.
B.
C.
D.
E.
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
With route poisoning, when a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it and
advertising it to neighbors.
QUESTION 210
Which two statements about the ipv6 ospf authentication command are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API
needed for use with OSPFv3.
In OSPFv3, authentication fields have been removed from OSPFv3 packet headers. When OSPFv3 runs on IPv6, OSPFv3 requires the IPv6 authentication header
(AH) or IPv6 ESP header to ensure integrity, authentication, and confidentiality of routing exchanges. IPv6 AH and ESP extension headers can be used to provide
authentication and confidentiality to OSPFv3.
To use the IPsec AH, you must enable the ipv6 ospf authentication command. To use the IPsec ESP header, you must enable the ipv6 ospf encryption
command. The ESP header may be applied alone or in combination with the AH, and when ESP is used, both encryption and authentication are provided. Security
services can be provided between a pair of communicating hosts, between a pair of communicating security gateways, or between a security gateway and a host.
To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the
hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each
interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that
have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro- 15-sy-book/ip6-route-ospfv3-auth-ipsec.html
QUESTION 211
Which two statements about SoO checking in EIGRP OTP deployments are true? (Choose two).
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
During the import process, the SoO value in BGP is checked against the SoO value of the site map.
During the reception of an EIGRP update, the SoO value in the EIGRP update is checked against the SoO value of the site map on the ingress interface.
At the ingress of the PE/CE link, the SoO in the EIGRP update is checked against the SoO within the PE/CE routing protocol.
At the egress of the PE/CE link, the SoO is checked against the SoO within the PE/CE routing protocol.
The SoO is checked at the ingress of the backdoor link.
The SoO is checked at the egress of the backdoor link.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
SoO checking:
- During the import process the SoO value in BGP update is checked against the SoO value of the site-map attached to VRF interface. The update is propagated to
CE only if there is no match (this check is done regardless of protocol used on PE/CE link).
- At reception of EIGRP update, the SoO value in the EIGRP update is checked against the SoO value of site-map attached to the incoming interface. This update
is accepted only if there is no match (this check can optionally be done on backdoor router).
Reference. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip- routing/whitepaper_C11-730404.html
QUESTION 212
Which two OSPF LSA types are flooded within the originating area? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
OSPF relies on several types of Link State Advertisements (LSAs) to communicate link state information between neighbors. A brief review of the most applicable
http://www.gratisexam.com/
LSA types:
Type 1 - Represents a router
Type 2 - Represents the pseudonode (designated router) for a multiaccess link
Type 3 - A network link summary (internal route)
Type 4 - Represents an ASBR
Type 5 - A route external to the OSPF domain
Type 7 - Used in stub areas in place of a type 5 LSA
LSA types 1 and 2 are found in all areas, and are never flooded outside of an area. They are only flooded within the area that they originated from.
Reference. http://packetlife.net/blog/2008/jun/24/ospf-area-types/
QUESTION 213
Which statement about the OSPF Loop-Free Alternate feature is true?
A.
B.
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Restrictions for OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute
The OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute feature is not supported on devices that are virtual links headends.
The feature is supported only in global VPN routing and forwarding (VRF) OSPF instances.
The only supported tunneling method is MPLS.
You cannot configure a traffic engineering (TE) tunnel interface as a protected interface. Use the MPLS Traffic Engineering--Fast Reroute Link and Node
Protection feature to protect these tunnels. For more information, see the "MPLS Traffic Engineering--Fast Reroute Link and Node Protection" section in the
Multiprotocol Label Switching Configuration Guide.
You can configure a TE tunnel interface in a repair path, but OSPF will not verify the tunnel's placement; you must ensure that it is not crossing the physical
interface that it is intended to protect.
Not all routes can have repair paths. Multipath primary routes might have repair paths for all, some, or no primary paths, depending on the network topology, the
connectivity of the computing router, and the attributes required of repair paths.
Devices that can be selected as tunnel termination points must have a /32 address advertised in the area in which remote LFA is enabled. This address will be
used as a tunnel termination IP. If the device does not advertise a /32 address, it may not be used for remote LFA tunnel termination.
All devices in the network that can be selected as tunnel termination points must be configured to accept targeted LDP sessions using the mpls ldp discovery
targeted-hello accept command.
http://www.gratisexam.com/
ASN 64523 has a multihomed BGP setup to ISP A and ISP B. Which BGP attribute can you set to allow traffic that originates in ASN 64523 to exit the ASN through
ISP B?
A.
B.
C.
D.
origin
next-hop
weight
multi-exit discriminator
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
MED is an optional nontransitive attribute. MED is a hint to external neighbors about the preferred path into an autonomous system (AS) that has multiple entry
http://www.gratisexam.com/
points. The MED is also known as the external metric of a route. A lower MED value is preferred over a higher value.
Example at reference link below:
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13759- 37.html
QUESTION 215
When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same
group?
A.
B.
C.
D.
ROUTER_ID
CLUSTER_ID
ORIGINATOR_ID
PEER_GROUP
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route
reflector.
The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are
deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is
assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates
that need to be stored in BGP routing tables.
Reference. http://ieoc.com/forums/t/5326.aspx
QUESTION 216
Which two options are mandatory components of a multiprotocol BGP VPN-IPv4 address? (Choose two.)
A.
B.
C.
D.
E.
F.
a route distinguisher
an IPv4 address
a route target
an MPLS label
a system ID
an area ID
http://www.gratisexam.com/
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The IP prefix is a member of the IPv4 address family. After the PE device learns the IP prefix, the PE converts it into a VPN-IPv4 prefix by combining it with an 8byte route distinguisher (RD). The generated prefix is a member of the VPN-IPv4 address family. It uniquely identifies the customer address, even if the customer
site is using globally nonunique (unregistered private) IP addresses. The route distinguisher used to generate the VPN-IPv4 prefix is specified by a configuration
command associated with the virtual routing and forwarding (VRF) instance on the PE device.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l3_vpns/configuration/15-mt/mp- l3-vpns-15-mt-book/mp-bgp-mpls-vpn.html
QUESTION 217
Which BGP feature enables you to install a backup path in the forwarding table?
A.
B.
C.
D.
soft reconfiguration
prefix independent convergence
route refresh
synchronization
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To install a backup path into the forwarding table and provide prefix independent convergence (PIC) in case of a PE-CE link failure, use the additional-paths install
backup command in an appropriate address family configuration mode. To prevent installing the backup path, use the no form of this command. To disable prefix
independent convergence, use the disable keyword.
Reference. http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4- 2/routing/command/reference/b_routing_cr42crs/b_routing_cr42crs_chapter_01.html
QUESTION 218
Refer to the exhibit.
http://www.gratisexam.com/
R1 and R2 have a working VRF-Lite configuration, but R1 is receiving a route only to 10.2.2.2 from R2. Which two changes can you make so that R1 receives all
routes from R2? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Create an additional permit statement in the access list that is referenced by the import-map on R1.
Disable VRF filtering on R1.
Set the R1 and R2 OSPF process IDs to match.
Change the wildcard mask for the network 10.3.3.0 to 0.0.0.0.
Create a matching export map in the VRF for R2.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The access list in this example is only allowing the 192.168.0.0/16 and 10.2.2.2/32 routes to be advertised, so an additional permit statement is needed to allow the
other routes. Alternatively, we could simply disable VRF filtering, then all routes would be advertised.
QUESTION 219
Refer to the exhibit.
http://www.gratisexam.com/
R2 is unable to access the 172.16.1.0/30 network between R1 and R3. Which option is a possible reason for the failure?
A.
B.
C.
D.
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 222
DRAG DROP
Drag and drop each EIGRP element on the left to the corresponding definition on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
B. It configures the device to advertise a default route regardless of whether it exists in the routing table.
C. It configures the device to automatically redistribute a default route.
D. It adds a static default route to the device configuration.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
default-information originate
To generate a default external route into an Open Shortest Path First (OSPF) routing domain, use the default-information originate command in router configuration
mode. To disable this feature, use the no form of this command.
default-information originate [always] metric metric-value [ metric-type type-value ] [ route- map map-name ]
Syntax Description
Because the delay metric provides better handling for bursty traffic
Because manipulating the bandwidth metric can also affect QoS
Because manipulating the bandwidth affects only a particular path
Because changes to the delay metric are propagated to all neighbors on a segment
Correct Answer: BD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Using the bandwidth to influence EIGRP paths is discouraged for two reasons:
Changing the bandwidth can have impact beyond affecting the EIGRP metrics. For example, quality of service (QoS) also looks at the bandwidth on an
http://www.gratisexam.com/
interface.
EIGRP throttles to use 50 percent of the configured bandwidth. Lowering the bandwidth can cause problems like staving EIGRP neighbors from getting hello
packets because of the throttling back.
Because changes to the delay metric are propagated to all downstream routers, changing the interface delay parameter is the preferred method of influencing path
selection
Reference. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing- protocol-eigrp/13673-14.html
QUESTION 226
What is the maximum number of secondary IP addresses that can be configured on a router interface?
A.
B.
C.
D.
E.
F.
1
2
4
1024
65535
no limit to the number of addresses
Correct Answer: F
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
From "IP Routing Frequently Asked Questions"
Q. What are the maximum number of secondary IP addesses that can be configured on a router interface?
A. There are no limits on configuring secondary IP addresses on a router interface.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/28745- 44.html#q21
QUESTION 227
Which address is a MAC address that is mapped from an IPv6 address (RFC 2464)?
A.
B.
C.
D.
3333.FF17.FC0F
FFFE. FF17.FC0F
FF34.3333.FF17
FF7E.FF17.FC0F
http://www.gratisexam.com/
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
An IPv6 packet with a multicast destination address DST, consisting of the sixteen octets DST through DST, is transmitted to the Ethernet multicast address whose
first two octets are the value 3333 hexadecimal and whose last four octets are the last four octets of DST.
Reference. https://tools.ietf.org/html/rfc2464
QUESTION 228
Which multicast protocol uses source trees and RPF?
A.
B.
C.
D.
DVMRP
PIM sparse mode
CBT
mOSPF
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree rooted at the source of the multicast packets. Multicast
packets are initially flooded down this source tree. If redundant paths are on the source tree, packets are not forwarded along those paths. Forwarding occurs until
prune messages are received on those parent-child links, which further constrains the broadcast of multicast packets.
Reference. DVMRP and dense-mode PIM use only source trees and use RPF as previously described.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12- 1_19_ea1/configuration/guide/3550scg/swmcast.html
QUESTION 229
What is the function of the command ip pim autorp listener?
A.
B.
C.
D.
It allows a border PIM sparse mode router to accept autorp information from another autonomous system.
It allows the mapping agents to accept autorp information from the PIM rendezvous point.
It allows the routers to flood the autorp information in a sparse-mode-only network.
It allows a BSR to accept autorp information and translate it into BSR messages.
http://www.gratisexam.com/
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To cause IP multicast traffic for the two Auto-RP groups 224.0.1.39 and 224.0.1.40 to be Protocol Independent Multicast (PIM) dense mode flooded across
interfaces operating in PIM sparse mode, use the ip pim autorp listener command in global configuration mode. To disable this feature, use the no form of this
command.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti/command/imc-cr- book/imc_i3.html#wp3085748429
QUESTION 230
Refer to the exhibit.
Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A.
B.
C.
D.
E.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
R bit: RP bit: R = 1 indicates the address embeds the address of the Rendezvous Point (RP). The embedded RP address needs to begin with the prefix FF70::/12,
But here we see that the address is FF7E::1234.
http://www.gratisexam.com/
QUESTION 231
Refer to the exhibit.
All SNMP traffic coming into the router is redirected to interface GigabitEthernet1/0.
All SNMP traffic generated from the router is redirected to interface GigabitEthernet1/0.
All SMTP traffic generated from the router is redirected to interface GigabitEthernet1/0.
All POP3 traffic coming into the router is redirected to interface GigabitEthernet1/0.
All SMTP traffic coming into the router is redirected to interface GigabitEthernet1/0.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
This is an example of policy based routing, where traffic sourced from this router that matches the access list (all traffic with port 25 which is SMTP) will be forced
out the Gig 0/1 interface.
QUESTION 232
Which three statements about EIGRP and BFD are true? (Choose three.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
BFD is independent of the routing protocol, so it can be used as a generic failure detection mechanism for EIGRP.
Some parts of BFD can be distributed to the data plane, so it can be less CPU-intensive than reduced timers, which exist wholly at the control plane.
Reduced EIGRP timers have an absolute minimum detection timer of 1-2 seconds; BFD can provide sub-second failure detection.
BFD is tied to specific routing protocols and can be used for generic fault detection for the OSPF, EIGRP, and BGP routing protocols.
BFD is dependent on the EIGRP routing protocol, so it can be used as a specific failure detection mechanism.
BFD resides on the control plane, so it is less CPU-intensive than if it resided on the data plane.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Normally, routers that are connected to broadcast-type IP networks and that use distance-vector routing protocols employ the split horizon mechanism to reduce the
http://www.gratisexam.com/
possibility of routing loops. Split horizon blocks information about routes from being advertised by a router out of any interface from which that information
originated. This behavior usually optimizes communications among multiple routers, particularly when links are broken. However, with nonbroadcast networks,
situations can arise for which this behavior is less than ideal. For these situations, you might want to disable split horizon with EIGRP and RIP.
If an interface is configured with secondary IP addresses and split horizon is enabled, updates might not be sourced by every secondary address. One routing
update is sourced per network number unless split horizon is disabled.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfrip.html
QUESTION 234
Refer to the exhibit.
Which two options are possible states for the interface configured with the given OSPFv3 authentication? (Choose two.)
A.
B.
C.
D.
GOING UP
DOWN
UNCONFIGURED
GOING DOWN
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To configure IPsec, you configure a security policy, which is a combination of the security policy index (SPI) and the key (the key is used to create and validate the
hash value). IPsec for OSPFv3 can be configured on an interface or on an OSPFv3 area. For higher security, you should configure a different policy on each
interface configured with IPsec. If you configure IPsec for an OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that
have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you.
The secure socket API is used by applications to secure traffic. The API needs to allow the application to open, listen, and close secure sockets. The binding
between the application and the secure socket layer also allows the secure socket layer to inform the application of changes to the socket, such as connection open
and close events. The secure socket API is able to identify the socket; that is, it can identify the local and remote addresses, masks, ports, and protocol that carry
the traffic requiring security.
Each interface has a secure socket state, which can be one of the following:
NULL: Do not create a secure socket for the interface if authentication is configured for the area.
DOWN: IPsec has been configured for the interface (or the area that contains the interface), but OSPFv3 either has not requested IPsec to create a secure
socket for this interface, or there is an error condition.
http://www.gratisexam.com/
GOING UP: OSPFv3 has requested a secure socket from IPsec and is waiting for a CRYPTO_SS_SOCKET_UP message from IPsec.
UP: OSPFv3 has received a CRYPTO_SS_SOCKET_UP message from IPsec.
CLOSING: The secure socket for the interface has been closed. A new socket may be opened for the interface, in which case the current secure socket makes
the transition to the DOWN state. Otherwise, the interface will become UNCONFIGURED.
UNCONFIGURED. Authentication is not configured on the interface.
OSPFv3 will not send or accept packets while in the DOWN state.
ReferenE. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro- 15-sy-book/ip6-route-ospfv3-auth-ipsec.html
QUESTION 235
Refer to the exhibit.
The device with this configuration is unable to reach network 172.31.31.0/24. The next hop router has been verified to have full connectivity to the network. Which
two actions can you take to establish connectivity to the network? (Choose two.)
A.
B.
C.
D.
E.
F.
Create a static route to 172.16.199.0 using the address of the next hop router.
Create a default route to the link address of the next hop router.
Create a static route to the loopback address of the next hop router.
Create a default route to 172.16.199.9.
Modify the existing static route so that the next hop is 0.0.0.0.
Replace the ip default-network command with the ip default-gateway command.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Unlike the ip default-gateway command, you can use ip default-network when ip routing is enabled on the Cisco router. When you configure ip default-network the
router considers routes to that network for installation as the gateway of last resort on the router.
For every network configured with ip default-network, if a router has a route to that network, that route is flagged as a candidate default route. However, in this case
if the router does not a route to the drfault network of 172.16.199.9, then you would need to ensure that this route exisits by creating a static route to 172.16.199.0
using the address of the next hop router, or simply create a default route using the address of the next hop router.
http://www.gratisexam.com/
QUESTION 236
Which algorithm heavily influenced the algorithm used by path-vector protocols?
A.
B.
C.
D.
E.
F.
Bellman-Ford
SPF
DUAL
Spanning-Tree
Adaptive
Deflection
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped
through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in BellmanFord routing algorithms to avoid
"Count to Infinity" problems.
Reference. http://en.wikipedia.org/wiki/Path_vector_protocol
QUESTION 237
Refer to the exhibit.
http://www.gratisexam.com/
All of the routers on this network are running RIP. If you edit the R3 RIP process configuration to reduce the number of hops from R3 to R1, which statement about
the configuration change is true?
A.
B.
C.
D.
Configuring no passive-interface for GigabitEthernet0/0 in the R3 RIP process reduces the number of hops to R1 by 2.
Configuring no passive-interface for GigabitEthernet0/0 in the R3 RIP process reduces the number of hops to R1 by 1.
Configuring no passive-interface for GigabitEthernet0/1 in the R3 RIP process reduces the number of hops to R1 by 3.
Configuring no passive-interface for GigabitEthernet0/1 in the R3 RIP process reduces the number of hops to R1 by 1.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
By changing the link from R3 to R2 to not be passive, traffic can then take the direct route from R3-R2-R1 instead of the longer path of R3-R6-R5-R4-R1, resulting
in two less hops.
http://www.gratisexam.com/
QUESTION 238
Where should the passive-interface command be used?
A.
B.
C.
D.
E.
Under the routing process for interfaces that need to be routed, but prevented from peering
under the routing process for interfaces that need to be routed and allowed to peer
under the interface configuration for interfaces that need to be routed, but prevented from peering
under the interface configuration for interfaces that need to be routed and allowed to peer
under the VTY configuration within global configuration mode
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Passive-interface is a feature you enable on a per interface basis which allows a particular interface to participate in a routing process but prevents that interface
from forming neighbor relationships by not sending hello packets and discarding received hello packets.
QUESTION 239
Refer to the exhibit.
Only networks 10.10.10.0/24 and smaller from host 192.168.168.1 are in the routing table.
Only networks 10.10.10.0/24 and larger from host 192.168.168.1 are in the routing table.
Only network 10.10.10.0/24 from host 192.168.168.1 is in the routing table.
Networks 10.10.10.0/24 and smaller from any host are in the routing table.
Correct Answer: A
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
When you add the keywords "GE" and "LE" to the prefix-list, the "len" value changes its meaning. When using GE and LE, the len value specifies how many bits of
the prefix you are checking, starting with the most significant bit.
ip prefix-list LIST permit 1.2.3.0/24 le 32
This means:
Check the first 24 bits of the prefix 1.2.3.0
The subnet mask must be less than or equal to 32
Reference. http://blog.ine.com/2007/12/26/how-do-prefix-lists-work/
QUESTION 240
Refer to the exhibit.
R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach R2. Which three options are possible reasons for this behavior? (Choose
three.)
A. R1 requires a seed metric to redistribute RIP.
B. The RIP version supports only classful subnet masks.
C. R1 is filtering OSPF routes when redistributing into RIP.
http://www.gratisexam.com/
If the downstream router has a summary route configured, which two actions must you take on the local router to create the summary route that summarizes all
routes from the downstream router? (Choose two.)
A. Configure the summary address on the interface.
B. Use 10.0.0.0 255.248.0.0 as the summary route.
C. Configure the summary address in the EIGRP process.
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Explanation:
The routing information protocol uses the following timers as part of its operation:
Update Timer
Invalid Timer
Flush Timer
Holddown Timer
Update Timer
The update timer controls the interval between two gratuitous Response Message. By default the value is 30 seconds. The response message is broadcast to all its
RIP enabled interface.
Invalid Timer
The invalid timer specifies how long a routing entry can be in the routing table without being updated. This is also called as expiration Timer. By default, the value is
180 seconds. After the timer expires the hop count of the routing entry will be set to 16, marking the destination as unreachable.
Flush Timer
The flush timer controls the time between the route is invalidated or marked as unreachable and removal of entry from the routing table. By default the value is 240
seconds. This is 60 seconds longer than Invalid timer. So for 60 seconds the router will be advertising about this unreachable route to all its neighbors. This timer
must be set to a higher value than the invalid timer.
Hold-down Timer
The hold-down timer is started per route entry, when the hop count is changing from lower value to higher value. This allows the route to get stabilized. During this
time no update can be done to that routing entry. This is not part of the RFC 1058. This is Cisco's implementation. The default value of this timer is 180 seconds.
Reference. http://en.wikipedia.org/wiki/Routing_Information_Protocol#Timers
QUESTION 243
Which timer expiration can lead to an EIGRP route becoming stuck in active?
A.
B.
C.
D.
hello
active
query
hold
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
As noted above, when a route goes into the active state, the router queries its neighbors to find a path to the pertinent network. At this point, the router starts a three
minute active timer by which time it must receive replies from all queried neighbors. If a neighbor has feasible successors for the route, it will recalculate its own
local distance to the network and report this back. However, if a neighbor does not have a feasible successor, it also goes into active state. In some cases, multiple
routers along multiple query paths will go into active state as routers continue to query for the desired route. In most cases, this process will yield responses from all
queried routers and the sought after route will transition back into the passive state within the three minute SIA query timer. In the case that none of the queried
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
MPLS
GRE
LISP
IP-in-IP
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The EIGRP Over the Top solution can be used to ensure connectivity between disparate Enhanced Interior Gateway Routing Protocol (EIGRP) sites. This feature
uses EIGRP on the control plane and Locator ID Separation Protocol (LISP) encapsulation on the data plane to route traffic across the underlying WAN
architecture. EIGRP is used to distribute routes between customer edge (CE) devices within the network, and the traffic forwarded across the WAN architecture is
LISP encapsulated. Therefore, to connect disparate EIGRP sites, you must configure the neighbor command with LISP encapsulation on every CE in the network.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/xe-3s/ire- xe-3s-book/ire-eigrp-over-the-top.html
QUESTION 246
Which statement about the feasible distance in EIGRP is true?
