Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-410 Questions and Answers

Question # 6

Refer to the exhibit A network engineer notices that the configured track option is down Which configuration resolves the issue*?

A.

ip sla schedule 10 start-time now

B.

ip sla schedule 10 start-time pending life forever

C.

ip sla schedule 10 no timeout

D.

ip sla schedule 10 no threshold

Full Access
Question # 7

Refer to the exhibit.

Which two commands provide the administrator with the information needed to resolve the issue? (Choose two.)

A.

snmp user

B.

debug snmp engine-id

C.

debug snmpv3 engine-id

D.

debug snmp packet

E.

showsnmpv3 user

Full Access
Question # 8

Which two protocols are used by