A.
B.
C.
D.
It is the maximum metric that should feasibly be considered for installation in the RIB.
It is the minimum metric to reach the destination as stored in the topology table.
It is the metric that is supplied by the best next hop toward the destination.
It is the maximum metric possible based on the maximum hop count that is allowed.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
An EIGRP router advertises each destination it can reach as a route with an attached metric. This metric is called the route's reported distance (the term advertised
distance has also been used in older documentation). A successor route for any given destination is chosen as having the lowest computed feasible distance; that
is, the lowest sum of reported distance plus the cost to get to the advertising router.
By default, an EIGRP router will store only the route with the best (lowest) feasible distance in the routing table (or, multiple routes with equivalent feasible
distances).
Reference. http://packetlife.net/blog/2010/aug/9/eigrp-feasible-successor-routes/
http://www.gratisexam.com/
QUESTION 247
Which statement about the EIGRP RTO is true?
A.
B.
C.
D.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The RTO is typically six times the SRTT, the value may vary from a minimum of 200 microseconds (ms) to a maximum of 5 seconds (s).
Reference. EIGRP for IP: Basic Operation and Configuration, Alvaro Retana, Russ White, Don Slice - 2000
QUESTION 248
Which option describes the purpose of the leak-map keyword in the command eigrp stub connected leak-map EigrpLeak?
A.
B.
C.
D.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
ExamplE. eigrp stub leak-map Command
In the following example, the eigrp stub command is issued with the leak-map name keyword- argument pair to configure the device to reference a leak map that
identifies routes to be advertised that would have been suppressed otherwisE.
Device(config)# router eigrp 1
Device(config-router)# network 10.0.0.0
Device(config-router)# eigrp stub leak-map map1
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15- mt/ire-15-mt-book/ire-eigrp-stub-rtg.html#GUID-FB899CA9-E9DEhttp://www.gratisexam.com/
48D8-8048-C971179E4E24
QUESTION 249
Refer to the exhibit.
If OSPF is implemented on the network, which additional configuration is needed to allow traffic from host 10.4.1.15/24 to host 10.1.2.20/24?
A.
B.
C.
D.
Correct Answer: D
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
This specific traffic from 10.4.1.0/24 to 10.1.2.0/24 would work because this traffic crosses only over the single OSPF area of 0.0.0.1.
However, traffic from hosts on R4 to R1 would indeed need a virtual link, since area 0.0.0.2 is not connected to the backbone area of 0.0.0.0.
QUESTION 250
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
2001:12::1/128
2001:12::1/128, 2001:112::1/128
2001:12::2/128
No OSPFv3 routes will be visible.
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The command "ipv6 unicast-routing" needs to be configured on both routers before any IPv6 routes will be seen.
QUESTION 251
Refer to the exhibit.
R1 is configured as shown. R1 is able to establish a neighbor adjacency only with R2. Which addition must you make to the R1 configuration to allow it to establish
an adjacency with R3?
A. interface gigabitethernet 0/1
ip address 10.1.0.1 255.255.255.0
ip ospf network point-to-point
B. interface gigabitethernet 0/1
ip address 10.1.0.1 255.255.255.0
ip ospf 1 area 0
C. router ospf 1
network 10.1.0.0 0.0.0.255 area 1
D. router ospf 1
area 0 stub
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To enable interfaces and networks with OSPF, the networks need to be specified in the network statement. In the configuration shown, only 10.0.0.0/24 has been
enabled, we are missing the network connecting to R3 (10.1.0.0/24).
QUESTION 252
Which option describes how a router responds if LSA throttling is configured and it receives the identical LSA before the interval is set?
http://www.gratisexam.com/
A.
B.
C.
D.
The LSA is added to the OSPF database and a notification is sent to the sending router to slow down its LSA packet updates.
The LSA is added to the OSPF database.
The LSA is ignored.
The LSA is ignored and a notification is sent to the sending router to slow down its LSA packet updates.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
How OSPF LSA Throttling Works
The timers throttle lsa all command controls the generation (sending) of LSAs. The first LSA is always generated immediately upon an OSPF topology change, and
the next LSA generated is controlled by the minimum start interval. The subsequent LSAs generated for the same LSA are rate-limited until the maximum interval is
reached. The "same LSA" is defined as an LSA instance that contains the same LSA ID number, LSA type, and advertising router ID.
The timers lsa arrival command controls the minimum interval for accepting the same LSA. If an instance of the same LSA arrives sooner than the interval that is
set, the LSA is dropped. It is recommended that the arrival interval be less than or equal to the hold-time interval of the timers throttle lsa all command.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsolsath.html
QUESTION 253
Which two options are valid for the number of bytes in a BGP AS number? (Choose two.)
A.
B.
C.
D.
E.
2 bytes
4 bytes
6 bytes
8 bytes
16 bytes
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
During the early time of BGP development and standardization, it was assumed that availability of a 16 bit binary number to identify the Autonomous System (AS)
within BGP would have been more than sufficient. The 16 bit AS number, also known as the 2-byte AS number, provides a pool of 65536 unique Autonomous
System numbers. The IANA manages the available BGP Autonomous System Numbers (ASN) pool, with the assignments being carried out by the Regional
http://www.gratisexam.com/
Registries.
The current consumption rate of the publicly available AS numbers suggests that the entire public 2-byte ASN pool will be fully depleted. A solution to this depletion
is the expansion of the existing 2-byte AS number to a 4-byte AS number, which provides a theoretical 4,294,967,296 unique AS numbers. ARIN has made the
following policy changes in conjunction with the adoption of the solution.
The Cisco IOS BGP "4-byte ASN" feature allows BGP to carry a Autonomous System Number (ASN) encoded as a 4-byte entity. The addition of this feature allows
an operator to use an expanded 4-byte AS number granted by IANA.
QUESTION 254
Refer to the exhibit.
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
In the "show ip bgp" output we see that there is no peering session between R2 and R3. Since R3 is the route reflector here, R3 would reflect routes advertised
from R4 to R2, but the peer needs to be established first.
QUESTION 255
Which statement about the BGP scope of the cost community is true?
A.
B.
C.
D.
E.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The BGP Cost Community feature introduces the cost extended community attribute. The cost community is a non-transitive extended community attribute that is
passed to internal BGP (iBGP) and confederation peers but not to external BGP (eBGP) peers. The cost community feature allows you to customize the local route
preference and influence the best path selection process by assigning cost values to specific routes.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/s_bgpcc.html
QUESTION 256
Which statement is true about conditional advertisements?
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: E
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The Border Gateway Protocol (BGP) conditional advertisement feature provides additional control of route advertisement, depending on the existence of other
prefixes in the BGP table.
Normally, routes are propagated regardless of the existence of a different path. The BGP conditional advertisement feature uses the non-exist-map and the
advertise-map keywords of the neighbor advertise-map command in order to track routes by the route prefix. If a route prefix is not present in output of the nonexist-map command, then the route specified by the advertise-map command is announced. This feature is useful for multihomed networks, in which some prefixes
are advertised to one of the providers only if information from the other provider is not present (this indicates a failure in the peering session or partial reachability).
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/16137- cond-adv.html
QUESTION 257
Refer to the exhibit.
How can Router X in AS70000 peer with Router Y in AS65000, in case Router Y supports only 2- byte ASNs?
A. Router X should be configured with a remove-private-as command, because this will establish the peering session with a random private 2-byte ASN.
B. It is not possible. Router Y must be upgraded to an image that supports 4-byte ASN.
C. Router Y should be configured with a 4-byte AS using the local-as command.
http://www.gratisexam.com/
Correct Answer: D
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The BGP Diverse Path Using a Diverse-Path Route Reflector feature allows BGP to distribute an alternative path other than the best path between BGP speakers
when route reflectors are deployed. This additional path is added to the best-path, and the best path algorithm still remains unchanged.
QUESTION 259
For which two conditions is Cisco Express Forwarding recursion disabled by default when the BGP Prefix Independent Convergence functionality is enabled?
(Choose two.)
A.
B.
C.
D.
Correct Answer: CD
http://www.gratisexam.com/
4 bytes
6 bytes
8 bytes
16 bytes
20 bytes
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Routers are identified with NETs of 8 to 20 bytes. ISO/IEC 10589 distinguishes only three fields in the NSAP address format: a variable-length area address
beginning with a single octet, a system ID, and a 1-byte n-selector. Cisco implements a fixed length of 6 bytes for the system ID, which is like the OSPF router ID.
Reference.
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
QUESTION 261
Which two statements about IS-IS are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
The default hello interval is 10 seconds and the default hold timer is 30 seconds.
The hello interval can be changed on a per-interface basis with the command isis hello- multiplier.
Both routers need to have the same hello intervals and hold timers in order to form IS-IS neighbors.
Both IS-IS routers need to have the same capabilities in the hello packet in order to form neighbors.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
isis hello-interval
To specify the length of time between hello packets that the Cisco IOS software sends, use the isis hello-interval command in interface configuration mode.
By default, a value three times the hello interval seconds is advertised as the hold time in the hello packets sent. (Change the multiplier of 3 by specifying the isis
hello-multiplier command.) With smaller hello intervals, topological changes are detected faster, but there is more routing traffic. The default is 10 seconds.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfisis.html
QUESTION 262
Which bit should be set in the link-state PDU of an IS-IS L1/L2 router to indicate that it is a potential exit point of the area?
A.
B.
C.
D.
Correct Answer: B
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Default routing is achieved in two distinct ways with Integrated IS-IS:
Attached bit--Set by a Level 1/Level 2 router in its own Level 1 LSP and used to indicate to all Level 1 routers (within the area) that this router is a potential exit
point of the area. Level 1-only routers will default to the nearest attached Level 2 router.
Default information originate--Can be configured in Level 1 as well as Level 2. The default route (0.0.0.0/0) is inserted in the router LSP (Level 1 or Level 2,
according to the configuration command) and the LSP is flooded according to the router type (Level 1 or Level 2). A Level 2 router doesn't need to have a default
route to originate a default route.
http://www.gratisexam.com/
Reference.
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
QUESTION 263
Which two options are benefits of EIGRP OTP? (Choose two.)
A.
B.
C.
D.
E.
F.
It allows EIGRP routers to peer across a service provider without the service provider involvement.
It allows the customer EIGRP domain to remain contiguous.
It requires only minimal support from the service provider.
It allows EIGRP neighbors to be discovered dynamically.
It fully supports multicast traffic.
It allows the administrator to use different autonomous system numbers per EIGRP domain.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
EIGRP Over the Top (OTP) allows EIGRP routers to peer across a service provider infrastructure without the SP's involvement. In fact with OTP, the provider won't
see customer routes at all. EIGRP OTP acts as a provider-independent overlay that transports customer data between the customer's routers.
To the customer, the EIGRP domain is contiguous. A customer's EIGRP router sits at the edge of the provider cloud, and peers with another EIGRP router a
different location across the cloud. Learned routes feature a next hop of the customer router -- not the provider. Good news for service providers is that customers
can deploy EIGRP OTP with their involvement
Reference. http://ethancbanks.com/2013/08/01/an-overview-of-eigrp-over-the-top-otp/
QUESTION 264
DRAG DROP
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Explanation:
http://www.gratisexam.com/
Reference. http://www.deepsh.it/networking/BGP/bgp-attributes.png
Reference. http://www.deepsh.it/networking/BGP/bgp-attributes.png
QUESTION 267
Refer to the exhibit.
http://www.gratisexam.com/
R3 is failing to join the multicast group 224.1.1.1 that is sourcing from R1. Which two actions can you take to allow multicast traffic to flow correctly? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Since the tunnel interfaces are not part of OSPF, the best path to the multicast source of R1 from R3 would be over the Gi0/0 path via OSPF. However, the static
mroute is configured to use the tunnel, so this causes an RPF failure used in Sparse Mode. Best fix is to add the tunnel interfaces into OSPF and remove the static
mroute so that that the RPF check no longer fails.
QUESTION 268
Which two modes of operation does BFD support? (Choose two.)
A.
B.
C.
D.
E.
F.
synchronous mode
asynchronous mode
demand mode
echo mode
aggressive mode
passive mode
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A session may operate in one of two modes: asynchronous mode and demand mode. In asynchronous mode, both endpoints periodically send Hello packets to
each other. If a number of those packets are not received, the session is considered down.
In demand mode, no Hello packets are exchanged after the session is established; it is assumed that the endpoints have another way to verify connectivity to each
other, perhaps on the underlying physical layer. However, either host may still send Hello packets if needed.
Reference: http://en.wikipedia.org/wiki/Bidirectional_Forwarding_Detection
http://www.gratisexam.com/
QUESTION 269
Which two loop-prevention mechanisms are implemented in BGP? (Choose two.)
A.
B.
C.
D.
E.
A route with its own AS in the AS_PATH is dropped automatically if the route reenters its own AS.
A route with its own cluster ID in the CLUSTER_LIST is dropped automatically when the route reenters its own AS.
The command bgp allowas-in enables a route with its own AS_PATH to be dropped when it reenters its own AS.
The command bgp bestpath as-path ignore enables the strict checking of AS_PATH so that they drop routes with their own AS in the AS_PATH.
The command bgp bestpath med missing-as-worst assigns the smallest possible MED, which directly prevents a loop.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
When dealing with the possibility of routing updates making their way back into an AS, BGP relies on the information in the AS_path for loop detection. An update
that tries to make its way back into the AS it was originated from will be dropped by the border router.
With the introduction of route reflectors, there is a potential for having routing loops within an AS. A routing update that leaves a cluster might find its way back
inside the cluster. Loops inside the AS cannot be detected by the traditional AS_path approach because the routing updates have not left the AS yet. BGP offers
two extra measures for loop avoidance inside an AS when route reflectors are configured.
Using an Originator ID
The originator ID is a 4-byte, optional, nontransitive BGP attribute (type code 9) that is created by the route reflector. This attribute carries the router ID of the
originator of the route in the local AS. If, because of poor configuration, the update comes back to the originator, the originator ignores it.
Using a Cluster List
The cluster list is an optional, nontransitive BGP attribute (type code 10). Each cluster is represented with a cluster ID.
A cluster list is a sequence of cluster IDs that an update has traversed. When a route reflector sends a route from its clients to nonclients outside the cluster, it
appends the local cluster ID to the cluster list. If the route reflector receives an update whose cluster list contains the local cluster ID, the update is ignored. This is
basically the same concept as the AS_path list applied between the clusters inside the AS.
Reference: http://borg.uu3.net/cisco/inter_arch/page11.html
QUESTION 270
Refer to the exhibit.
http://www.gratisexam.com/
RIPv2 authentication is failing on a device with this configuration. Which two actions can you take to enable it? (Choose two.)
A.
B.
C.
D.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
See the reference link below for information on configuring RIPv2 authentication, including both test and MD5 modes.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13719- 50.html#configuringplain
QUESTION 271
Which three routing protocols utilize TLVs? (Choose three.)
A.
B.
C.
D.
E.
F.
BGP
IS-IS
ODR
OSPF
EIGRP
RIP
http://www.gratisexam.com/
Correct Answer: CF
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
To allow the use of external, internal, and local administrative distances that could be a better route than other external, internal, or local routes to a node, use the
distance bgp command in address family or router configuration mode. To return to the default values, use the no form of this command.
distance bgp external-distance internal-distance local-distance
no distance bgp
http://www.gratisexam.com/
Syntax Description
Defaults
external-distance: 20
internal-distance: 200
local-distance: 200
In this case, the internal distance is 60 and the external is 90, and the local distance is 120 (same as RIP).
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfbgp1.html# wp1113874
QUESTION 273
Refer to the exhibit.
http://www.gratisexam.com/
Route exchange is failing on a PE edge device configured with this VRF-Lite. Which action can you take to correct the problem?
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Open Shortest Path First version 3 (OSPFv3) operates in nondefault VPN routing and forwarding (VRF) instances for both IPv6 and IPv4 address families and,
transports the routes across a Border Gateway Protocol (BGP) or a Multiprotocol Label Switching (MPLS) backbone. On the provider edge (PE) device, customer
routes are installed together by OSPFv3 and BGP in a common VRF or address family and each protocol is configured to redistribute the routes of the other. BGP
combines the prefixes redistributed into it with a route-distinguisher value defined for the VRF and advertises them to other MPLS-BGP speakers in the same
autonomous system using the VPNv4 or VPNv6 address family as appropriate.
The OSPFv3 route selection algorithm prefers intra-area routes across the back-door link over inter- area routes through the MPLS backbone. Sham-links are a
type of virtual link across the MPLS backbone that connect OSPFv3 instances on different PEs. OSPFv3 instances tunnel protocol packets through the backbone
and form adjacencies. Because OSPFv3 considers the sham-link as an intra-area connection, sham-link serves as a valid alternative to an intra-area back-door
link. Domain IDs are used to determine whether the routes are internal or external. They describe the administrative domain of the OSPFv3 instance from which the
route originates. Every PE has a 48- bit primary domain ID (which may be NULL) and zero or more secondary domain IDs.
How to Configure VRF-Lite/PE-CE
Configuring a VRF in an IPv6 Address Family for OSPFv3
SUMMARY STEPS
1. enable
2. configure terminal
3. vrf definition vrf-name
4. rd route-distinguisher
5. exit
6. router ospfv3 [process-id]
7. address-family ipv6 [unicast] [vrf vrf-name]
8. end
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro- 15-sy-book/iro-vrf-lite-pe-ce.html
QUESTION 274
Refer to the exhibit.
http://www.gratisexam.com/
Devices in OSPF area 15 can reach the summary route 192.168.0.0/16 and its more specific subnets.
Devices in OSPF area 15 can reach only the more specific routes of 192.168.0.0/16.
Devices in OSPF area 0 can reach the summary route 192.168.0.0/16 and its more specific subnets.
Devices in OSPF area 0 can reach only the summary route of 192.168.0.0/16.
Correct Answer: A
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
area range
To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use the no form of
this command. Area area-id range ip-address mask [advertise | not-advertise] [cost cost] no area area-id range ip-address mask [advertise | not-advertise]
[cost cost]
Syntax Description
http://www.gratisexam.com/
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf.html
QUESTION 275
Which two technologies are supported by EIGRP? (Choose two.)
A.
B.
C.
D.
clear-text authentication
MD5 authentication
stub routing
multiple areas
Correct Answer: BC
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The IP Enhanced IGRP Route Authentication feature provides MD5 authentication of routing updates from the EIGRP routing protocol. The MD5 keyed digest in
each EIGRP packet prevents the introduction of unauthorized or false routing messages from unapproved sources. The EIGRP stub routing feature improves
network stability, reduces resource utilization, and simplifies the stub device configuration.
Stub routing is commonly used in hub-and-spoke network topologies. In a hub-and-spoke network, one or more end (stub) networks are connected to a remote
device (the spoke) that is connected to one or more distribution devices (the hub). The remote device is adjacent to one or more distribution devices. The only route
for IP traffic to reach the remote device is through a distribution device.
References:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s- book/ire-rte-auth.html
http://www.gratisexam.com/
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-s/ire-15-s- book/ire-eigrp-stub-rtg.html
QUESTION 276
How does having an EIGRP feasible successor speed up convergence?
A.
B.
C.
D.
EIGRP sends queries only if there is a feasible successor, which decreases the number of routers that are involved in convergence.
EIGRP sends queries only if there is not a feasible successor, which causes less control traffic to compete with data.
EIGRP immediately installs the loop-free alternative path in the RIB.
EIGRP preinstalls the feasible successor in the RIB in all cases, which causes traffic to switch more quickly.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Feasible Successor
A next-hop router that serves as backup to the current successor.
The condition is that the said router's AD (or RD) is less than the FD of the current successor route.
Once the feasible successor is selected, they are placed in the topology table. If a change in topology occurs which requires a new route, DUAL looks for the
feasible successor and uses it as new route immediately, resulting in fast convergence.
Reference: http://routemyworld.com/2008/07/page/2/
QUESTION 277
Which two options are ways in which an OSPFv3 router handles hello packets with a clear address- family bit? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A typical distance vector protocol saves the following information when computing the best path to a destination: the distance (total metric or distance, such as hop
count) and the vector (the next hop). For instance, all the routers in the network in Figure 1 are running Routing Information Protocol (RIP). Router Two chooses the
http://www.gratisexam.com/
path to Network A by examining the hop count through each available path.
Since the path through Router Three is three hops, and the path through Router One is two hops, Router Two chooses the path through One and discards the
information it learned through Three. If the path between Router One and Network A goes down, Router Two loses all connectivity with this destination until it times
out the route of its routing table (three update periods, or 90 seconds), and Router Three re-advertises the route (which occurs every 30 seconds in RIP). Not
including any hold-down time, it will take between 90 and 120 seconds for Router Two to switch the path from Router One to Router Three.
EIGRP, instead of counting on full periodic updates to re-converge, builds a topology table from each of its neighbor's advertisements (rather than discarding the
data), and converges by either looking for a likely loop-free route in the topology table, or, if it knows of no other route, by querying its neighbors. Router Two saves
the information it received from both Routers One and Three. It chooses the path through One as its best path (the successor) and the path through Three as a
loop-free path (a feasible successor). When the path through Router One becomes unavailable, Router Two examines its topology table and, finding a feasible
successor, begins using the path through Three immediately.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing- protocol-eigrp/16406-eigrp-toc.html
QUESTION 278
Which two statements about OSPF route types are true? (Choose two.)
A.
B.
C.
D.
E.
F.
The cost of an external type 2 route is the sum of the external and internal costs.
The cost of an external type 2 route is the same as the external cost.
Intra-area routes originate outside of their area.
Inter-area routes originate inside their area.
The cost of an external type 1 route is the same as the internal cost.
For routes to the same destination, external type 1 routes are preferred over external type 2 routes.
http://www.gratisexam.com/
Correct Answer: BF
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
External routes fall under two categories, external type 1 and external type 2. The difference between the two is in the way the cost (metric) of the route is being
calculated. The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A type 1 cost is the addition of the external cost
and the internal cost used to reach that route. A type 1 route is always preferred over a type 2 route for the same destination.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html
QUESTION 279
A company is multihomed to several Internet providers using EBGP. Which two measures guarantee that the network of the company does not become a transit AS
for Internet traffic? (Choose two.)
A.
B.
C.
D.
Prepend three times the AS number of the company to the AS path list.
Add the community NO_EXPORT when sending updates to EBGP neighbors.
Write AS-path access-list which permits one AS long paths only and use it to filter updates sent to EBGP neighbors.
Add the community NO_EXPORT when receiving updates from EBGP neighbors.
Correct Answer: CD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
By default BGP will advertise all prefixes to EBGP (External BGP) neighbors. This means that if you are multi-homed (connected to two or more ISPs) that you
might become a transit AS. Let me show you an example:
http://www.gratisexam.com/
R1 is connected to ISP1 and ISP2 and each router is in a different AS (Autonomous System). Since R1 is multi-homed it's possible that the ISPs will use R1 to
reach each other. In order to prevent this we'll have to ensure that R1 only advertises prefixes from its own autonomous system. As far as I know there are 4
methods how you can prevent becoming a transit AS:
Filter-list with AS PATH access-list.
No-Export Community.
Prefix-list Filtering
Distribute-list Filtering
Reference: http://networklessons.com/bgp/bgp-prevent-transit-as/
QUESTION 280
Which BGP feature allows a router to maintain its current BGP configuration while it advertises a different AS number to new connections?
A.
B.
C.
D.
local-AS
next-hop-self
allow-AS in
soft reset
Correct Answer: A
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
The prefixes sent with private AS numbers are always discarded on the Internet.
The prefixes sent with private AS numbers are always tagged as invalid on the Internet.
The prefixes sent with private AS numbers lack uniqueness, which can lead to a loss of connectivity.
The prefixes sent with private AS numbers are sometimes tagged as invalid on the Internet.
Correct Answer: C
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
Private AS numbers are not meant to be used for global Internet BGP routing, as they are assigned locally and can be used by any organization. They are meant to
enable BGP within a enterprise or VPN, but since these numbers can be used by any organization they are not unique and could cause connectivity loss if leaked to
the Internet.
QUESTION 282
Which two statements about the BGP community attribute are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: BD
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
A community is a group of prefixes that share some common property and can be configured with the BGP community attribute. The BGP Community attribute is an
optional transitive attribute of variable length. The attribute consists of a set of four octet values that specify a community. The community attribute values are
encoded with an Autonomous System (AS) number in the first two octets, with the remaining two octets defined by the AS. A prefix can have more than one
community attribute. A BGP speaker that sees multiple community attributes in a prefix can act based on one, some or all the attributes. A router has the option to
add or modify a community attribute before the router passes the attribute on to other peers.
Reference:
http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/28784-bgp- community.html
QUESTION 283
Refer to the exhibit.
Correct Answer: C
Section: Layer 3 Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
If you want AS 1 to get networks originated from AS 4 and all directly attached ASs of AS 4, apply the following inbound filter on Router 1.
ip as-path access-list 1 permit ^4_[0-9]*$ router bgp 1 neighbor 4.4.4.4 remote-as 4 neighbor 4.4.4.4 route-map foo in route-map foo permit 10 match as-path 1
In the ip as-path access-list command, the carat (^) starts the input string and designates "AS". The underscore (_) means there is a a null string in the string that
follows "AS 4". The [0-9]* specifies that any connected AS with a valid AS number can pass the filter. The advantage of using the [0-9]* syntax is that it gives you
the flexibility to add any number of ASs without modifying this command string.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13754-26.html
QUESTION 284
Which two features improve BGP convergence? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Layer 3 Technologies
Explanation
Explanation/Reference:
Explanation:
The BGP Support for Next-Hop Address Tracking feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking
is event driven. BGP prefixes are automatically tracked as peering sessions are established. Next-hop changes are rapidly reported to the BGP routing process as
they are updated in the RIB. This optimization improves overall BGP convergence by reducing the response time to next-hop changes for routes installed in the
RIB. When a best path calculation is run in between BGP scanner cycles, only next-hop changes are tracked and processed.
BGP routers and route reflectors (RRs) propagate only their best path over their sessions. The advertisement of a prefix replaces the previous announcement of
that prefix (this behavior is known as an implicit withdraw). The implicit withdraw can achieve better scaling, but at the cost of path diversity.
Path hiding can prevent efficient use of BGP multipath, prevent hitless planned maintenance, and can lead to MED oscillations and suboptimal hot-potato routing.
Upon nexthop failures, path hiding also inhibits fast and local recovery because the network has to wait for BGP control plane convergence to restore traffic. The
BGP Additional Paths feature provides a generic way of offering path diversity; the Best External or Best Internal features offer path diversity only in limited
scenarios.
The BGP Additional Paths feature provides a way for multiple paths for the same prefix to be advertised without the new paths implicitly replacing the previous
paths. Thus, path diversity is achieved instead of path hiding.
References: http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_bgp/configuration/15-1sg/irg- nexthop-track.html
http://www.gratisexam.com/
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s- book/bgp_additional_paths.html
QUESTION 285
Which three statements about the route preference of IS-IS are true? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
QUESTION 288
DRAG DROP
Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
invalid IP addressing
fragmentation
incorrect NHRP mapping
incorrect NHRP authentication
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Configuring an authentication string ensures that only routers configured with the same string can communicate using NHRP. Therefore, if the authentication
http://www.gratisexam.com/
scheme is to be used, the same string must be configured in all devices configured for NHRP on a fabric
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#wp1055
QUESTION 292
In GETVPN, which key is used to secure the control plane?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
GDOI introduces two different encryption keys. One key secures the GET VPN control plane; the other key secures the data traffic. The key used to secure the
control plane is commonly called the Key Encryption Key (KEK), and the key used to encrypt data traffic is known as Traffic Encryption Key (TEK).
Reference. Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF
QUESTION 293
Which statement is true comparing L2TPv3 to EoMPLS?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Ethernet-over-MPLS (EoMPLS) provides a tunneling mechanism for Ethernet traffic through an MPLS-enabled L3 core and encapsulates Ethernet protocol data
units (PDUs) inside MPLS packets (using label stacking) to forward them across the MPLS network. Another technology that more or less achieves the result of
http://www.gratisexam.com/
AToM is L2TPV3. In the case of L2TPV3 Layer 2 frames are encapsulated into an IP packet instead of a labelled MPLS packet.
Reference. http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4- 3/lxvpn/configuration/guide/lesc43xbook/lesc43p2ps.html
QUESTION 294
Which statement is true about VPLS?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
VPLS uses MPLS labels so an MPLS network is required. VPLS MPLS packets have a two-label stack. The outer label is used for normal MPLS forwarding in the
service provider's network. If BGP is used to establish the VPLS, the inner label is allocated by a PE as part of a label block. If LDP is used, the inner label is a
virtual circuit ID assigned by LDP when it first established a mesh between the participating PEs. Every PE keeps track of assigned inner label, and associates
these with the VPLS instance.
Reference. http://en.wikipedia.org/wiki/Virtual_Private_LAN_Service
QUESTION 295
Refer to the exhibit.
http://www.gratisexam.com/
Service provider SP 1 is running the MPLS-VPN service. The MPLS core network has MP-BGP configured with RR-1 as route reflector. What will be the effect on
traffic between PE1 and PE2 if router P1 goes down?
A.
B.
C.
D.
No effect, because all traffic between PE1 and PE2 will be rerouted through P2.
No effect, because P1 was not the only P router in the forwarding path of traffic.
No effect, because RR-1 will find an alternative path for MP-BGP sessions to PE-1 and PE-2.
All traffic will be lost because RR-1 will lose the MP-BGP sessions to PE-1 and PE-2.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
If the connection to the route reflector goes down, then routes from PE-1 will not get advertised to PE2, and vice versa. Route reflectors are critical in an MPLS VPN
such as the one shown, which is why it is a best practice to have multiple route reflectors in this kind of network.
QUESTION 296
According to RFC 4577, OSPF for BGP/MPLS IP VPNs, when must the down bit be set?
A.
B.
C.
D.
when an OSPF route is distributed from the PE to the CE, for Type 3 LSAs
when an OSPF route is distributed from the PE to the CE, for Type 5 LSAs
when an OSPF route is distributed from the PE to the CE, for Type 3 and Type 5 LSAs
when an OSPF route is distributed from the PE to the CE, for all types of LSAs
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
If an OSPF route is advertised from a PE router into an OSPF area, the Down bit (DN) is set. Another PE router in the same area does not redistribute this route
into iBGP of the MPLS VPN network if down is set.
RFC 4577 says:
"When a type 3 LSA is sent from a PE router to a CE router, the DN bit in the LSA Options field MUST be set. This is used to ensure that if any CE router sends this
type 3 LSA to a PE router, the PE router will not redistribute it further. When a PE router needs to distribute to a CE router a route that comes from a site outside the
latter's OSPF domain, the PE router presents itself as an ASBR (Autonomous System Border Router), and distributes the route in a type 5 LSA. The DN bit [OSPFDN] MUST be set in these LSAs to ensure that they will be ignored by any other PE routers that receive them."
For more information about Down bit according to RFC 4577 please read more herE.
http://tools.ietf.org/html/rfc4577#section-4.2.5.1.
QUESTION 297
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Proxy Identities Not Supported
This message appears in debugs if the access list for IPsec traffic does not match.
1d00h: IPSec(validate_transform_proposal): proxy identities not supported
1d00h: ISAKMP: IPSec policy invalidated proposal
1d00h: ISAKMP (0:2): SA not acceptable!
The access lists on each peer needs to mirror each other (all entries need to be reversible). This example illustrates this point.
Peer A
access-list 150 permit ip 172.21.113.0 0.0.0.255 172.21.114.0 0.0.0.255
access-list 150 permit ip host 15.15.15.1 host 172.21.114.123
Peer B
access-list 150 permit ip 172.21.114.0 0.0.0.255 172.21.113.0 0.0.0.255
access-list 150 permit ip host 172.21.114.123 host 15.15.15.1
Reference. http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike- protocols/5409-ipsec-debug-00.html#proxy
QUESTION 298
What is a key advantage of Cisco GET VPN over DMVPN?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
DMVPN requires overlaying a secondary routing infrastructure through the tunnels, which results in suboptimal routing while the dynamic tunnels are built. The
overlay routing topology also reduces the inherent scalability of the underlying IP VPN network topology.
Traditional point-to-point IPsec tunneling solutions suffer from multicast replication issues because multicast replication must be performed before tunnel
encapsulation and encryption at the IPsec CE (customer edge) router closest to the multicast source. Multicast replication cannot be performed in the provider
network because encapsulated multicasts appear to the core network as unicast data.
Cisco's Group Encrypted Transport VPN (GET VPN) introduces the concept of a trusted group to eliminate point-to-point tunnels and their associated overlay
routing. All group members (GMs) share a common security association (SA), also known as a group SA. This enables GMs to decrypt traffic that was encrypted by
any other GM. (Note that IPsec CE acts as a GM.) In GET VPN networks, there is no need to negotiate point-to- point IPsec tunnels between the members of a
group, because GET VPN is "tunnel-less."
Reference. Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF
QUESTION 299
Refer to the exhibit.
What is wrong with the configuration of the tunnel interface of this DMVPN Phase II spoke router?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
By default, tunnel interfaces use GRE as the tunnel mode, but a DMVPN router needs to be configured for GRE multipoint by using the "tunnel mode gre multipoint"
interface command.
QUESTION 300
Which two statements are true about VPLS? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
VPLS relies on flooding to propagate MAC address reachability information. Therefore, flooding cannot be prevented.
VPLS can carry a single VLAN per VPLS instance. To multiplex multiple VLANs on a single instance, VPLS uses IEEE QinQ.
Reference. http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series- switches/white_paper_c11-574984.html
QUESTION 301
Refer to the exhibit.
http://www.gratisexam.com/
A.
B.
C.
D.
RT:200:3000 RT:200:9999
RT:200:9999 RT:200:3000
RT:200:3000
RT:200:9999
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Here the route map is being used to manually set the extended community RT to 200:9999
QUESTION 302
Refer to the exhibit.
http://www.gratisexam.com/
There is an MPLS network that is running 6PE, and the ingress PE router has no mpls ip propagate-ttl.
There is an MPLS network that is running 6VPE, and the ingress PE router has no mpls ip propagate-ttl.
There is an MPLS network that is running 6PE or 6VPE, and the ingress PE router has mpls ip propagate-ttl.
There is an MPLS network that is running 6PE, and the ingress PE router has mpls ip propagate- ttl.
There is an MPLS network that is running 6VPE, and the ingress PE router has mpls ip propagate-ttl.
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The second hop shows and IPV6 address over MPLS, so we know that there is an MPLS network running 6PE or 6VPE. And because the second and third hops
http://www.gratisexam.com/
show up in the traceroute. Then TTL is being propagated because if the "no ip propagate-ttl" command was used these devices would be hidden in the traceroute.
QUESTION 303
Refer to the exhibit.
Which statement is true about a VPNv4 prefix that is present in the routing table of vrf one and is advertised from this router?
A.
B.
C.
D.
E.
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The route target used for prefix advertisements to other routers is defined on the route-target export command, which shows 100:1 in this case for VPNv4 routes.
QUESTION 304
Which is the way to enable the control word in an L2 VPN dynamic pseudowire connection on router R1?
http://www.gratisexam.com/
spoke-spoke
nowhere, because multicast does not work over DMVPN
spoke-spoke and spoke-hub
spoke-hub
Correct Answer: D
Section: VPN Technologies
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
Spokes map multicasts to the static NBMA IP address of the hub, but hub maps multicast packets to the "dynamic" mappings that is, the hub replicates multicast
packets to all spokes registered via NHRP, so multicast traffic is sent to the hub from a spoke instead of to the other spokes directly.
QUESTION 306
Refer to the exhibit.
A spoke site that is connected to Router-A cannot reach a spoke site that is connected to Router-B, but both spoke sites can reach the hub. What is the likely cause
of this issue?
A.
B.
C.
D.
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
If one spoke is behind one NAT device and another different spoke is behind another NAT device, and Peer Address Translation (PAT) is the type of NAT used on
both NAT devices, then a session initiated between the two spokes cannot be established.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/conv ert/sec_dmvpn_xe_3s_book/
http://www.gratisexam.com/
sec_dmvpn_dt_spokes_b_nat_xe.html
QUESTION 307
Which three statements are functions that are performed by IKE phase 1? (Choose three.)
A.
B.
C.
D.
E.
F.
Correct Answer: C
http://www.gratisexam.com/
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: CE
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing error message means that the generic routing encapsulation (GRE) tunnel
router has discovered a recursive routing problem. This condition is usually due to one of these causes:
A misconfiguration that causes the router to try to route to the tunnel destination address using the tunnel interface itself (recursive routing)
A temporary instability caused by route flapping elsewhere in the network
Reference. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing- protocol-eigrp/22327-gre-flap.html
QUESTION 311
Refer to the exhibit.
http://www.gratisexam.com/
Which two statements about the VPN solution are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: CE
Section: VPN Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
+ VPN1 exports 10:1 while VPN3 imports 10:1 so VPN3 can learn routes of VPN1. + VNP1 imports 10:1 while VNP3 export 10:1 so VNP1 can learn routes of
VPN3.
-> Customer A can communicate with Customer C
+ VPN2 exports 20:1 while VPN3 imports 20:1 so VPN3 can learn routes of VPN2. + VPN2 imports 20:1 while VPN3 exports 20:1 so VPN2 can learn routes of
VPN3.
-> Customer B can communicate with Customer C
Therefore answer C is correct.
Also answer E is correct because R1 & R2 import R3 routes.
Answer A is not correct because Customer A & Customer B do not import routes which are exported by other router. Customer A & B can only see Customer C.
Answer B is not correct because a router never exports what it has learned through importation. It only exports its own routes.
Answer D is correct because two VPN1 and VPN2 cannot see each other. Maybe in this question there are three correct answers.
QUESTION 312
Which mechanism does Cisco recommend for CE router interfaces that face the service provider for an EVPL circuit with multiple EVCs and multiple traffic
classes?
A.
B.
C.
D.
HCBWFQ
LLQ
tail drop
WRED
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
In a simple handoff, packets may be discarded in the service provider network, either because of congestion on a link without an appropriate QoS policy or because
of a policer QoS configuration on the service provider network that serves to rate limit traffic accessing the WAN core. To address these issues, QoS on the CE
device is applied at a per-port level. A QoS service policy is configured on the outside Ethernet interface, and this parent policy includes a shaper that then
references a second or subordinate (child) policy that enables queueing within the shaped rate. This is called a hierarchical CBWFQ (HCBWFQ) configuration.
Reference.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/Ethernet_Access_for_ NG_MAN_WAN_V3-1_external.html
http://www.gratisexam.com/
QUESTION 313
Which Carrier Ethernet service supports the multiplexing of multiple point-to-point EVCs across as a single UNI?
A.
B.
C.
D.
EPL
EVPL
EMS
ERMS
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Ethernet Relay Service (ERS or EVPL)
An Ethernet Virtual Circuit (EVC) is used to logically connect endpoints, but multiple EVCs could exist per single UNI. Each EVC is distinguished by 802.1q VLAN
tag identification. The ERS network acts as if the Ethernet frames have crossed a switched network, and certain control traffic is not carried between ends of the
EVC. ERS is analogous to Frame Relay where the CE-VLAN tag plays the role of a Data-Link Connection Identifier (DLCI). The MEF term for this service is EVPL.
Reference. http://www.cisco.com/c/en/us/td/docs/net_mgmt/ip_solution_center/5- 1/carrier_ethernet/user/guide/l2vpn51book/concepts.html
QUESTION 314
What is the purpose of Route Target Constraint?
A.
B.
C.
D.
E.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Some service providers have a very large number of routing updates being sent from RRs to PEs, using considerable resources. A PE does not need routing
updates for VRFs that are not on the PE; therefore, the PE determines that many routing updates it receives are "unwanted." The PE can filter out the unwanted
updates using Route Target Constraint.
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/ios_xe/iproute_bgp/configuration/guide/2_xe/irg_xe_boo k/irg_rt_filter_xe.html.
QUESTION 315
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Same example of this provided on slide 24 at the reference link below:
Reference. "mVPN Deployment Models" Cisco Live Presentation http://d2zmdbbm9feqrf.cloudfront.net/2014/eur/pdf/BRKIPM-2011.pdf, slide 24
QUESTION 316
Refer to the exhibit.
http://www.gratisexam.com/
R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20.
The default route 0.0.0.0/0 is available in the IPv4 routing table.
R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available.
R1 has preferred-path configured for the pseudowire.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Verifying the Configuration: Example
In the following example, the show mpls l2transport vc command shows the following information (in bold) about the VCs:
VC 101 has been assigned a preferred path called Tunnel1. The default path is disabled because the preferred path specified that the default path should not be
used if the preferred path fails.
http://www.gratisexam.com/
VC 150 has been assigned an IP address of a loopback address on PE2. The default path can be used if the preferred path fails.
Router# show mpls l2transport vc detail
Local interfacE. Gi0/0/0.1 up, line protocol up, Eth VLAN 222 up
Destination address: 10.16.16.16, VC ID. 101, VC status: up
Preferred path: Tunnel1, active
Default path: disabled
Tunnel label: 3, next hop point2point
Output interfacE. Tu1, imposed label stack {17 16}
Create timE. 00:27:31, last status change timE. 00:27:31
Signaling protocol: LDP, peer 10.16.16.16:0 up
MPLS VC labels: local 25, remote 16
Group ID. local 0, remote 6
MTU: local 1500, remote 1500
Remote interface description:
Sequencing: receive disabled, send disabled
VC statistics:
packet totals: receive 10, send 10
byte totals: receive 1260, send 1300
packet drops: receive 0, send 0
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srtunsel.html#wp1057815
QUESTION 317
For which kind of MPLS deployment is the next-hop-self all keyword used on a BGP neighbor command?
A.
B.
C.
D.
E.
6VPE
MPLS Carrier's carrier
inter-AS MPLS VPN option D
inter-AS MPLS VPN option C
Unified MPLS
Correct Answer: E
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Since the core and aggregation parts of the network are integrated and end-to-end LSPs are provided, the Unified MPLS solution is also referred to as "Seamless
MPLS."
New technologies or protocols are not used here, only MPLS, Label Distribution Protocol (LDP), IGP, and BGP. Since you do not want to distribute the loopback
http://www.gratisexam.com/
prefixes of the PE routers from one part of the network into another part, you need to carry the prefixes in BGP. The Internal Border Gateway Protocol (iBGP) is
used in one network, so the next hop address of the prefixes is the loopback prefixes of the PE routers, which is not known by the IGP in the other parts of the
network. This means that the next hop address cannot be used to recurse to an IGP prefix. The trick is to make the ABR routers Route Reflectors (RR) and set the
next hop to self, even for the reflected iBGP prefixes. In order for this to work, a new knob is needed.
Only the RRs need newer software to support this architecture. Since the RRs advertise the BGP prefixes with the next hop set to themselves, they assign a local
MPLS label to the BGP prefixes. This means that in the data plane, the packets forwarded on these end-to-end LSPs have an extra MPLS label in the label stack.
The RRs are in the forwarding path.
There are two possible scenarios:
The ABR does not set the next hop to self for the prefixes advertised (reflected by BGP) by the ABR into the aggregation part of the network. Because of this,
the ABR needs to redistribute the loopback prefixes of the ABRs from the core IGP into the aggregation IGP. If this is done, there is still scalability. Only the ABR
loopback prefixes (from the core) need to be advertised into the aggregation part, not the loopback prefixes from the PE routers from the remote aggregation
parts.
The ABR sets the next hop to self for the prefixes advertised (reflected by BGP) by the ABR into the aggregation part. Because of this, the ABR does not need to
redistribute the loopback prefixes of the ABRs from the core IGP into the aggregation IGP. In both scenarios, the ABR sets the next hop to self for the prefixes
advertised (reflected by BGP) by the ABR from the aggregation part of the network into the core part. If this is not done, the ABR needs to redistribute the
loopback prefixes of the PEs from the aggregation IGP into the core IGP.
If this is done, there is no scalability.
In order to set the next hop to self for reflected iBGP routes, you must configure the neighbor x.x.x.x next-hop-self all command.
Reference. http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching- mpls/mpls/116127-configure-technology-00.html
QUESTION 318
What is a reason for 6PE to use two MPLS labels in the data plane instead of one?
A.
B.
C.
D.
6PE allows penultimate hop popping and has a requirement that all P routers do not have to be IPv6 aware.
6PE does not allow penultimate hop popping.
It allows MPLS traffic engineering to work in a 6PE network.
It allows 6PE to work in an MPLS network where 6VPE is also deployed.
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Q. Why does 6PE use two MPLS labels in the data plane?
A. 6PE uses two labels:
The top label is the transport label, which is assigned hop-by-hop by the Label Distribution Protocol (LDP) or by MPLS traffic engineering (TE).
The bottom label is the label assigned by the Border Gateway Protocol (BGP) and advertised by the internal BGP (iBGP) between the Provider Edge (PE)
routers.
When the 6PE was released, a main requirement was that none of the MPLS core routers (the P routers) had to be IPv6-aware. That requirement drove the need
http://www.gratisexam.com/
http://www.gratisexam.com/
Which two corrective actions could you take if EIGRP routes from R2 fail to reach R1? (Choose two.)
A.
B.
C.
D.
Correct Answer: BD
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
In this question we are running VRF Lite on R1. VRF Lite is also knows as "VRF without running MPLS". This is an example of how to configure VRF Lite with
EIGRP:
http://www.gratisexam.com/
ip vrf FIRST
rd 1:1
!
ip vrf SECOND
rd 1:2
!
router eigrp 1
no auto-summary
!
address-family ipv4 vrf FIRST
network 10.1.1.1 0.0.0.0
no auto-summary
autonomous-system 200
exit-address-family
!
address-family ipv4 vrf SECOND
network 10.1.2.1 0.0.0.0
no auto-summary
autonomous-system 100
exit-address-family
!
interface FastEthernet0/0
ip vrf forwarding FIRST
ip address 10.1.1.1
255.255.255.0
!
interface FastEthernet0/1
ip vrf forwarding SECOND
ip address 10.1.2.1
255.255.255.0
The above example creates two VRFs (named "FIRST" and "SECOND"). VRF "FIRST" runs on EIGRP AS 200 while VRF "SECOND" runs on EIGRP AS 100. After
that we have to add interfaces to the appropriate VRFs. From this example, back to our question we can see that R1 is missing the "autonomous-system ..."
command under "address-family ipv4 vrf R2. And R1 needs an interface configured under that VRF.
Note. R2 does not run VRF at all! Usually R2 resides on customer side.
QUESTION 320
A service provider is deploying L2VPN LAN services in its MPLS cloud. Which statement is true regarding LDP signaling and autodiscovery?
A. LDP signaling requires that each PE is identified, and that an LDP session is active with its P neighbor for autodiscovery to take place.
B. LDP signaling requires that each P is identified, and that a targeted LDP session is active for autodiscovery to take place.
http://www.gratisexam.com/
C. LDP signaling requires that each PE is identified, and that a targeted LDP session with a BGP route reflector is active for autodiscovery to take place.
D. LDP signaling requires that each PE is identified, and that a targeted LDP session is active for autodiscovery to take place.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
LDP signaling requires that each PE is identified and a targeted LDP session is active for autodiscovery to take place. Although the configuration can be automated
using NMS/OSS the overall scalability of the solution is poor as a PE must be associated with all other PEs for LDP discovery to work, which can lead to a large
number of targeted LDP sessions (n2), which may be largely unused as not all VPLS will be associated with every PE. The security attributes of LDP are reasonably
good, although additional configuration is required to prevent unauthorized sessions being set up. Although LDP can signal additional attributes, it requires
additional configuration either from an NMS/OSS or static configuration.
Reference.
http://www.cisco.com/en/US/products/hw/routers/ps368/products_white_paper09186a00801f6084.
shtml
QUESTION 321
Which attribute is not part of the BGP extended community when a PE creates a VPN-IPv4 route while running OSPF between PE-CE?
A.
B.
C.
D.
E.
Correct Answer: E
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
By process of elimination, from RFC 4577:
For every address prefix that was installed in the VRF by one of its associated OSPF instances, the PE must create a VPN-IPv4 route in BGP. Each such route will
have some of the following Extended Communities attributes:
- The OSPF Domain Identifier Extended Communities attribute. If the OSPF instance that installed the route has a non-NULL primary Domain Identifier, this MUST
be present; if that OSPF instance has only a NULL Domain Identifier, it MAY be omitted.
- OSPF Route Type Extended Communities Attribute. This attribute MUST be present. It is encoded with a two-byte type field, and its type is 0306.
http://www.gratisexam.com/
- OSPF Router ID Extended Communities Attribute. This OPTIONAL attribute specifies the OSPF Router ID of the system that is identified in the BGP Next Hop
attribute. More precisely, it specifies the OSPF Router Id of the PE in the OSPF instance that installed the route into the VRF from which this route was exported.
- MED (Multi_EXIT_DISC attribute). By default, this SHOULD be set to the value of the OSPF distance associated with the route, plus 1.
Reference. https://tools.ietf.org/html/rfc4577
QUESTION 322
What is a disadvantage of using aggressive mode instead of main mode for ISAKMP/IPsec establishment?
A.
B.
C.
D.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
IKE phase 1's purpose is to establish a secure authenticated communication channel by using the DiffieHellman key exchange algorithm to generate a shared
secret key to encrypt further IKE communications. This negotiation results in one single bi-directional ISAKMP Security Association (SA). The authentication can be
performed using either pre-shared key (shared secret), signatures, or public key encryption.Phase 1 operates in either Main Mode or Aggressive Mode. Main Mode
protects the identity of the peers; Aggressive Mode does not.
Reference. http://en.wikipedia.org/wiki/Internet_Key_Exchange
QUESTION 323
Which two statements are true about an EVPL? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: VPN Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
Following the MEF approach, the services that comprise the Metro Ethernet (ME) solution can be classified into the following two general categories:
Point-to-point (PtP)--A single point-to-point Ethernet circuit provisioned between two User Network Interfaces (UNIs).
Multipoint-to-multipoint (MPtMP)--A single multipoint-to-multipoint Ethernet circuit provisioned between two or more UNIs. When there are only two UNIs in the
circuit, more UNIs can be added to the same Ethernet virtual connection if required, which distinguishes this from the point-to-point type.
In the MEF terminology, this maps to the following Ethernet service types:
Ethernet Line Service Type (E-Line)--Point-to-point Ethernet service
Ethernet LAN Service Type (E-LAN)--Multipoint-to-multipoint Ethernet service
Reference.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/HA_Clusters/HA_Clusters/ HA_ME3_6.pdf
QUESTION 324
Which two statements are true about OTV? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The overlay nature of OTV allows it to work over any transport as long as this transport can forward IP packets. Any optimizations performed for IP in the transport
will benefit the OTV encapsulated traffic.
As part of the OTV control protocol, automatic detection of multihoming is included. This feature enables the multihoming of sites without requiring additional
configuration or protocols
Reference. http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series- switches/white_paper_c11-574984.html
QUESTION 325
Which technology facilitates neighbor IP address resolution in DMVPN?
A.
B.
C.
D.
CEF
mGRE
a dynamic routing protocol
NHRP
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
NHRP Used with a DMVPN
NHRP is used to facilitate building a VPN and provides address resolution in DMVPN. In this context, a VPN consists of a virtual Layer 3 network that is built on top
of an actual Layer 3 network. The topology you use over the VPN is largely independent of the underlying network, and the protocols you run over it are completely
independent of it. The VPN network (DMVPN) is based on GRE IP logical tunnels that can be protected by adding in IPsec to encrypt the GRE IP tunnels.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html#wp1057
QUESTION 326
Which two are features of DMVPN? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
DMVPN Hub-and-spoke deployment model: In this traditional topology, remote sites (spokes) are aggregated into a headend VPN device at the corporate
headquarters (hub). Traffic from any remote site to other remote sites would need to pass through the headend device. Cisco DMVPN supports dynamic routing,
QoS, and IP Multicast while significantly reducing the configuration effort.
Reference. http://www.cisco.com/c/en/us/products/collateral/security/dynamic-multipoint-vpn- dmvpn/data_sheet_c78-468520.html
QUESTION 327
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Sending of IPv6 router advertisements is disabled by default on tunnel interfaces. This command reenables the sending of IPv6 router advertisements to allow client
autoconfiguration:
Example:
Router(config-if)# no ipv6 nd ra suppress
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s- book/ip6-isatap-xe.html
QUESTION 328
Which two statements are true about a 6to4 tunnel connecting two IPv6 islands over the IPv4 Internet? (Choose two.)
A.
B.
C.
D.
It embeds the IPv6 packet into the IPv4 payload with the protocol type set to 51.
It works by appending the private IPv4 address (converted into hexadecimal format) to the 2002::/16 prefix.
It embeds the IPv6 packet into the IPv4 payload with the protocol type set to 41.
It works by appending the public IPv4 address (converted into hexadecimal format) to the 2002::/16 prefix.
Correct Answer: CD
Section: VPN Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
6to4 embeds an IPv6 packet in the payload portion of an IPv4 packet with protocol type 41. To send an IPv6 packet over an IPv4 network to a 6to4 destination
address, an IPv4 header with protocol type 41 is prepended to the IPv6 packet. The IPv4 destination address for the prepended packet header is derived from the
IPv6 destination address of the inner packet (which is in the format of a 6to4 address), by extracting the 32 bits immediately following the IPv6 destination address's
2002::/16 prefix. The IPv4 source address in the prepended packet header is the IPv4 address of the host or router which is sending the packet over IPv4. The
resulting IPv4 packet is then routed to its IPv4 destination address just like any other IPv4 packet.
Reference. http://en.wikipedia.org/wiki/6to4
QUESTION 329
Refer to the exhibit.
1500
1524
1476
1452
1548
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
In the case of the GRE tunnel interface, the IP maximum transmission unit (MTU) is 24 bytes less than the IP MTU of the real outgoing interface. For an Ethernet
outgoing interface that means the IP MTU on the tunnel interface would be 1500 minus 24, or 1476 bytes.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/13725- 56.html
QUESTION 330
On an MPLS L3VPN, which two tasks are performed by the PE router? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AC
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
MPLS VPN functionality is enabled at the edge of an MPLS network. The PE router performs these tasks:
Exchanges routing updates with the CE router
Translates the CE routing information into VPN version 4 (VPNv4) routes
Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol (MP-BGP)
A PE router binds a label to each customer prefix learned from a CE router and includes the label in the network reachability information for the prefix that it
advertises to other PE routers. When a PE router forwards a packet received from a CE router across the provider network, it labels the packet with the label
learned from the destination PE router. When the destination PE router receives the labeled packet, it pops the label and uses it to direct the packet to the correct
CE router. Label forwarding across the provider backbone is based on either dynamic label switching or traffic engineered paths. A customer data packet carries
two levels of labels when traversing the backbone
Reference. http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4- 2/lxvpn/configuration/guide/vcasr9kv342/vcasr9k42v3.html
QUESTION 331
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Show NHRP: Examples
The following is sample output from the show ip nhrp command:
Router# show ip nhrp
10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16
TypE. dynamic Flags: authoritative
NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11
10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56
TypE. static Flags: authoritative
The fields in the sample display are as follows:
Flags:
- authoritative--Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a
particular destination.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html
QUESTION 332
http://www.gratisexam.com/
Which two statements about this configuration are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AC
Section: VPN Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
NHRP is a client/server model protocol which is defined by RFC2332. The hub is considered to be the Next Hop Server (NHS) and the spokes are considered to be
the Next Hop Client (NHC). The hub must be configured as the next-hop server.
NHRP provides a mapping between the inside and outside address of a tunnel endpoint. These mappings can be static or dynamic. In a dynamic scenario, a nexthop server (NHS) is used to maintain a list of possible tunnel endpoints. Each endpoint using the NHS registers its own public and private mapping with the NHS.
The local mapping of the NHS must always be static. It is important to note that the branch points to the inside or protected address of the NHS server. This
scenario is an example of dynamic mappings.
Reference.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMVPN_ 2_Phase2.html
QUESTION 333
Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.)
A.
B.
C.
D.
6to4 tunneling
ISATAP tunneling
manual tunneling
GRE tunneling
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/ip6- tunnel.html
QUESTION 334
Which two services are used to transport Layer 2 frames across a packet-switched network? (Choose two.)
A. Frame Relay
http://www.gratisexam.com/
http://www.gratisexam.com/
B. ATM
C. AToM
D. L2TPv3
Correct Answer: CD
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Both AToM and L2TPv3 have the common objective of transmitting packet switched traffic of L2 frames (Frame Relay, ATM, and Ethernet) across a packetswitched network.
Reference. Layer 2 VPN Architectures - Google Books Result Wei Luo, Carlos Pignataro, Anthony Chan
https://books.google.com/books?isbn=0132796864
QUESTION 335
Which two statements about the C-bit and PW type are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: BD
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every
pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. Pseudowire Type--PW Type is a 15bit field that represents the type of pseudowire.
Reference. http://www.ciscopress.com/articles/article.asp?p=386788&seqNum=2
QUESTION 336
Which statement describes the function of rekey messages?
A.
B.
C.
D.
They prevent unencrypted traffic from passing through a group member before registration.
They refresh IPsec SAs when the key is about to expire.
They trigger a rekey from the server when configuring the rekey ACL.
They authenticate traffic passing through a particular group member.
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Rekey messages are used to refresh IPsec SAs. When the IPsec SAs or the rekey SAs are about to expire, one single rekey message for a particular group is
generated on the key server. No new IKE sessions are created for the rekey message distribution. The rekey messages are distributed by the key server over an
existing IKE SA. Rekeying can use multicast or unicast messages.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_getvpn/configuration/xe- 3s/sec-get-vpn-xe-3s-book/sec-get-vpn.html
QUESTION 337
Which three statements about GET VPN are true? (Choose three.)
A.
B.
C.
D.
E.
F.
It encrypts WAN traffic to increase data security and provide transport authentication.
It provides direct communication between sites, which reduces latency and jitter.
It can secure IP multicast, unicast, and broadcast group traffic.
It uses a centralized key server for membership control.
It enables the router to configure tunnels.
It maintains full-mesh connectivity for IP networks.
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
Cisco GET VPN Features and Benefits
http://www.gratisexam.com/
http://www.gratisexam.com/
http://www.gratisexam.com/
If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two).
A. Configure the transform-set on R2 to match the configuration on R1.
B. Configure the crypto map on R2 to include the correct subnet.
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Which statement is true about a valid IPv6 address that can be configured on interface tunnel0?
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64 bits are the IPv6 prefix. The first 16 bits of the prefix are always
2002:, the next 32 bits are the IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets behind the same 6to4 router. Since
the IPv6 hosts using autoconfiguration already have determined the unique 64 bit host portion of their address, they must simply wait for a Router Advertisement
indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router will know to send an encapsulated packet directly over IPv4 if the first 16 bits are
2002, using the next 32 as the destination, or otherwise send the packet to a well-known relay server, which has access to native IPv6.
Reference. http://en.wikipedia.org/wiki/6to4
QUESTION 341
Which technology is not necessary to set up a basic MPLS domain?
A.
B.
C.
D.
E.
IP addressing
an IGP
LDP or TDP
CEF
a VRF
Correct Answer: E
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The simplest form of VRF implementation is VRF Lite. In this implementation, each router within the network participates in the virtual routing environment in a peerbased fashion. While simple to deploy and appropriate for small to medium enterprises and shared data centres, VRF Lite does not scale to the size required by
global enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. VRFs were initially
introduced in combination with MPLS, but VRF proved to be so useful that it eventually evolved to live independent of MPLS. This is the historical explanation of the
term VRF LitE. usage of VRFs without MPLS.
Reference. http://en.wikipedia.org/wiki/Virtual_routing_and_forwarding
QUESTION 342
What is the main component of Unified MPLS?
http://www.gratisexam.com/
A.
B.
C.
D.
Multiple IGPs in the network are used, where the loopback IP addresses of the PE routers are aggregated on the area border routers.
Confederations are used to provide scalability.
The loopback prefixes from one IGP area are redistributed into BGP without changing the next hop.
The ABR is a BGP route reflector and sets next-hop to self for all reflected routes.
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Since the core and aggregation parts of the network are integrated and end-to-end LSPs are provided, the Unified MPLS solution is also referred to as "Seamless
MPLS."
New technologies or protocols are not used here, only MPLS, Label Distribution Protocol (LDP), IGP, and BGP. Since you do not want to distribute the loopback
prefixes of the PE routers from one part of the network into another part, you need to carry the prefixes in BGP. The Internal Border Gateway Protocol (iBGP) is
used in one network, so the next hop address of the prefixes is the loopback prefixes of the PE routers, which is not known by the IGP in the other parts of the
network. This means that the next hop address cannot be used to recurse to an IGP prefix. The trick is to make the ABR routers Route Reflectors (RR) and set the
next hop to self, even for the reflected iBGP prefixes. In order for this to work, a new knob is needed.
Reference. http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching- mpls/mpls/116127-configure-technology-00.html
QUESTION 343
For which feature is the address family "rtfilter" used?
A.
B.
C.
D.
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
With Multiprotocol Label Switching (MPLS) VPN, the internal Border Gateway Protocol (iBGP) peer or Route Reflector (RR) sends all VPN4 and/or VPN6 prefixes to
the PE routers. The PE router drops the VPN4/6 prefixes for which there is no importing VPN routing and forwarding (VRF). This is a behavior where the RR sends
VPN4/6 prefixes to the PE router, which it does not need. This is a waste of processing power on the RR and the PE and a waste of bandwidth.
With Route Target Constraint (RTC), the RR sends only wanted VPN4/6 prefixes to the PE. 'Wanted' means that the PE has VRF importing the specific prefixes.
http://www.gratisexam.com/
RFC 4684 specifies Route Target Constraint (RTC). The support is through a new address family rtfilter for both VPNv4 and VPNv6.
Reference. http://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching- mpls/mpls/116062-technologies-technote-restraint-00.html
QUESTION 344
Refer to the exhibit.
Correct Answer: E
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Return Codes
The Return Code is set to zero by the sender. The receiver can set it to one of the values listed below. The notation <RSC> refers to the Return Subcode. This field
is filled in with the stack-depth for those codes that specify that. For all other codes, the Return Subcode MUST be set to zero.
Value Meaning
----- ------0 No return code
1 Malformed echo request received
2 One or more of the TLVs was not understood
3 Replying router is an egress for the FEC at stackdepth <RSC>
4 Replying router has no mapping for the FEC at stackdepth <RSC>
Reference. https://www.ietf.org/rfc/rfc4379.txt
QUESTION 345
Which two values comprise the VPN ID for an MPLS VPN? (Choose two.)
A.
B.
C.
D.
E.
an OUI
a VPN index
a route distinguisher
a 16-bit AS number
a 32-bit IP address
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Each MPLS VPN ID defined by RFC 2685 consists of the following elements:
An Organizational Unique Identifier (OUI), a three-octet hex number: The IEEE Registration Authority assigns OUIs to any company that manufactures
components under the ISO/IEC 8802 standard. The OUI is used to generate universal LAN MAC addresses and protocol identifiers for use in local and
metropolitan area network applications. For example, an OUI for Cisco Systems is 00-03-6B (hex).
A Virtual Private Network (VPN) index: a four-octet hex number, which identifies the VPN within the company.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l3_vpns/configuration/15-mt/mp- l3-vpns-15-mt-book/mp-assgn-id-vpn.html
QUESTION 346
Refer to the exhibit.
http://www.gratisexam.com/
Which LISP component do routers in the public IP network use to forward traffic between the two networks?
A.
B.
C.
D.
EID
RLOC
map server
map resolver
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address:
Endpoint identifiers (EIDs)--assigned to end hosts.
Routing locators (RLOCs)--assigned to devices (primarily routers) that make up the global routing system. The public networks use the RLOC to forward traffic
between networks.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/15-mt/irl- 15-mt-book/irl-overview.html
QUESTION 347
Refer to the exhibit.
http://www.gratisexam.com/
an NHS only
an NHC only
an NHS or an NHC
a DMVPN hub router
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
NHRP works off a server/client relationship, where the NHRP clients (let's call them next hop clients/NHCs) register with their next hop server (NHS), it's the
responsibility of the NHS to track all of its NHCs this is done with registration request and reply packets. Here we see a registration request, which can only be sent
by an NHC.
QUESTION 348
Which statement about the NHRP network ID is true?
A. It is sent from the spoke to the hub to identify the spoke as a member of the same NHRP domain.
B. It is sent from the hub to the spoke to identify the hub as a member of the same NHRP domain.
C. It is sent between spokes to identify the spokes as members of the same NHRP domain.
http://www.gratisexam.com/
http://www.gratisexam.com/
QUESTION 350
Which IPv6 prefix is used for 6to4 tunnel addresses?
A.
B.
C.
D.
E.
2001. . /23
2002. . /16
3ffe. . /16
5f00. . /8
2001. . /32
Correct Answer: B
http://www.gratisexam.com/
Correct Answer: CF
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
If you enable the ip pmtu command in the pseudowire class, the L2TPv3 control channel participates in the path MTU discovery. When you enable this feature, the
following processing is performed:
ICMP unreachable messages sent back to the L2TPv3 router are deciphered and the tunnel MTU is updated accordingly. In order to receive ICMP unreachable
messages for fragmentation errors, the DF bit in the tunnel header is set according to the DF bit value received from the CE, or statically if the ip dfbit set option
is enabled. The tunnel MTU is periodically reset to the default value based on a periodic timer.
ICMP unreachable messages are sent back to the clients on the CE side. ICMP unreachable messages are sent to the CE whenever IP packets arrive on the
CE-PE interface and have a packet size greater than the tunnel MTU. A Layer 2 header calculation is performed before the ICMP unreachable message is sent
to the CE.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/l2tpv325.html
QUESTION 352
Which two parameters does the Tunnel Mode Auto Selection feature select automatically? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The Tunnel Mode Auto Selection feature eases the configuration and spares you about knowing the responder's details. This feature automatically applies the
tunneling protocol (GRE or IPsec) and transport protocol (IPv4 or IPv6) on the virtual template as soon as the IKE profile creates the virtual access interface. This
feature is useful on dual stack hubs aggregating multivendor remote access, such as Cisco AnyConnect VPN Client, Microsoft Windows7 Client, and so on.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe- 3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-ipsec-virt-tunnl.html
QUESTION 353
By default, how does a GET VPN group member router handle traffic when it is unable to register to a key server?
A.
B.
C.
D.
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
In the basic GETVPN configuration, the traffic passing through group members will be sent in clear until it registers with the Key Server. This is because the crypto
ACL is configured on the KS and GM will get that information only after the registration is successful. This means for a short period of time the traffic can go out
unencrypted after a GM is booted up or the existing GETVPN session is cleared manually. This mode is called "fail open" and it is the default behavior. This
behavior can be turned off by configuring "Fail Close" mode on the GMs.
Reference. http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport- vpn/deployment_guide_c07_554713.html
http://www.gratisexam.com/
QUESTION 354
DRAG DROP
Drag and drop each GET VPN feature on the left to the corresponding function it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
The router excludes the link from its OSPF LSA type 1.
The router flushes its own router LSA.
The router advertises the link in its router LSA with max-metric.
The router advertises an LSA type 2 for this link, with the metric set to max-metric.
The router advertises the link and OSPF adjacency as it would when the synchronization is achieved.
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
http://www.gratisexam.com/
Explanation:
To enable LDP-IGP Synchronization on each interface that belongs to an OSPF or IS-IS process, enter the mpls ldp sync command. If you do not want some of the
interfaces to have LDP-IGP Synchronization enabled, issue the no mpls ldp igp sync command on those interfaces. If the LDP peer is reachable, the IGP waits
indefinitely (by default) for synchronization to be achieved. To limit the length of time the IGP session must wait, enter the mpls ldp igp sync holddown command. If
the LDP peer is not reachable, the IGP establishes the adjacency to enable the LDP session to be established.
When an IGP adjacency is established on a link but LDP-IGP Synchronization is not yet achieved or is lost, the IGP advertises the max-metric on that link.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsldpsyn.html
QUESTION 356
What is the new designation for the MPLS EXP (experimental) bits?
A.
B.
C.
D.
QoS bits
traffic class bits
flow bits
precedence bits
Correct Answer: B
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
To avoid misunderstanding about how this field may be used, it has become increasingly necessary to rename this field. This document changes the name of the
EXP field to the "Traffic Class field" ("TC field"). In doing so, it also updates documents that define the current use of the EXP field.
Reference. https://tools.ietf.org/html/rfc5462
QUESTION 357
Which two options are signaling protocols that are used in MPLS? (Choose two.)
A.
B.
C.
D.
E.
F.
LDP
RSVP
BFD
LISP
CLNS
CDP
Correct Answer: AB
http://www.gratisexam.com/
Correct Answer: E
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
In the case of MPLS-VPN Backbone as The OSPF superbackbone behaves exactly like Area 0 in regular OSPF, so we cannot have two different area 0's that are
not directly connected to each other. When area 0 connects to the superbackbone, it simply becomes an extension of area 0.
QUESTION 359
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: C
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Here we are using route maps to change the route target for the 192.168.1.0/24 network from the default route target of 64512:100010051 to 64512:3002300.
QUESTION 360
Which three options are best practices for implementing a DMVPN? (Choose three.)
A. Use IPsec in tunnel mode.
B. Implement Dead Peer Detection to detect communication loss.
http://www.gratisexam.com/
C.
D.
E.
F.
pseudowire ID
pseudowire type
control word
Layer 3 PDU
header checksum
type of service
http://www.gratisexam.com/
IPv4-compatible tunneling
ISATAP tunneling
6to4 tunneling
manual tunneling
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
A manually configured tunnel is equivalent to a permanent link between two IPv6 domains over an IPv4 backbone. The primary use is for stable connections that
require regular secure communication between two edge routers or between an end system and an edge router, or for connection to remote IPv6 networks.
Reference.
http://www.gratisexam.com/
http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/ip6- tunnel.html
QUESTION 363
In which two modes do IPv6-in-IPv4 tunnels operate? (Choose two.)
A.
B.
C.
D.
E.
tunnel mode
transport mode
6to4 mode
4to6 mode
ISATAP mode
Correct Answer: CE
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
*There are 5 tunneling solution in IPv6:*
*1. Using the "Tunnel mode ipv6ip", in this case the tunnel source and destination are configured with IPv4 addressing and the tunnel interface is configured with
IPv6. This will use protocol 41.
This is used for IPv6/IPv4.
*
R1(config)#int tunnel 1
R1(config-if)#ipv6 address 12:1:12::1/64
R1(config-if)#tunnel source 10.1.12.1
R1(config-if)#tunnel destination 10.1.12.2
R1(config-if)#*tunnel mode ipv6ip*
*2. Using the "Tunnel mode gre ipv6, in this case the tunnel source and destination are all configured with IPv6 addressing. This is used for IPv6/IPv6.
*
BB1(config)#int tunnel 1
BB1(config-if)#ipv6 address 121:1:121::111/64
BB1(config-if)#tunnel source 10:1:111::111
BB1(config-if)#tunnel destination 10:1:112::112
BB1(config-if)#*tunnel mode gre ipv6*
*3. In this case, the third type, the tunnel mode is NOT used at all, note that the tunnel interface is configured with IPv6 and the tunnel source and destination is
configured with IPv4 but no mention of tunnel mode. This configuration will use protocol 47. This is used for IPv6/IPv4.
http://www.gratisexam.com/
*
R1(config)#int tunnel 13
R1(config-if)#ipv6 address 13:1:13::1/64
R1(config-if)#tunnel source 10.1.13.1
R1(config-if)#tunnel destination 10.1.13.3
*4. Note in this case a special addressing is assigned to the tunnel interface which is a concatenation of a reserved IPv6 address of 2002followed by the translated
IPv4 address of a given interface on the router. In this configuration ONLY the tunnel source address is used and since the tunnel is automatic, the destination
address is NOT configured. The tunnel mode is set to "Tunnel mode ipv6ip 6to4. Note the IPv4 address of 10.1.1.1 is translated to 0A.01.01.01 and once
concatenated, it will be "2002:0A01:0101: or 2002:A01:101. This is used for IPv6/IPv4.
*
R1(config)#interface Tunnel14
R1(config-if)#ipv6 address 2002:A01:101::/128
R1(config-if)#tunnel source 10.1.1.1
R1(config-if)#*tunnel mode ipv6ip 6to4*
*5. ISATAP, ISATAP works like 6to4 tunnels, with one major difference, it uses a special IPv6 address which is formed as follows: *
*In this tunnel mode, the network portion can be any IPv6 address, whereas in 6to4 it had to start with 2002.*
*Note when the IPv6 address is assigned to the tunnel interface, the "eui-64 is used, in this case the host portion of the IPv6 address starts with "0000.5EFE" and
then the rest of the host portion is the translated IPv4 address of the tunnel's source IPv4 address. This translation is performed automatically unlike 6to4. This is
used for IPv6/IPv4.*
R4(config)#int tunnel 46
R4(config-if)#ipv6 address 46:1:46::/64 eui-64
R4(config-if)#tunnel source 10.44.44.44
R4(config-if)#*tunnel mode ipv6ip ISATAP*
QUESTION 364
Which VPN technology requires the use of an external key server?
A.
B.
C.
D.
E.
F.
GETVPN
GDOI
SSL
DMVPN
IPsec
L2TPv3
Correct Answer: A
Section: VPN Technologies
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do
encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time.
Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and
group SA management. Minimum one KS is required for a GETVPN deployment.
Reference. http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport- vpn/deployment_guide_c07_554713.html
QUESTION 365
Which three roles does a key server perform when used with GETVPN? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Correct Answer: D
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
Using the Encrypted Preshared Key feature, you can securely store plain text passwords in type 6 format in NVRAM using a command-line interface (CLI). Type 6
passwords are encrypted. Although the encrypted passwords can be seen or retrieved, it is difficult to decrypt them to find out the actual password. This is currently
the most secure way to store keys.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ikevpn/configuration/xe- 3s/asr1000/sec-ike-for-ipsec-vpns-xe-3s-asr1000-book/secencrypt-preshare.html
QUESTION 367
DRAG DROP
Drag and drop the DMVPN command on the left to the corresponding function on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
The destination IPv4 address in the IPv4 payload is used to forward the packet.
The TTL of the payload packet is decremented.
The source IPv4 address in the IPv4 payload is used to forward the packet.
The TTL of the payload packet is incremented.
The version field in the GRE header is incremented.
The GRE keepalive mechanism is reset.
http://www.gratisexam.com/
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
After the GRE encapsulated packet reaches the remote tunnel endpoint router, the GRE packet is decapsulated. The destination address lookup of the outer IP
header (this is the same as the tunnel destination address) will find a local address (receive) entry on the ingress line card.
The first step in GRE decapsulation is to qualify the tunnel endpoint, before admitting the GRE packet into the router, based on the combination of tunnel source
(the same as source IP address of outer IP header) and tunnel destination (the same as destination IP address of outer IP header). If the received packet fails
tunnel admittance qualification check, the packet is dropped by the decapsulation router. On successful tunnel admittance check, the decapsulation strips the outer
IP and GRE header off the packet, then starts processing the inner payload packet as a regular packet.
When a tunnel endpoint decapsulates a GRE packet, which has an IPv4/IPv6 packet as the payload, the destination address in the IPv4/IPv6 payload packet
header is used to forward the packet, and the TTL of the payload packet is decremented.
Reference. http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r5-3/addr- serv/configuration/guide/b-ipaddr-cg53asr9k/b-ipaddrcg53asr9k_chapter_01001.html
QUESTION 370
Refer to the exhibit.
http://www.gratisexam.com/
The spokes of the DMVPN with the given configuration are having QoS issues.
Which two actions can you take to resolve the problem? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
It is possible to classify based on information that is encrypted, which is needed in this example. You can use an access-list, configured to match the private subnet
behind the remote spoke. The qos pre-classify command is used on the tunnel interface, and is required because the traffic is classified by a parameter that is
encrypted as the traffic leaves the physical outbound interface. L4 information from the IP data packet can also classify traffic destined to the same private subnet.
The "nhrp map group group-name service-policy output parent-policy-name " command adds the NHRP group to the QoS policy map on the hub.
QUESTION 371
Which two statements about 6VPE are true? (Choose two.)
A.
B.
C.
D.
E.
F.
It allows a service provider to use an existing MPLS network to provide VPN services to IPv6 customers.
It uses MP-BGP as the carrier protocol to transport IPv6 connectivity.
It provides IPv6 connectivity to MPLS-VPN customers when IPv6 overlay tunneling is also configured.
It allows a service provider to use an existing MPLS network to provide global addressing to their IPv6 customers.
It requires the configuration of a GRE tunnel tagged with a VLAN ID.
It allows a service provider to use an existing L2TPv3 network to provide VPN services to IPv6 customers.
Correct Answer: AB
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
The IPv6 MPLS VPN service model is similar to that of IPv4 MPLS VPNs. Service providers who have already deployed MPLS IPv4 VPN services over an IPv4
backbone can deploy IPv6 MPLS VPN services over the same IPv4 backbone by upgrading the PE router IOS version and dual-stack configuration, without any
change on the core routers. IPv4 services can be provided in parallel with IPv6 services. IPv6 VPN service is exactly the same as MPLS VPN for IPv4. 6VPE offers
the same architectural features as MPLS VPN for IPv4. It offers IPv6 VPN and uses the same components, such as:
Multiprotocol BGP (MP-BGP) VPN address family
http://www.gratisexam.com/
Route distinguishers
VPN Routing and Forwarding (VRF) instances
Site of Origin (SOO)
Extended community
MP-BGP
http://www.gratisexam.com/
Which three statements about the R1 configuration are true? (Choose three.)
A.
B.
C.
D.
E.
F.
The virtual circuit identifier is 1611 and the virtual circuit is down.
The local label for the circuit is 4006.
The targeted LDP session to the remote peer is up.
The local label for the circuit is 1611.
The virtual circuit identifier is 4006 and the virtual circuit is down.
The circuit is using MPLS VC type 4.
The overlay interface becomes active only when configuration is complete and it is manually enabled.
OTV data groups can operate only in PIM sparse-mode.
The overlay interface becomes active immediately when it is configured.
The interface facing the OTV groups must be configured with the highest MTU possible.
Correct Answer: A
Section: VPN Technologies
Explanation
Explanation/Reference:
Explanation:
OTV has the following configuration guidelines and limitations:
If the same device serves as the default gateway in a VLAN interface and the OTV edge device for the VLANs being extended, configure OTV on a device (VDC
or switch) that is separate from the VLAN interfaces (SVIs).
When possible, we recommend that you use a separate nondefault VDC for OTV to allow for better manageability and maintenance.
An overlay interface will only be in an up state if the overlay interface configuration is complete and enabled (no shutdown). The join interface has to be in an up
state.
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Which action will solve the error state of this interface when connecting a host behind a Cisco IP phone?
A. Configure dot1x-port control auto on this interface
http://www.gratisexam.com/
Correct Answer: D
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature
works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses
on a network. If the source IP address is not valid, the packet is discarded.
Reference. http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html
QUESTION 378
Which three features are considered part of the IPv6 first-hop security suite? (Choose three.)
A. DNS guard
http://www.gratisexam.com/
B.
C.
D.
E.
F.
destination guard
DHCP guard
ICMP guard
RA guard
DoS guard
http://www.gratisexam.com/
Why is the router not accessible via Telnet on the GigabitEthernet0 management interface?
A.
B.
C.
D.
Correct Answer: D
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
The correct command should be "access-class telnet-acl in vrf-also". If you do not specify the vrf- also keyword, incoming Telnet connections from interfaces that
are part of a VRF are rejected.
QUESTION 380
Which two features does the show ipv6 snooping features command show information about? (Choose two.)
A.
B.
C.
D.
RA guard
DHCP guard
ND inspection
source guard
Correct Answer: AC
http://www.gratisexam.com/
http://www.gratisexam.com/
Which two statements about how the configuration processes Telnet traffic are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AC
Section: Infrastructure Security
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
The ACL applied to the COPP policy matches only telnet traffic from 10.1.1.9 to 10.10.10.1, all other telnet traffic is not matched and therefore not used in the
COPP policy, which means this traffic will be handled normally (accepted). For telnet traffic from 10.1.1.9 to 10.10.10.1, the COPP policy has defined this traffic as
an exceed, and dropped.
QUESTION 382
Which two statements about port ACLs are true? (Choose two.)
A.
B.
C.
D.
Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch.
Port ACLs support both outbound and inbound traffic filtering.
When it is applied to trunk ports, the port ACL filters only native VLAN traffic.
When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic.
Correct Answer: AD
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or non-IP Layer 2 information The port ACL (PACL)
feature provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs
perform access control on all traffic entering the specified Layer 2 port, including voice and data VLANs that may be configured on the port. Port ACLs are applied
only on the ingress traffic.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12- 2SY/configuration/guide/sy_swcg/port_acls.html
QUESTION 383
Which two statements about private VLANs are true? (Choose two.)
http://www.gratisexam.com/
http://www.gratisexam.com/
While configuring AAA with a local database, users can log in via Telnet, but receive the message "error in authentication" when they try to go into enable mode.
Which action can solve this problem?
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
If a different enable password is configured, it will override the privilege level 15 of that user and force the existing password to be used for enable access.
QUESTION 385
DRAG DROP
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
D. Flow ID
E. IPsec
F. Connection ID
Correct Answer: ADF
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Supported Condition Types
The new crypto conditional debug CLIs--debug crypto condition, debug crypto condition unmatched, and show crypto debug-condition--allow you to specify
conditions (filter values) in which to generate and display debug messages related only to the specified conditions. The table below lists the supported condition
types.
Table 1 Supported Condition Types for Crypto Debug CLI
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer: D
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
To enable DHCP option-82 data insertion, perform this task:
http://www.gratisexam.com/
QUESTION 389
Which two statements are true about unicast RPF? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AC
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Unicast RPF requires Cisco express forwarding (CEF) to function properly on the router.
Strict Versus Loose Checking Mode
The Unicast RPF in Strict Mode feature filters ingress IPv4 traffic in strict checking mode and forwards packets only if the following conditions are satisfied.
An IPv4 packet must be received at an interface with the best return path (route) to the packet source (a process called symmetric routing). There must be a
route in the Forwarding Information Base (FIB) that matches the route to the receiving interface. Adding a route in the FIB can be done via static route, network
statement, or dynamic routing.
IPv4 source addresses at the receiving interface must match the routing entry for the interface.
References:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf.html http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/
srpf_gsr.html
QUESTION 390
Under Cisco IOS Software, which two features are supported in RADIUS Change of Authorization requests? (Choose two.)
A.
B.
C.
D.
session identification
session reauthentication
session termination
host termination
Correct Answer: AC
Section: Infrastructure Security
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
CoA requests, as described in RFC 5176, are used in a pushed model to allow for session identification, host reauthentication, and session termination. The model
comprises one request (CoA-Request) and two possible response codes.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec- usr-aaa-15-sy-book/sec-rad-coa.html
QUESTION 391
DRAG DROP
Select and Place:
Correct Answer:
http://www.gratisexam.com/
UplinkFast
BPDU guard
BPDU filter
root guard
Correct Answer: D
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Since STP does not implement any authentication or encryption to protect the exchange of BPDUs, it is vulnerable to unauthorized participation and attacks. Cisco
IOS offers the STP Root Guard feature to enforce the placement of the root bridge and secure the core of the STP domain. STP root guard forces a port to become
http://www.gratisexam.com/
a designated port so that no switch on the other end of the link can become a root switch. If a port configured for root guard receives a superior BPDU, the port it is
received on is blocked. In this way, STP root guard blocks other devices from trying to become the root bridge.
STP root guard should be enabled on all ports that will never connect to a root bridge, for example, all end user ports. This ensures that a root bridge will never be
negotiated on those ports.
Reference.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebaseb ook/sec_chap7.html
QUESTION 393
Which two protocols are not protected in an edge router by using control plane policing? (Choose two.)
A.
B.
C.
D.
SMTP
RPC
SSH
Telnet
Correct Answer: AB
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
A CoPP policy can limit a number of different packet types that are forwarded to the control plane.
Traffic destined for the switch CPU includes:
Address Resolution Protocol (ARP)
First-hop redundancy protocol packets
Layer 2 control packets
Management packets (telnet, Secure Shell [SSH] Protocol, Simple Network Management Protocol [SNMP]) <--- C and D are not correct.
Multicast control packets
Routing protocol packets
Packets with IP options
Packets with time to live (TTL) set to 1
Packets that require ACL logging
Packets that require an initial lookup (first packet in a flow: FIB miss) Packets that have don't support hardware switching/routing
Reference. http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series- switches/white_paper_c11_553261.html
QUESTION 394
Which two statements are true about AAA? (Choose two.)
A. AAA can use RADIUS, TACACS+, or Windows AD to authenticate users.
http://www.gratisexam.com/
B. If RADIUS is the only method configured in AAA, and the server becomes unreachable, the user will be able to log in to the router using a local username and
password.
C. If the local keyword is not included and the AAA server does not respond, then authorization will never be possible and the connection will fail.
D. AAA can be used to authenticate the enable password with a AAA server.
Correct Answer: CD
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
AAA can be used to authenticate user login and the enable passwords.
Example 1: Same Exec Authentication Methods for All Users
Once authenticated with:
aaa authentication login default group radius local
All users who want to log in to the access server have to be authorized using Radius (first method) or local database (second method).
We configure:
aaa authorization exec default group radius local
Note. On the AAA server, Service-Type=1 (login) must be selected.
Note. With this example, if the local keyword is not included and the AAA server does not respond, then authorization will never be possible and the connection will
fail.
Reference. http://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller- access-control-system-tacacs-/10384-security.html
QUESTION 395
Which three types of traffic are allowed by IEEE 802.1X access control prior to getting authenticated? (Choose three.)
A.
B.
C.
D.
E.
F.
EAPOL
VTP
STP
ARP
CDP
HTTP
Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and
Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication, normal traffic passes through the port.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/15- 0_2_se/configuration/guide/scg3750/sw8021x.pdf
QUESTION 396
Which two statements about MAC ACLs are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
MAC ACL, also known as Ethernet ACL, can filter non-IP traffic on a VLAN and on a physical Layer 2 interface by using MAC addresses in a named MAC extended
ACL. The steps to configure a MAC ACL are similar to those of extended named ACLs. MAC ACL supports only inbound traffic filtering.
Reference. http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=4
QUESTION 397
Refer to the exhibit.
http://www.gratisexam.com/
What happens to packets when traffic in the icmp-class class exceeds the policed amount?
A.
B.
C.
D.
Correct Answer: C
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
In this case, the service policy is set to output, which drops the traffic silently per above.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos- plcshp-15-mt-book/qos-plcshp-ctrl-pln-plc.html
QUESTION 398
Which option is the Cisco recommended method to secure access to the console port?
A.
B.
C.
D.
Correct Answer: A
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
The activation-character command defines a session activation character. Entering this character at a vacant terminal begins a terminal session. The default
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
command authorization
network access authorization
network accounting
network access authentication
Correct Answer: AD
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Configuring the Local Database
http://www.gratisexam.com/
This section describes how to manage users in the local database. You can use the local database for CLI access authentication, privileged mode authentication,
command authorization, network access authentication, and VPN authentication and authorization. You cannot use the local database for network access
authorization. The local database does not support accounting.
Reference.
http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/configuration/guide/conf_gd/aaa.html
QUESTION 401
Which two features are used for inspection when IPv6 address glean is enabled? (Choose two.)
A.
B.
C.
D.
E.
DHCP messages
ND messages
ICMPv6 messages
UDP messages
TCP messages
Correct Answer: AB
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
IPv6 address glean is the foundation for many other IPv6 features that depend on an accurate binding table. It inspects ND and DHCP messages on a link to glean
addresses, and then populates the binding table with these addresses. This feature also enforces address ownership and limits the number of addresses any given
node is allowed to claim.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6f- 15-s-book/ip6-snooping.html
QUESTION 402
Which two statements about the protected ports feature and the private VLAN feature are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Infrastructure Security
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
Protected Ports (PVLAN Edge)
In some network environments, there is a requirement for no traffic to be seen or forwarded between host(s) on the same LAN segment, thereby preventing
interhost communications. The PVLAN edge feature provisions this isolation by creating a firewall-like barrier, thereby blocking any unicast, broadcast, or multicast
traffic among the protected ports on the switch. Note that the significance of the protected port feature is limited to the local switch, and there is no provision in the
PVLAN edge feature to isolate traffic between two "protected" ports located on different switches. For this purpose, the PVLAN feature can be used.
Reference. http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=2
QUESTION 403
DRAG DROP
Drag and drop the TACACS+ configuration command on the left to the correct function it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Which two configuration changes enable the user admin to log in to the device? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
Usernames and passwords are case-sensitive. Users attempting to log in with an incorrectly cased username or password will be rejected. If users are unable to log
into the router with their specific passwords, reconfigure the username and password on the router.
Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases- 110/45843-configpasswords.html
QUESTION 405
Which two advantages does CoPP have over receive path ACLs? (Choose two.)
A. Only CoPP applies to IP packets and non-IP packets.
http://www.gratisexam.com/
Correct Answer: D
Section: Infrastructure Security
Explanation
Explanation/Reference:
Explanation:
When configuring port security violation modes, note the following information:
protect--Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value.
restrict--Drops packets with unknown source addresses until you remove a sufficient number of secure MAC addresses to drop below the maximum value and
causes the SecurityViolation counter to increment.
shutdown--Puts the interface into the error-disabled state immediately and sends an SNMP trap notification.
http://www.gratisexam.com/
Which configuration is missing that would enable SSH access on a router that is running Cisco IOS XE Software?
A. int Gig0/0/0
management-interface
B. class-map ssh-class
match access-group protect-ssh
policy-map control-plane-in
class ssh-class
police 80000 conform transmit exceed drop
control-plane
service-policy input control-plane-in
C. control-plane host
management-interface GigabitEthernet0/0/0 allow ssh
D. interface Gig0/0/0
ip access-group protect-ssh in
Correct Answer: C
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
The feature Management Plane Protection (MPP) allows an administrator to restrict on which interfaces management traffic can be received by a device. This
allows the administrator additional control over a device and how the device is accessed.
This example shows how to enable the MPP in order to only allow SSH and HTTPS on the GigabitEthernet0/1 interface:
!
control-plane host
management-interface GigabitEthernet 0/1 allow ssh https
!
Reference. http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html
QUESTION 408
Which three modes are valid PfR monitoring modes of operation? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
http://www.gratisexam.com/
A. The Cisco PfR state is UP; however, the external interface Et0/1 of border router 10.1.1.1 has exceeded the maximum available bandwidth threshold.
B. The Cisco PfR state is UP; however, an issue is preventing the border router from establishing a TCP session to the master controller.
C. The Cisco PfR state is UP and is able to monitor traffic flows; however, MD5 authentication has not been successful between the master controller and the
border routers.
D. The Cisco PfR State is UP; however, the receive capacity was not configured for inbound traffic.
E. The Cisco PfR state is UP, and the link utilization out-of-policy threshold is set to 90 percent for traffic exiting the external links.
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
All three interfaces show as UP, and the capacity is set to 500 kbps, with the max threshold set to 450 kbps (90% of 500kbps).
QUESTION 410
In the DiffServ model, which class represents the highest priority with the highest drop probability?
A.
B.
C.
D.
AF11
AF13
AF41
AF43
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
AF43-- Assured forwarding, high drop probability, Class 4 DSCP, and Flash-override precedence.
Table of AF Classes and Drop Priority
http://www.gratisexam.com/
Reference. https://www.informit.com/library/content.aspx?
b=CCIE_Practical_Studies_II&seqNum=56
QUESTION 411
Refer to the exhibit.
http://www.gratisexam.com/
The SLA must also have a schedule configured before it will start.
The TTL of the SLA packets is 10.
The SLA has a timeout of 3.6 seconds.
The SLA has a lifetime of 5 seconds.
Correct Answer: A
Section: Infrastructure Services
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
When you configure an IP SLAs operation, you must schedule the operation to begin capturing statistics and collecting error information. You can schedule an
operation to start immediately or to start at a certain month, day, and hour. You can use the pending option to set the operation to start at a later time. The pending
option is an internal state of the operation that is visible through SNMP. The pending state is also used when an operation is a reaction (threshold) operation waiting
to be triggered. You can schedule a single IP SLAs operation or a group of operations at one time. We can see in this output that the IP SLA is still in a pending
trigger state.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12- 2/44sg/configuration/guide/Wrapper-44SG/swipsla.html
QUESTION 412
Which three actions are required when configuring NAT-PT? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Here we see that COS 3 is mapped to DSCP 46, which is the Expedited forwarding class:
The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real- time, interactive traffic. The EF model uses one marking -DSCP 46.
QUESTION 414
Which three statements about implementing a NAT application layer gateway in a network are true? (Choose three.)
A.
B.
C.
D.
E.
F.
It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used.
It maintains granular security over application-specific data.
It allows synchronization between multiple streams of data between two hosts.
Application layer gateway is used only in VoIP/SIP deployments.
Client applications require additional configuration to use an application layer gateway.
An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network.
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
An application-level gateway (ALG), also known as an application-layer gateway, is an application that translates the IP address information inside the payload of an
application packet. An ALG is used to interpret the application-layer protocol and perform firewall and Network Address Translation (NAT) actions. These actions
can be one or more of the following depending on your configuration of the firewall and NAT:
Allow client applications to use dynamic TCP or UDP ports to communicate with the server application.
Recognize application-specific commands and offer granular security control over them. Synchronize multiple streams or sessions of data between two hosts
that are exchanging data.
Translate the network-layer address information that is available in the application payload
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe- 3s/asr1000/nat-xe-3s-asr1k-book/fw-msrpc-supp.html
QUESTION 415
Refer to the exhibit.
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The following example shows how to configure the router (and downstream routers) to drop all options packets that enter the network:
Router(config)# ip options drop
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/sel_drop.html
QUESTION 416
Which statement about shaped round robin queuing is true?
A. Queues with higher configured weights are serviced first.
http://www.gratisexam.com/
B. The device waits a period of time, set by the configured weight, before servicing the next queue.
C. The device services a single queue completely before moving on to the next queue.
D. Shaped mode is available on both the ingress and egress queues.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
SRR is scheduling service for specifying the rate at which packets are dequeued. With SRR there are two modes, shaped and shared. Shaped mode is only
available on the egress queues
SRR differs from typical WRR. With WRR queues are serviced based on the weight. Q1 is serviced for weight 1 period of time, Q2 is served for weight 2 period of
time, and so forth. The servicing mechanism works by moving from queue to queue and services them for the weighted amount of time. With SRR weights are still
followed; however, SRR services Q1, moves to Q2, then Q3 and Q4 in a different way. It does not wait at and service each queue for a weighted amount of time
before moving on to the next queue. Instead, SRR makes several rapid passes at the queues; in each pass, each queue might or might not be serviced. For each
given pass, the more highly weighted queues are more likely to be serviced than the lower priority queues.
Reference. http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3560-e-series- switches/prod_qas0900aecd805bacc7.html
QUESTION 417
Refer to the exhibit.
http://www.gratisexam.com/
You discover that only 1.5 Mb/s of web traffic can pass during times of congestion on the given network.
Which two options are possible reasons for this limitation? (Choose two.)
A.
B.
C.
D.
http://www.gratisexam.com/
The NMS needs a specific route configured to enable it to reach the Loopback0 interface of the device.
The ifindex of the device could be different when the device is reloaded.
The device will allow anyone to poll it via the public community.
The device configuration requires the AuthNoPriv security level.
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
One of the most commonly used identifiers in SNMP-based network management applications is the Interface Index (ifIndex) value. IfIndex is a unique identifying
number associated with a physical or logical interface. For most software, the ifIndex is the name of the interface. Although relevant RFCs do not require that the
correspondence between particular ifIndex values and their interfaces be maintained across reboots, applications such as device inventory, billing, and fault
detection depend on this correspondence.
Consider a situation where a simple monitoring software (like MRTG) is polling the interface statistics of the router specific serial interface going to the internet.
As an example, you could have these conditions prior to re-initialization:
Therefore, the management application is polling the ifIndex 3, which corresponds to the serial port.
After the router re-initialization (reboot, reload and so on) the conditions change to something similar to this:
The management application continues polling the ifIndex 3, which corresponds now to the ethernet port. Therefore, if the management application is not warned by
a trap, for example, that the router has been rebooted, the statistics polled could be completely wrong.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol- snmp/28420-ifIndex-Persistence.html
QUESTION 419
Which three steps are necessary to enable SSH? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
4. Now that we've generated the key, our next step would be to configure our vty lines for SSH access and specify which database we are going to use to provide
authentication to the device. The local database on the router will do just fine for this example.
LabRouter(config)#line vty 0 4
LabRouter(config-line)#login local
LabRouter(config-line)#transport input ssh
5. You will need to create an account on the local router's database to be used for authenticating to the device. This can be accomplished with these commands.
http://www.gratisexam.com/
Which two statements about the EEM applet configuration are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Here we see that the sync knob was enabled so A is correct. However, C is not correct as the nocase argument was not used, so the applet is configured to display
the config only if a capital Y is issued.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr- a2.html
QUESTION 421
Which variable in an EEM applet is set when you use the sync yes option?
A.
B.
C.
D.
$_cli_result
$_result
$_string_result
$_exit_status
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The CLI event detector screens CLI commands for a regular expression match. When a match is found, an event is published. The match logic is performed on the
fully expanded CLI command after the command is successfully parsed and before it is executed. The CLI event detector supports three publish modes:
Synchronous publishing of CLI events--The CLI command is not executed until the EEM policy exits, and the EEM policy can control whether the command is
executed. The read/write variable, _exit_status, allows you to set the exit status at policy exit for policies triggered from synchronous events. If _exit_status is 0, the
command is skipped, if _exit_status is 1, the command is run.
Asynchronous publishing of CLI events--The CLI event is published, and then the CLI command is executed.
Asynchronous publishing of CLI events with command skipping--The CLI event is published, but the CLI command is not executed.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr- e1.html
QUESTION 422
Which two options are advantages of NetFlow version 9 over NetFlow version 5? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NetFlow version 9 includes support for all of these fields that version 5 supports and can optionally include additional information such as Multiprotocol Label
Switching (MPLS) labels and IPv6 addresses and ports.
QUESTION 423
Refer to the exhibit.
Which two statements about the output are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: CD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
C. The fourth line shows that Version 5 is being used.
D. The third line shows that the destination server is 10.5.206.250, which of course is a private, RFC 1918 address.
QUESTION 424
In the DiffServ model, which class represents the lowest priority with the lowest drop probability?
A.
B.
C.
D.
AF11
AF13
AF41
AF43
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Reference. http://en.wikipedia.org/wiki/Differentiated_services
http://www.gratisexam.com/
QUESTION 425
Which three factors does Cisco PfR use to calculate the best exit path? (Choose three.)
A.
B.
C.
D.
E.
F.
quality of service
packet size
delay
loss
reachability
administrative distance
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
SLAAC is by far the easiest way to configure IPv6 addresses, simply because you don't have to configure any IPv6 address. With SLAAC, a host uses the IPv6
Neighbor Discovery Protocol (NDP) to determine its IP address and default routers. Using SLAAC, a host requests and listens for Router Advertisements (RA)
http://www.gratisexam.com/
messages, and then taking the prefix that is advertised to form a unique address that can be used on the network. For this to work, the prefix that is advertised must
advertise a prefix length of 64 bits (i.e., /64). But the most significant of Stateless Address Autoconfiguration (SLAAC) is it provided no mechanism for configuring
DNS resolver information.Therefore SLACC can be used along with DHCPv6 (Stateless) to push DNS and other information to the clients.
QUESTION 427
What can PfR passive monitoring mode measure for TCP flows?
A.
B.
C.
D.
E.
only delay
delay and packet loss
delay and reachability
delay, packet loss, and throughput
delay, packet loss, throughput, and reachability
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Passive monitoring metrics include the following:
Delay: Cisco PfR measures the average delay of TCP flows for a given prefix or traffic class. Delay is the measurement of the round-trip response time (RTT)
between the transmission of a TCP synchronization message and receipt of the TCP acknowledgement.
Packet loss: Cisco PfR measures packet loss by tracking TCP sequence numbers for each TCP flow; it tracks the highest TCP sequence number. If it receives
a subsequent packet with a lower sequence number, PfR increments the packet-loss counter. Packet loss is measured in packets per million.
Reachability: Cisco PfR measures reachability by tracking TCP synchronization messages that have been sent repeatedly without receiving a TCP
acknowledgement.
Throughput: Cisco PfR measures TCP throughput by measuring the total number of bytes and packets for each interesting traffic class or prefix for a given
interval of time.
Reference. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/performance- routing-pfr/product_data_sheet0900aecd806c4ee4.html
QUESTION 428
Refer to the exhibit.
A PE router is configured with a policy map that contains the policer shown. The policy map is configured in the inbound direction of an interface facing a CE router.
If the PE router receives 12Mb/s of traffic with the CoS value set to 7 on a 100-Mb/s interface from the CE router, what value of MPLS EXP is set when this traffic
http://www.gratisexam.com/
0
6
7
8
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Here, the policer is set where the conforming traffic is set to 10 percent of the 100 Mbps interface, so anything more than 10 Mbps will be placed into the exceeding
traffic class, the traffic EXP value will be changed from 7 to 6 per the configuration.
QUESTION 429
DRAG DROP
What is the correct order of the VSS initialization process? Drag the actions on the left to the correct initialization step on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
QUESTION 431
In a PfR environment, which two statements best describe the difference between active mode monitoring and fast mode monitoring? (Choose two.)
A.
B.
C.
D.
Active mode monitoring can monitor and measure actual traffic via NetFlow data collection.
Fast mode monitoring can measure bursty traffic better than active mode.
Active mode monitoring uses IP SLA probes for the purpose of obtaining performance characteristics of the current WAN exit link.
Fast mode monitoring uses IP SLA probes via all valid exits continuously to quickly determine an alternate exit link.
Correct Answer: CD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Active Monitoring
PfR uses Cisco IOS IP Service Level Agreements (SLAs) to enable active monitoring. IP SLAs support is enabled by default. IP SLAs support allows PfR to be
configured to send active probes to target IP addresses to measure the jitter and delay, determining if a prefix is out-of-policy and if the best exit is selected. The
border router collects these performance statistics from the active probe and transmits this information to the master controller.
Fast Failover Monitoring
Fast failover monitoring enables passive and active monitoring and sets the active probes to continuously monitor all the exits (probe-all). Fast failover monitoring
can be used with all types of active probes: Internet Control Message Protocol (ICMP) echo, jitter, TCP connection, and UDP echo.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/pfr/command/pfr-cr-book/pfr-s1.html
QUESTION 432
Refer to the exhibit.
http://www.gratisexam.com/
Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A.
B.
C.
D.
E.
The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
Cisco PfR is monitoring the prefix via passive NetFlow mode only.
Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.
Correct Answer: DE
Section: Infrastructure Services
Explanation
Explanation/Reference:
http://www.gratisexam.com/
AF11
AF13
AF41
AF43
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Reference. http://en.wikipedia.org/wiki/Differentiated_services
QUESTION 434
Which two hashing algorithms can be used when configuring SNMPv3? (Choose two.)
A.
B.
C.
D.
E.
F.
MD5
SHA-1
Blowfish
DES
AES
SSL
Correct Answer: AB
Section: Infrastructure Services
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
Note that SNMPv3 does not send passwords in clear-text and uses hash-based authentication with either MD5 or SHA1 functions (HMAC authentication the packet
conted is hashed along with authentication key to produce the authentication string).
Reference. http://blog.ine.com/2008/07/19/snmpv3-tutorial/
QUESTION 435
Which two statements about the default router settings for SSH connections are true? (Choose two.)
A.
B.
C.
D.
The default timeout value for the SSH negotiation phase is 120 seconds.
Data is exchanged in clear text by default unless AAA authentication is enabled on the console.
The default number of authentication retries is 3.
SSH is enabled by default when you configure the username command.
Correct Answer: AC
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/security/confi guration_guide/b_sec_3se_3850_cg/
b_sec_3se_3850_cg_chapter_01000.html
QUESTION 436
Refer to the exhibit.
http://www.gratisexam.com/
It supports the service timestamps log uptime command to display time stamps.
The logging buffer command was used to increase the default of the buffer.
The logging of warning messages is disabled.
Log message sequence numbering is disabled.
Correct Answer: D
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
To disable sequence numbers, use the no service sequence-numbers global configuration command.
This example shows part of a logging display with sequence numbers enableD.
000019: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36)
In this example we see the absence of sequence numbers on the log messages.
Not A. In this example there are no time stamps or uptimes shown in the logs.
Not B. The default buffer size is 4096 bytes.
Not C. The logging level in this example is informational (level 6), which will display levels 0-6 in the logs. Warnings are level 4.
QUESTION 437
Which two statements about class maps are true? (Choose two.)
A. As many as eight DSCP values can be included in a match dscp statement.
http://www.gratisexam.com/
B. The default parameter on a class map with more than one match command is match-any.
C. The match class command can nest a class map within another class map.
D. A policy map can be used to designate a protocol within a class map.
Correct Answer: AC
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Answer A.
http://www.gratisexam.com/
Answer C.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfmcli2.html
QUESTION 438
Which IP SLA operation type is enhanced by the use of the IP SLAs Responder?
A.
B.
C.
D.
DNS
HTTP
ICMP Echo
UDP Echo
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Figure 1. UDP Echo Operation
http://www.gratisexam.com/
Response time (round-trip time) is computed by measuring the time taken between sending a UDP echo request message from Device B to the destination device-Device A--and receiving a UDP echo reply from Device A. UDP echo accuracy is enhanced by using the IP SLAs Responder at Device A, the destination Cisco
device. If the destination device is a Cisco device, then IP SLAs sends a UDP datagram to any port number that you specified. Using the IP SLAs Responder is
optional for a UDP echo operation when using Cisco devices. The IP SLAs Responder cannot be configured on non-Cisco devices.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt- book/sla_udp_echo.html
QUESTION 439
Refer to the exhibit.
http://www.gratisexam.com/
Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the 10.1.2.0/24 network.
Which feature can provide additional failover coverage for the PC?
A.
B.
C.
D.
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object tracking feature separates the tracking mechanism from HSRP. It
creates a separate, standalone tracking process that can be used by processes other than HSRP. This feature allows tracking of other objects in addition to the
interface line-protocol state. A client process, such as HSRP, can register an interest in tracking objects and request notification when the tracked object changes
http://www.gratisexam.com/
state. Several clients can track the same object, and can take different actions when the object changes state. This feature increases the availability and speed of
recovery of a router system and decreases outages and outage duration.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/blades/3040/software/release/12- 2_44_se/configuration/guide/swhsrp.html#wp1083927
QUESTION 440
Refer to the exhibit.
Which two possible network conditions can you infer from this configuration? (Choose two.)
A.
B.
C.
D.
Correct Answer: AB
Section: Infrastructure Services
http://www.gratisexam.com/
Explanation
Explanation/Reference:
Explanation:
Answer A. The NTP associations are not synced, it is only listed as a candidate because it was configured. Routing is not the issue, so it must be mismatched
authentication parameters.
Answer B. NTP sets the source IP address for all NTP packets based on the address of the interface through which the NTP packets are sent. You can configure
NTP to use a specific source IP address.
QUESTION 441
Which three message types are used for prefix delegation in DHCPv6? (Choose three.)
A.
B.
C.
D.
E.
F.
DHCP Discover
Renew
Solicit
DHCP Offer
Advertise
DHCP Ack
Correct Answer: AD
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
C.
D.
E.
F.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
EEM policies require two parts: the event register keyword and the body. The remaining parts of the policy are optional: environment must defines, namespace
import, entry status, and exit status (Figure 5).
Figure 5. EEM Policy Parts
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Embedded Packet Capture (EPC) provides an embedded systems management facility that helps in tracing and troubleshooting packets. This feature allows
network administrators to capture data packets flowing through, to, and from a Cisco device. The network administrator may define the capture buffer size and type
(circular, or linear) and the maximum number of bytes of each packet to capture. The packet capture rate can be throttled using further administrative controls. For
example, options allow for filtering the packets to be captured using an Access Control List and, optionally, further defined by specifying a maximum packet capture
rate or by specifying a sampling interval.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/xe-3s/asr1000/epc- xe-3s-asr1000-book/nm-packet-capture-xe.html
QUESTION 446
Which statement describes Cisco PfR link groups?
A.
B.
C.
D.
E.
Link groups enable Cisco PfR Fast Reroute when NetFlow is enabled on the external interfaces of the border routers.
Link groups define a strict or loose hop-by-hop path preference.
Link groups are required only when Cisco PfR is configured to load-balance all traffic.
Link groups are enabled automatically when Cisco PfR is in Fast Reroute mode.
Link groups set a preference for primary and fallback (backup) external exit interfaces.
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The Performance Routing - Link Groups feature introduced the ability to define a group of exit links as a preferred set of links, or a fallback set of links for PfR to
use when optimizing traffic classes specified in an PfR policy. PfR currently selects the best link for a traffic class based on the preferences specified in a policy and
http://www.gratisexam.com/
the traffic class performance--using parameters such as reachability, delay, loss, jitter or MOS--on a path out of the specified link.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/pfr/configuration/guide/15_1/pfr_15_1_book/pfr-link- group.html
QUESTION 447
Which two statements about NetFlow are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: CE
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NetFlow identifies packet flows for both ingress and egress IP packets. It does not involve any connection-setup protocol, either between routers or to any other
networking device or end station. NetFlow does not require any change externally--either to the packets themselves or to any networking device. NetFlow is
completely transparent to the existing network, including end stations and application software and network devices like LAN switches. Also, NetFlow capture and
export are performed independently on each internetworking device; NetFlow need not be operational on each router in the network.
NetFlow data provides fine-grained metering for highly flexible and detailed resource utilization accounting. For example, flow data includes details such as IP
addresses, packet and byte counts, timestamps, type-of-service, and application ports. Service providers might utilize the information for billing based on time-ofday, bandwidth usage, application usage, or quality of service. Enterprise customers might utilize the information for departmental chargeback or cost allocation for
resource utilization.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/12-4t/nf-12-4t- book/ios-netflow-ov.html
QUESTION 448
You are installing a new device to replace a device that failed. The configuration of the failed device is stored on a networked server, and the new device has an
RXBOOT image installed. Under which condition does the streamlined Setup mode fail?
A.
B.
C.
D.
The last four bits of the configuration register are not equal to the decimal value 0 or 1.
The startup configuration file was deleted.
Bit 6 is set in the configuration register.
The startup configuration is corrupt.
http://www.gratisexam.com/
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The lowest four bits of the configuration register (bits 3, 2, 1, and 0) form the boot field. The boot field determines if the router boots manually, from ROM, or from
Flash or the network. To change the boot field value and leave all other bits set to their default values, follow these guidelines:
If you set the configuration register boot field value to 0x0, you must boot the operating system manually with the boot command.
If you set the configuration register boot field value to 0x1, the router boots using the default ROM software.
If you set the configuration register boot field to any value from 0x2 to 0xF, the router uses the boot field value to form a default boot filename for booting from
a network server.
For more information about the configuration register bit settings and default filenames, refer to the appropriate router hardware installation guide.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/command/reference/ffun_r/frf010.html
QUESTION 449
Refer to the exhibit.
You are configuring the S1 switch for the switchport connecting to the client computer. Which option describes the effect of the command mls qos map cos-dscp 0
8 16 24 32 40 46 56?
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The default CoS to DSCP mappings are shown below:
In our example, we see that COS 6 is mapped to DSCP, not the default of DSCP 48 as shown above. DSCP 46 is Expedited Forwarding (EF), which is typically
used for voice traffic, and this value has not been included in this class map.
QUESTION 450
Refer to the exhibit.
http://www.gratisexam.com/
If the network switch is configured as shown, which two statements about network traffic are true? (Choose two.)
A.
B.
C.
D.
E.
http://www.gratisexam.com/
Correct Answer: AD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
A. Serial interfaces at E1 (2.048 Mbps) and below use weighted fair queueing (WFQ) by default. Other interfaces use first-in first-out (FIFO) by default.
D. Voice traffic is given priority up to 25% of the shape average value, which is 6000000, so 25% of 6 Mbps is 1.5 Mbps.
QUESTION 451
Which two options are two characteristics of the HSRPv6 protocol? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
HSRP IPv6 Virtual MAC Address Range
HSRP IPv6 uses a different virtual MAC address block than does HSRP for IP:
0005.73A0.0000 through 0005.73A0.0FFF (4096 addresses)
HSRP IPv6 UDP Port Number
Port number 2029 has been assigned to HSRP IPv6.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-sy/fhp- 15-sy-book/HSRP-for-IPv6.html
QUESTION 452
Which statement about VRRP is true?
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: B
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
VRRP Limitations
You can configure both HSRP and VRRP on a switch or switch stack. However, you cannot add a switch model that supports only one protocol to a stack that is
configured for both protocols.
The VRRP implementation on the switch does not support the MIB specified in RFC 2787.
The VRRP implementation on the switch supports only text -based authentication.
The switch supports VRRP only for IPv4.
Reference.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12- 2_58_se/configuration/guide/3750xscg/swhsrp.html#pgfId-1107127
QUESTION 453
Refer to the exhibit.
60 seconds
10 seconds
360 seconds
60 milliseconds
10 milliseconds
Correct Answer: A
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
The frequency value lists the polling interval, in seconds.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt- book/sla_icmp_echo.html
QUESTION 454
Refer to the exhibit.
Which additional information must you specify in this configuration to capture NetFlow traffic?
A.
B.
C.
D.
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Configuring NetFlow
Perform the following task to enable NetFlow on an interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip flow {ingress | egress}
5. exit
6. Repeat Steps 3 through 5 to enable NetFlow on other interfaces.
7. end
http://www.gratisexam.com/
8.
DETAILED STEPS
http://www.gratisexam.com/
http://www.gratisexam.com/
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/netflow/configuration/guide/12_2sr/nf_12_2sr_book/cfg_ nflow_data_expt.html
QUESTION 455
For which three routing protocols can Cisco PfR provide direct route control? (Choose three.)
A.
B.
C.
D.
E.
F.
OSPF
ISIS
BGP
EIGRP
static routing
ODR
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer: E
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The timeout for outgoing SSH connection is defined by the "ip sshh time-out" command (in seconds), which is configured here as 30.
QUESTION 459
Which two statements about the default SNMP configuration are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Correct Answer: CD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Correct Answer: AC
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the
distribution of logging messages to various destinations, such as the logging buffer, terminal lines, or a UNIX syslog server, depending on your configuration. The
process also sends messages to the console.
http://www.gratisexam.com/
functionality of the switch is affected. For information on how to recover from these malfunctions, see the system message guide for this release.
Output from the debug commands, displayed at the debugging level. Debug commands are typically used only by the Technical Assistance Center.
Interface up or down transitions and system restart messages, displayed at the notifications level. This message is only for information; switch functionality is
not affected.
Reload requests and low-process stack messages, displayed at the informational level. This message is only for information; switch functionality is not
affected.
References: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12- 1_9_ea1/configuration/guide/scg/swlog.html
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12- 2_55_se/configuration/guide/scg_2960/swlog.html
QUESTION 461
Refer to the exhibit.
If the remaining configuration uses default values, what is the expected output of the show mls qos queue-set command?
A.
http://www.gratisexam.com/
B.
C.
D.
Correct Answer: A
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
Reference.
http://www.gratisexam.com/
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12- 2_55_se/configuration/guide/3750xscg/swqos.html
QUESTION 462
Which two statements about the client-identifier in a DHCP pool are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Reference.
http://www.gratisexam.com/
http://www.gratisexam.com/
If router R1 is functioning as a DHCPv6 server and you enter the command show ipv6 dhcp binding, which two options are pieces of information in the output?
(Choose two.)
A.
B.
C.
D.
E.
The IA PD
The DUID
The prefix pool
The DNS server
The Rapid-Commit setting
Correct Answer: AB
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
In the following example, the show ipv6 dhcp binding command shows information about two clients, including their DUIDs, IAPDs, prefixes, and preferred and valid
lifetimes:
Router# show ipv6 dhcp binding
Client: FE80::202:FCFF:FEA5:DC39 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5DC1C
IA PD. IA ID 0x00040001, T1 0, T2 0
Prefix: 3FFE:C00:C18:11::/68
preferred lifetime 180, valid lifetime 12345
expires at Nov 08 2002 02:24 PM (12320 seconds)
Client: FE80::202:FCFF:FEA5:C039 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5C01C
IA PD. IA ID 0x00040001, T1 0, T2 0
Prefix: 3FFE:C00:C18:1::/72
preferred lifetime 240, valid lifetime 54321
expires at Nov 09 2002 02:02 AM (54246 seconds)
Prefix: 3FFE:C00:C18:2::/72
preferred lifetime 300, valid lifetime 54333
expires at Nov 09 2002 02:03 AM (54258 seconds)
Prefix: 3FFE:C00:C18:3::/72
preferred lifetime 280, valid lifetime 51111
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe- 3s/dhcp-xe-3s-book/ip6-dhcp-prefix-xe.html
QUESTION 464
Which two statements about NPTv6 are true? (Choose two.)
A.
B.
C.
D.
The translation is invisible to applications that hard code IP information within the application logic.
It is a one-way stateful translation for the IPv6 address.
Translation is 1:1 at the network layer.
It is a two-way stateless translation for the network prefix.
Correct Answer: CD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
This document describes a stateless, transport-agnostic IPv6-to-IPv6 Network Prefix Translation (NPTv6) function that provides the address-independence benefit
http://www.gratisexam.com/
associated with IPv4-to-IPv4 NAT (NAPT44) and provides a 1:1 relationship between addresses in the "inside" and "outside" prefixes, preserving end-to-end
reachability at the network layer.
NPTv6 Translation is stateless, so a "reset" or brief outage of an NPTv6 Translator does not break connections that traverse the translation function, and if multiple
NPTv6 Translators exist between the same two networks, the load can shift or be dynamically load shared among them. NPTv6 is defined to include a two-way,
checksum-neutral, algorithmic translation function, and nothing else.
Reference. https://tools.ietf.org/html/rfc6296
QUESTION 465
Which three protocols can use enhanced object tracking? (Choose three.)
A.
B.
C.
D.
E.
F.
HSRP
Proxy-ARP
VRRP
GLBP
NTP
DHCP
Flow caching
A flow collector
The data analyzer
Flow sequence numbers
Cisco Express Forwarding
http://www.gratisexam.com/
F. Multicast
Correct Answer: ABC
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NetFlow includes three key components that perform the following capabilities:
Flow caching analyzes and collects IP data flows entering router or switch interfaces and prepares data for export. It enables the accumulation of data on flows
with unique characteristics, such as IP addresses, application, and CoS.
FlowCollector and Data Analysis captures exported data from multiple routers and filters and aggregates the data according to customer policies, and then
stores this summarized or aggregated data. Users can leverage Cisco NetFlow collector as a flow collector, or they can opt for a variety of third-party partner
products. A Graphical user interface displays and analyzes NetFlow data collected from FlowCollector files. This allows users to complete near-real-time
visualization or trending analysis of recorded and aggregated flow data. Users can specify the router and aggregation scheme and desired time interval.
Reference. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios- netflow/product_data_sheet0900aecd80173f71.html
QUESTION 467
Which two options are actions that EEM can perform after detecting an event? (Choose two.)
A.
B.
C.
D.
Correct Answer: BC
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
action snmp-trap
To specify the action of generating a Simple Network Management Protocol (SNMP) trap when an Embedded Event Manager (EEM) applet is triggered, use the
action snmp-trap command in applet configuration mode.
action reload
To specify the action of reloading the Cisco IOS software when an Embedded Event Manager (EEM) applet is triggered, use the action reload command in applet
configuration mode.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_eem2.html
http://www.gratisexam.com/
QUESTION 468
On which three options can Cisco PfR base its traffic routing? (Choose three.)
A.
B.
C.
D.
E.
F.
Time of day
An access list with permit or deny statements
Load-balancing requirements
Network performance
User-defined link capacity thresholds
Router IOS version
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
BGP
EIGRP
Static routing
OSPF
IS-IS
http://www.gratisexam.com/
Correct Answer: DE
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Protocol Independent Route Optimization (PIRO) introduced the ability of Performance Routing (PfR) to search for a parent route--an exact matching route, or a
less specific route--in the IP Routing Information Base (RIB), allowing PfR to be deployed in any IP-routed environment including Interior Gateway Protocols (IGPs)
such as OSPF and IS-IS.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/pfr/configuration/guide/15_1/pfr_15_1_book/pfr- piro.html
QUESTION 471
Which two tasks are required for configuring SNMP to send traps on a Cisco IOS device? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The best current practices recommend applying Access Control Lists (ACLs) to community strings and ensuring that the requests community strings are not
identical to notifications community strings. Access lists provide further protection when used in combination with other protective measures.
This example sets up ACL to community string:
access-list 1 permit 1.1.1.1 snmp-server community string1 ro 1
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do not require that requests be sent from the SNMP
manager. Unsolicited (asynchronous) notifications can be generated as traps or inform requests. Traps are messages alerting the SNMP manager to a condition on
the network. Inform requests (informs) are traps that include a request for confirmation of receipt from the SNMP manager. Notifications can indicate improper user
authentication, restarts, the closing of a connection, loss of connection to a neighbor router, or other significant events.
http://www.gratisexam.com/
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf014.html# wp1007320
QUESTION 472
Which two statements about SNMP traps are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AF
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The SNMP agent contains MIB variables whose values the SNMP manager can request or change. A manager can get a value from an agent or store a value into
the agent. The agent gathers data from the MIB, the repository for information about device parameters and network data. The agent can also respond to a
manager's requests to get or set data.
An agent can send unsolicited traps to the manager. Traps are messages alerting the SNMP manager to a condition on the network. Traps can mean improper
user authentication, restarts, link status (up or down), MAC address tracking, closing of a TCP connection, loss of connection to a neighbor, or other significant
events.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12- 2_55_se/configuration/guide/scg_2960/swsnmp.html
QUESTION 473
A configuration includes the line ip nbar port-map SSH tcp 22 23 443 8080. Which option describes the effect of this configuration line?
A.
B.
C.
D.
It configures NBAR to search for SSH using ports 22, 23, 443, and 8080.
It configures NBAR to allow SSH connections only on ports 22, 23, 443, and 8080.
It enables NBAR to inspect for SSH connections.
It creates a custom NBAR port-map named SSH and associates TCP ports 22, 23, 443, and 8080 to itself.
Correct Answer: A
Section: Infrastructure Services
Explanation
http://www.gratisexam.com/
Explanation/Reference:
Explanation:
The ip nbar-port-map command configures NBAR to search for a protocol or protocol name using a port number other than the well-known port.
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/command/reference/fqos_r/qrfcmd10.pdf
QUESTION 474
Which configuration sets a minimum quality of service on a Layer 2 access switch?
A. mls qos cos override
mls qos cos 2
B. mls qos cos 2
C. mls qos trust cos
mls qos cos 2
D. mls qos trust cos
E. mls qos trust dscp
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The mls qos cos override interface command must be used to ensure that untrusted CoS values are explicitly set 0 (default).
Reference:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/QoS- SRND-Book/QoSDesign.html
QUESTION 475
Refer to the exhibit.
http://www.gratisexam.com/
If the route to 10.1.1.1 is removed from the R2 routing table, which server becomes the master NTP server?
A.
B.
C.
D.
R2
the NTP server at 10.3.3.3
the NTP server at 10.4.4.4
the NTP server with the lowest stratum number
Correct Answer: D
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
NTP uses a concept called "stratum" that defines how many NTP hops away a device is from an authoritative time source. For example, a device with stratum 1 is a
very accurate device and might have an atomic clock attached to it. Another NTP server that is using this stratum 1 server to sync its own time would be a stratum 2
device because it's one NTP hop further away from the source. When you configure multiple NTP servers, the client will prefer the NTP server with the lowest
stratum value.
Reference: https://networklessons.com/network-services/cisco-network-time-protocol-ntp/
QUESTION 476
Refer to the exhibit.
http://www.gratisexam.com/
Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable?
A.
B.
C.
D.
object tracking
HSRP
GLBP
LACP
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The object tracking feature allows you to create a tracked object that multiple clients can use to modify the client behavior when a tracked object changes. Several
clients register their interest with the tracking process, track the same object, and take different actions when the object state changes.
Clients include the following features:
Embedded Event Manager (EEM)
Gateway Load Balancing Protocol (GLBP)
Hot Standby Redundancy Protocol (HSRP)
Virtual port channel (vPC)
Virtual Router Redundancy Protocol (VRRP)
The object tracking monitors the status of the tracked objects and communicates any changes made to interested clients. Each tracked object is identified by a
unique number that clients can use to configure the action to take when a tracked object changes state.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx- os/unicast/configuration/guide/l3_cli_nxos/l3_object.html
QUESTION 477
Refer to the exhibit.
http://www.gratisexam.com/
Which two options are effects of the given configuration? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
The "ip flow-export destination 209.165.200.227 49152" command specifies that the data export destination server is 209.165.200.227 using UDP port 49152.
The "ip route-cache flow" command under the fastethernet 0/0 interface enable netflow switching on that interface.
QUESTION 478
Which three options are components of an EEM CLI policy? (Choose three.)
A.
B.
C.
D.
E.
F.
Safe-Tcl
applet name
Fast Tcl
event
action
Tcl bytecode
http://www.gratisexam.com/
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5500/sw/system_management/6x/b _5500_System_Mgmt_Config_6x/
b_5500_System_Mgmt_Config_6x_chapter_010011.html
QUESTION 479
Which two statements best describe the difference between active mode monitoring and passive mode monitoring? (Choose two.)
A.
B.
C.
D.
Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links.
Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetfFow.
Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link.
Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links.
Correct Answer: CD
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Passive and Active Monitoring
Passive monitoring is the act of OER gathering information on user packets assembled into flows by NetFlow. OER, when enabled, automatically enables NetFlow
on the managed interfaces on the border routers. By aggregating this information on the border routers and periodically reporting the collected data to the master
controller, the network prefixes and applications in use can automatically be learned. Additionally, attributes like throughput, reachability, loading, packet loss, and
latency can be deduced from the collected flows.
Active monitoring is the act of generating IP SLA probes to generate test traffic for the purpose of obtaining information regarding the characteristics of the WAN
links. Active probes can either be implicitly generated by OER when passive monitoring has identified destination hosts, or explicitly configured by the network
manager in the OER configuration.
Reference:
http://products.mcisco.com/en/US/docs/solutions/Enterprise/WAN_and_MAN/Transport_diversity/ Transport_Diversity_PfR.html#wp199209
QUESTION 480
Which option is a core event publisher for EEM?
A.
B.
C.
D.
Timer
Policy Director
Applet
Script
Correct Answer: A
http://www.gratisexam.com/
http://www.gratisexam.com/
It allows client applications to use dynamic ports to communicate with a server regardless of whether NAT is being used.
It maintains granular security over application-specific data.
It allows synchronization between multiple streams of data between two hosts.
Application layer gateway is used only in VoIP/SIP deployments.
Client applications require additional configuration to use an application layer gateway.
An application layer gateway inspects only the first 64 bytes of a packet before forwarding it through the network.
http://www.gratisexam.com/
You are configuring the S1 switch for the switch port that connects to the client computer. Which configuration blocks users on the port from using more than 6
Mbps of traffic and marks the traffic for a class of service of 1?
http://www.gratisexam.com/
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: A
Section: Infrastructure Services
Explanation
Explanation/Reference:
Explanation:
Only option A specified that the exceed and violate actions are set to drop for traffic over the CIR of 6 Mbps, and is also configured to set all traffic with a COS of 1
using the "set cos1" command.
QUESTION 483
Which EIGRP packet types are sent as unicast packets?
A.
B.
C.
D.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 484
What is a reason for an EIGRP router to send an SIA reply to a peer?
A.
B.
C.
D.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 485
Refer to the exhibit.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 486
What is the most common use for route tagging in EIGRP?
A.
B.
C.
D.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 487
Refer to the exhibit.
http://www.gratisexam.com/
A.
B.
C.
D.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 488
Which two statements about the max-age time in IS-IS are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 489
Which two statements about the default behavior of IS-IS are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AC
Section: Mix Questions
Explanation
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 490
Which two statements about BPDU guard are true? (Choose two.)
http://www.gratisexam.com/
A. The global configuration command spanning-tree portfast bpduguard default shuts down interfaces that are in the PortFast-operational state when a BPDU is
received on that port.
B. The interface configuration command spanning-tree portfast bpduguard enable shuts down only interfaces with PortFast enabled when a BPDU is received.
C. BPDU guard can be used to prevent an access port from participating in the spanning tree in the service provider environment.
D. BPDU guard can be used to protect the root port.
E. BPDU guard can be used to prevent an invalid BPDU from propagating throughout the network.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 491
Which two 802.1D port states are expected in a stable Layer 2 network? (Choose two.)
A.
B.
C.
D.
E.
forwarding
learning
listening
blocking
disabled
Correct Answer: AD
http://www.gratisexam.com/
protocol ID
version
type
max-age
flags
message age
ARP
BOOTP
DHCP
SLARP
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 494
http://www.gratisexam.com/
Which two protocols does the Management Plane Protection feature support? (Choose two.)
A.
B.
C.
D.
ARP
HTTPS
TFTP
OSPF
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 495
Refer to the exhibit.
Which configuration reduces CPU utilization on R2 while still advertising the connected routes of R2 to R1?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 496
Which authentication types does OSPF support?
A.
B.
C.
D.
E.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 497
Which ICMP message type is used to assist path MTU discovery?
A.
B.
C.
D.
destination unreachable
redirect message
source quench
time exceeded
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 498
A configuration includes the line ip route 10.0.0.0 255.0.0.0 172.16.10.10 permanent. Which option is a benefit of configuring this static route as permanent?
A. It allows the route to be redistributed into the network even if the outgoing interface is down.
B. It allows the route to be saved in the running configuration of the device.
http://www.gratisexam.com/
C. It places a hidden tag on the route that can be matched on other devices.
D. It allows the route to have a tracking status even if no tracking object is configured.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 499
Refer to the exhibit.
Which two statements about the R1 configuration are true? (Choose two.)
A.
B.
C.
D.
E.
The IP TTL value is copied to the MPLS field during label imposition.
The structure of the MLPS network is hidden in a traceroute.
The LDP session interval and hold times are configured for directly connected neighbors.
R1 protects the session for 86400 seconds.
All locally assigned labels are discarded.
Correct Answer: BD
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 500
Which two statements about IPsec VTI implementation are true? (Choose two.)
A.
B.
C.
D.
The IKE SA can be bound to the VTI and the crypto map.
The transform set can be configured only in tunnel mode.
SVTIs support only a single IPsec SA.
SVTIs support IPv4 packets that carry IPv6 packets.
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 501
Which command sets the maximum segment size for a TCP packet initiated from a router?
A.
B.
C.
D.
ip mtu
ip tcp adjust-mss
ip tcp mss
ip tcp window-size
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 502
Which circumstance can cause TCP starvation and UDP dominance to occur?
A.
B.
C.
D.
http://www.gratisexam.com/
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 503
Refer to the exhibit.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 504
Which two statements about reverse ARP are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 505
Refer to the exhibit.
http://www.gratisexam.com/
This network is configured with PIM, and the RPF check has failed toward the multicast source. Which two configuration changes must you make to router R3 to
enable the RPF check to pass? (Choose two.)
A.
B.
C.
D.
Configure a static multicast route to the multicast source through the tunnel interface.
Configure a static multicast route to the multicast source LAN through the tunnel interface.
Configure a static multicast route to the multicast source LAN through the Ethernet interface.
Remove the command ip prim bidir-enable from the R3 configuration.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 506
In which two situations is an EIGRP hello packet sent as unicast? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 507
Which three options are results of the command no mpls ip propagate-ttl? (Choose three.)
A.
B.
C.
D.
E.
It prevents the TTL from being copied from the IP header to the MPLS header.
It prevents the MPLS hops from being visible to a CE router when you perform a traceroute.
A fixed TTL value of 255 is used for the first label of the IP packet.
It prevents the TTL from being copied from the MPLS header back into the IP header.
MPLS hops remain visible on a CE router when you perform a traceroute.
http://www.gratisexam.com/
F. A fixed TTL value of 1 is used for the first label of the IP packet.
Correct Answer: ABC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 508
Which statement about how a CE router is used in an MPLS VPN is true?
A.
B.
C.
D.
It is located on the customer premises, where it peers and exchanges routes with the provider edge router.
It is located on the provider premises, where it peers and exchanges routes with the customer edge router.
It is located on the customer premises, but it is fully controlled by the provider, which provides a full routing table to the customer.
It is located on the provider premises, and it routes only MPLS label traffic.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 509
Which three options are three benefits of an MPLS VPN? (Choose three.)
A.
B.
C.
D.
E.
F.
It allows IP address space overlap by maintaining customer routes in a private routing table.
It offers additional security by preventing intrusions directly into the customer routing table.
It offers a transparent virtual network in which all customer sites appear on one LAN.
It offers additional security by allowing only dynamic routing protocols between CE and PE routers.
It allows IP address space overlap by maintaining customer routes in the global routing table with unique BGP communities.
Providers can send only a default route for Internet access into the customer VPN.
QUESTION 510
Into which two pieces of information does the LISP protocol split the device identity? (Choose two.)
A.
B.
C.
D.
E.
F.
Routing Locator
Endpoint Identifier
Resource Location
Enterprise Identifier
LISP ID
Device ID
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 511
Which two protocols are used to establish IPv6 connectivity over an MPLS network? (Choose two.)
A.
B.
C.
D.
E.
F.
6PE
6VPE
RSVP
ISATAP
LDP
IPv6IP
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 512
Which three types of traffic are protected when you implement IPsec within an IPv6-in-IPv4 tunnel? (Choose three.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Which two configuration changes enable you to log in to the router? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 515
Refer to the exhibit.
informational only
informational and debugging
informational, debugging, notifications, warnings, errors, critical, alerts, and emergencies
informational, notifications, warnings, errors, critical, alerts, and emergencies
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 516
External EIGRP route exchange on routers R1 and R2 was failing because the routers had duplicate router IDs. You changed the eigrp router-id command on R1,
but the problem persists. Which additional action must you take to enable the routers to exchange routes?
A.
B.
C.
D.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 517
Which two BGP path attributes are visible in Wireshark? (Choose two.)
A.
B.
C.
D.
weight
AS path
local preference
route maps
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 518
Refer to the exhibit.
http://www.gratisexam.com/
If a Layer 3 switch running OSPF in a VRF-lite configuration reports this error, which action can you take to correct the problem?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 519
Which statement describes the effect of the configuration line redistribute maximum-prefix 1500 90 withdraw?
A.
B.
C.
D.
After the 1500th route is redistributed, a warning is posted in the log file and 90 more routes are redistributed before further routes are discarded.
After the 1350th route is redistributed, a warning is posted in the log file until the 1500th route is redistributed, and then further routes are discarded.
After the 1500th route is redistributed, further routes are discarded only if the CPU is above 90%.
The routing protocol receives 1500 routes. After the routing process has redistributed 90% of the routes, the process supernets routes and injects a NULL route
to prevent black-hole routing.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 520
Which option is a correct match criterion for policy-based routing?
A.
B.
C.
D.
length
interface type
interface
cost
Correct Answer: A
http://www.gratisexam.com/
bfd all-interfaces
timers active-time disabled
timers active-time 1
timers nsf route-hold 20
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 522
Which two statements about BGP loop prevention are true? (Choose two.)
A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering.
B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route
loop.
C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary.
D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering.
E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a
route loop.
F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 523
Which option is the default point of insertion for the BGP cost community?
A.
B.
C.
D.
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 524
Refer to the exhibit.
Which BGP feature allows R1 to send R2 a list of prefixes that R2 is prevented from advertising to R1?
A.
B.
C.
D.
route refresh
Prefix-Based Outbound Route Filtering
distribute lists
prefix lists
Correct Answer: B
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 525
Refer to the exhibit.
Correct Answer: C
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 526
Which option describes what the default RT filter indicates when you implement the BGP RT constrained route distribution feature?
A.
B.
C.
D.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 527
Refer to the exhibit.
Which two issues can cause the interface VLAN10 to be down/down? (Choose two.)
A.
B.
C.
D.
The VLAN is inactive or has been removed from the VLAN database.
STP is in a forwarding state on the port.
A Layer 2 access port is configured with VLAN10, but is in a down/down state.
The autostate exclude feature was used on interface VLAN10.
Correct Answer: AC
Section: Mix Questions
Explanation
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 528
Refer to the exhibit.
Which two statements about this configuration are true? (Choose two.)
A.
B.
C.
D.
Pings from SW2 to SW1 fail because SW1 is pruning VLAN 10.
VLANs 10 and 200 are added to the SW2 allowed list on interface fa0/22.
Pings from SW2 to SW1 are successful.
Only VLAN 200 is added to the SW1 allowed list on interface fa0/22.
http://www.gratisexam.com/
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 529
Refer to the exhibit.
Which two conditions can cause this error message to be displayed on the console? (Choose two.)
A.
B.
C.
D.
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 530
Which three statements about RIPng are true? (Choose three.)
A.
B.
C.
D.
E.
F.
http://www.gratisexam.com/
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 532
Which two commands enable OSPF graceful shutdown? (Choose two.)
A.
B.
C.
D.
nsf cisco
ip ospf shutdown
shutdown
nsf ietf helper disable
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 533
Which object tracking function tracks the combined states of multiple objects?
http://www.gratisexam.com/
A.
B.
C.
D.
application
interface
stub-object
list
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 534
Which two options are EEM policies? (Choose two.)
A.
B.
C.
D.
E.
applets
event detectors
scripts
syslogs
actions
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 535
Which two metrics are measured with active probes when PfR voice traffic optimization is in use? (Choose two.)
A.
B.
C.
D.
MOS
cost
jitter
bandwidth
Correct Answer: AC
http://www.gratisexam.com/
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 537
Which three protocols support SSM? (Choose three.)
A.
B.
C.
D.
E.
F.
IGMPv2
IGMPv3
IGMP v3lite
URD
CGMP
IGMPv1
http://www.gratisexam.com/
QUESTION 538
Which additional feature must be enabled on a switch to allow PIM snooping to function correctly?
A.
B.
C.
D.
IGMP snooping
port security
storm control
dynamic ARP inspection
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 539
Which protocol uses a proprietary 2-byte Type field for multiple protocol support?
A.
B.
C.
D.
HDLC
PPP
CHAP
PAP
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 540
How many address families can a single OSPFv3 instance support?
A.
B.
C.
D.
1
2
5
10
http://www.gratisexam.com/
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 541
Which two statements about LDP advertising when Explicit Null is in effect are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 542
You are configuring a DMVPN hub to perform CBWFQ on a per-spoke basis. Which information is used to identify the spoke?
A.
B.
C.
D.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 543
http://www.gratisexam.com/
Which option is true about output policing for the control plane?
A.
B.
C.
D.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 544
You are configuring a DHCPv6 client for a DHCPv6 server with the prefix delegation feature. Which option is a result of the interface configuration when you enter
the command ipv6 address autoconfig default?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 545
Refer to the exhibit.
http://www.gratisexam.com/
You are bringing a new MPLS router online and have configured only what is shown to bring LDP up. Assume that the peer has been configured in a similar
manner. You verify the LDP peer state and see that there are no neighbors. What will the output of show mpls ldp discovery show?
A. Interfaces:
Ethernet0/0 (ldp): xmit
B. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 25.25.25.2:0; IP addr: 192.168.12.2
C. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 192.168.12.2:0; no route
D. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 25.25.25.2:0; no route
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 546
Which three features are common to OSPF and IS-IS? (Choose three.)
A.
B.
C.
D.
They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree.
They both use DR and BDR in the broadcast network.
They both use hello packets to form and maintain adjacencies.
They both use NSSA and stub type areas to scale the network design.
http://www.gratisexam.com/
the process ID
the hello interval
the subnet mask
authentication
the router ID
the OSPF interface priority
HTTP
ICMP Echo
ICMP Path Jitter
UDP Jitter for VoIP
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 549
What are two reasons to use the ip ospf database filter all out command? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 550
On a broadcast interface, which two OSPF states support BFD sessions? (Choose two.)
A.
B.
C.
D.
E.
F.
DR
BDR
DROTHER
2WAY
FULL
ACTIVE
Correct Answer: AB
http://www.gratisexam.com/
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 552
The no ip unreachables command is configured on interfaces to protect the control plane of a router.
Which mechanism is impacted by using this command?
A.
B.
C.
D.
ICMP redirects
path MTU discovery
source routing
ICMP router discovery protocol
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 553
Refer to the exhibit.
The customer wants to use IP SLA to create a failover to ISP2 when both Ethernet connections to ISP1 are down. The customer also requires that both connections
to ISP1 are utilized during normal operations.
Which IP route configuration accomplishes these requirements for the customer?
A. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3
B. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 4 100
C. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 100
D. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3 3
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 554
Which statement describes what it means if a router has an OSPF priority set to 0?
A.
B.
C.
D.
A router with the OSPF priority set to 0 is one that can participate in the election of a DR. It has the highest priority.
A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR, but it can become a BDR
A router with the OSPF priority set to 0 is one that cannot participate in the election of a DR. It can become neither a DR nor a BDR.
A router with the OSPF priority set to 0 is one that cannot participate in the election of a BDR, but it can become a DR
Correct Answer: C
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 555
What is the maximum number of classes that MQC can support in a single policy map?
A.
B.
C.
D.
512
256
128
64
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 556
DRAG DROP
Drag each IPv6 extension header on the left to its corresponding description on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Correct Answer:
Drag and drop each PHB on the left to the functionality it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
QUESTION 563
DRAG DROP
Drag and drop each policy command on the left to the function it performs on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
full mesh
partial mesh
hub and spoke
ring
Correct Answer: C
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 565
Which two issues is TCP Sequence Number Randomization designed to prevent? (Choose two.)
A.
B.
C.
D.
E.
DDOS attacks
OS fingerprinting
man-in-the-middle attacks
ARP poisoning
Smurf attack
Correct Answer: BC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 566
Which value is the maximum segment size if you start with an MTU of 1500 bytes and then remove the overhead of the Ethernet header, IP header, TCP header,
and the MAC frame check sequence?
A.
B.
C.
D.
1434 bytes
1460 bytes
1458 bytes
1464 bytes
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 567
Which three improvements does Cisco IOS XE Software offer over traditional IOS Software? (Choose three.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
F.
Which two benefits result from using this command on a switch? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 569
http://www.gratisexam.com/
Which two statements about IPv4 and IPv6 networks are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 570
Refer to the exhibit.
Which two statements about this capture are true? (Choose two.)
A.
B.
C.
D.
http://www.gratisexam.com/
Received BPDUs are looped back toward the sender to ensure that the link is bidirectional.
If BPDUs are no longer received on a port, the switch immediately sends out a TCN BPDU.
Extended topology information is encoded into all BPDUs.
BPDUs are sent bidirectional on all active network ports, including blocked and alternate ports.
Correct Answer: D
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 572
Refer to the exhibit.
http://www.gratisexam.com/
The VLAN-to-MST mapping is shown. (Assume SW1 acts as root for all possible MST instances.)
spanning-tree mst configuration name MST
revision 2
instance 0 vlan 1-200,301-4094 instance 1 vlan 201-300
!
If this topology is deployed, which action is required for traffic to flow on VLAN 200 and 300?
A.
B.
C.
D.
E.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 573
Which statement about UDLD is true?
A.
B.
C.
D.
The udld reset command resets ports that have been error-disabled by both UDLD and Fast UDLD.
Fast UDLD is configured in aggressive mode.
Only bidirectional link failures can be detected in normal mode.
Each switch in a UDLD topology can send and receive packets to and from its neighbors.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 574
http://www.gratisexam.com/
What is the VLAN ID range of VLANs that are eligible for pruning?
A.
B.
C.
D.
2 through 1001
1 through 1005
1 through 4096
2 through 1005
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 575
Refer to the exhibit.
http://www.gratisexam.com/
The two standalone chassis are unable to convert into a VSS. What can you do to correct the problem?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 576
http://www.gratisexam.com/
Which two statements about the MAC address table space are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 577
Which two statements about 802.1Q tunneling are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 578
Which two options about PIM-DM are true? (Choose two.)
A. PIM-DM initally floods multicast traffic throughout the network.
B. In a PIM-DM network, routers that have no upstream neighbors prune back unwanted traffic.
C. PIM-DM supports only shared trees.
http://www.gratisexam.com/
It requires an RP.
It forwards multicast packets on a shared distribution tree.
It floods multicast packets to neighbors that have requested the data.
It floods multicast packets throughout the network.
It forwards multicast packets to neighbors that have requested the data.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 580
Refer to the exhibit.
http://www.gratisexam.com/
R1 and R2 both advertise 10.50.1.0/24 to R3 and R4 as shown. R1 is the primary path. Which path does traffic take from the R4 data center to the file server?
A. All traffic travels from R4 to R2 to the file server.
B. All traffic travels from R4 to R3 to R1 to the file server.
C. Traffic is load-balanced from R4 to R2 and R3. Traffic that is directed to R3 then continues to R1 to the file server. Traffic that is directed to R2 continues to the
file server.
D. All traffic travels from R4 to R2 to R1 to the file server.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 581
Which two statements about path selection are true? (Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
If there are multiple equal matches between OSPF processes, the path with the lowest OSPF PID is chosen.
If the backdoor command is configured on a BGP network, the route is advertised with an AD of 20.
If an OSPF E2 route has an AS of 90, that path is preferred over an OSPF IA route with an AD of 110.
If there are multiple equal matches between the same protocols on an EIGRP network, the preferred path will be EIGRP with the highest AS.
If IS-IS has multiple routes with the same prefix-length, it will prefer Level 1 routes over Level 2 routes.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 582
Which two statements about BGP prefix-based outbound filtering are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 583
Which statement about OSPF loop prevention is true?
A.
B.
C.
D.
The discard route is generated automatically on the ABR to prevent routing loops.
The ASBR uses type 3 LSAs from non-backbone areas to prevent control-plane routing loops.
The ABR can filter type 3 LSPs to prevent routing loops.
The DN bit ignores LSA types 2, 3, and 5 to prevent routing loops.
http://www.gratisexam.com/
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 584
Which three options must be configured when deploying OSPFv3 for authentication? (Choose three.)
A.
B.
C.
D.
E.
F.
G.
H.
Correct Answer: AC
Section: Mix Questions
Explanation
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 586
Which two statements about EIGRP load balancing are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 587
Refer to the exhibit.
http://www.gratisexam.com/
All routers are running EIGRP and the network has converged. R3 and R4 are configured as EIGRP Stub. If the link between R1 and R3 goes down, which
statement is true?
A.
B.
C.
D.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 588
An NSSA area has two ABRs connected to Area 0. Which statement is true?
A. Both ABRs translate Type-7 LSAs to Type-5 LSAs.
http://www.gratisexam.com/
B. The ABR with the highest router ID translates Type-7 LSAs to Type-5 LSAs.
C. Both ABRs forward Type-5 LSAs from the NSSA area to backbone area.
D. No LSA translation is needed.
Correct Answer: B
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 589
Which two OSPF network types require the use of a DR and BDR? (Choose two.)
A.
B.
C.
D.
E.
non-broadcast networks
point-to-point networks
point-to-multipoint networks
broadcast networks
point-to-multipoint non-broadcast networks
Correct Answer: AD
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 590
Which packet does a router receive if it receives an OSPF type 4 packet?
A.
B.
C.
D.
E.
hello packet
database descriptor packet
link state update packet
link state request packet
link state acknowledge packet
Correct Answer: C
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 591
Which two statements about OSPFv3 are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 592
DRAG DROP
Drag each OSPF route-type identifier on the left to its description on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
AS path
local preference
MED
weight
cluster list
Correct Answer: CE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 595
Which two statements about IBGP multipath are true? (Choose two.)
A.
B.
C.
D.
E.
F.
The IGP metric of the BGP next hop can be different from the best-path IGP metric if you configure the router for unequal-cost IBGP multipath.
The IGP metric of the BGP next hop must be the same as the best-path IGP metric.
The equivalent next-hop-self is performed on the best path from among the IBGP multipaths before it is forwarded to external peers.
The path should be learned from an external neighbor.
The router BGP process must learn the path from a confederation-external or external neighbor.
The router BGP process must learn the path from an internal neighbor.
Correct Answer: AF
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 596
Refer to the exhibit.
Which three statements about the device with this configuration are true? (Choose three.)
A.
B.
C.
D.
E.
F.
AS4_AGGREGATOR
AS4_PATH
AS4_PLAIN
AS4_DOT
AS4_TRANS
Correct Answer: AB
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 598
Which three statements about the default behaviour of eBGP sessions are true? (Choose three.)
A.
B.
C.
D.
E.
F.
eBGP sessions between sub-ASs in different confederations transmit the next hop unchanged.
The next hop in an eBGP peering is the IP address of the neighbor that announced the route.
When a route reflector reflects a route to a client, it transmits the next hop unchanged.
The next hop in an eBGP peering is the loopback address of the interface that originated the route.
The next hop in an eBGP peering is the loopback address of the neighbor that announced the route.
When a route reflector reflects a route to a client, it changes the next hop to its own address.
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Correct Answer: A
Section: Mix Questions
http://www.gratisexam.com/
Explanation
Explanation/Reference:
QUESTION 601
Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 602
Refer to the exhibit.
Your organization has two offices, Site 1 and Site 2, which are connected by a provider backbone, as shown. Where must you configure an attachment circuit to
http://www.gratisexam.com/
allow the two sites to connect over a Layer 2 network using L2TPv3?
A.
B.
C.
D.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 603
What are two benefits of Per-Tunnel QoS for DMVPN? (Choose two.)
A.
B.
C.
D.
E.
The administrator can configure criteria that, when matched, can automatically set up QoS for each spoke as it comes online.
Traffic from each spoke to the hub can be regulated individually.
When traffic exceeds a configurable threshold, the spokes can automatically set up QoS with the hub.
The hub can send large packets to a spoke during allotted timeframes.
The hub can be regulated to prevent overloading small spokes.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 604
Which two statements about VPLS are true? (Choose two.)
A.
B.
C.
D.
E.
http://www.gratisexam.com/
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 605
DRAG DROP
Drag each MPLS term on the left to the matching statement on the right.
Select and Place:
Correct Answer:
http://www.gratisexam.com/
http://www.gratisexam.com/
Which two actions can you take to enable CE-1 at site A to access the Internet? (Choose two.)
A.
B.
C.
D.
E.
Create a default route for site A on PE-1 with the next hop set to the PE-2 interface to the Internet.
Originate a default route in site B with the next hop set to the PE-2 Internet interface, and import the default route into site A.
Create a default route on CE-1 with the next hop set to the PE-1 upstream interface.
Originate a default route in site A with the next hop set to the PE-2 interface to CE-1.
Create a static default route on CE-1 with the next hop set to the PE-2 interface to the Internet.
Correct Answer: AB
Section: Mix Questions
Explanation
http://www.gratisexam.com/
Explanation/Reference:
QUESTION 607
Which attribute is transported over an MPLS VPN as a BGP extended community?
A.
B.
C.
D.
E.
route target
route distinguisher
NLRI
origin
local preference
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 608
Which Layer 2 tunneling technique eliminates the need for pseudowires?
A.
B.
C.
D.
OTV
L2TPv3
AToM
VPLS
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 609
Refer to the exhibit.
http://www.gratisexam.com/
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 610
DRAG DROP
Drag each GETVPN component on the left to its function on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
Router 1 acts as the primary key server because it has a higher priority.
An RSA key has been imported into the configuration.
The GDOI group configuration generated a key.
DPD is disabled.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 612
When you implement CoPP on your network, what is its default action?
A. permit all traffic
http://www.gratisexam.com/
B.
C.
D.
E.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 613
DRAG DROP
Drag each SNMP term on the left to the matching definition on the right.
Select and Place:
http://www.gratisexam.com/
Correct Answer:
http://www.gratisexam.com/
If a console port is configured as shown, which response is displayed when you connect to the console port?
A.
B.
C.
D.
E.
a blinking cursor
the message "Authorized users only"
the username prompt
three username name prompts followed by a timeout message
the message "Connection refused"
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 615
Which map is locally defined?
A.
B.
C.
D.
DSCP-to-DSCP-mutation
CoS-to-DSCP
IP-precedence-to-DSCP
DSCP-to-CoS
Correct Answer: A
http://www.gratisexam.com/
802.1Q frame headers carry the CoS value in the three most-significant bits of the 2-byte Tag Control Information field.
ISL frame headers carry an IEEE 802.1P CoS value in the three least-significant bits of the 2- byte User field.
ISL frame headers carry an IEEE 802.1P CoS value in the three most-significant bits of the 1- byte User field.
On 802.1Q trunks, traffic in the native VLAN is carried in 802.1Q frames.
Only 802.1Q and ISL frame types can carry CoS information.
On 802.1Q trunks, traffic in the native VLAN is carried in 802.1P frames.
Correct Answer: AE
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 617
Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)
A.
B.
C.
D.
E.
SIP
HTTP
FTP
SMTP
POP3
Correct Answer: AC
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 618
Refer to the exhibit.
Which configuration can you implement on PE-1 to allow CE-1 to receive delegated IPv6 prefixes? A)
B)
http://www.gratisexam.com/
C)
D)
E)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Exhibit A
Exhibit B
Exhibit C
Exhibit D
Exhibit E
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 619
Which two statements about VRRP are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 620
What are two benefits of NVI? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 621
An IP SLA fails to generate statistics. How can you fix the problem?
A.
B.
C.
D.
E.
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
QUESTION 622
Which cache aggregation scheme is supported by NetFlow ToS-based router aggregation?
A. prefix-port
B. AS
http://www.gratisexam.com/
C. protocol port
D. destination prefix
Correct Answer: A
Section: Mix Questions
Explanation
Explanation/Reference:
http://www.gratisexam.com/
http://www.gratisexam.com/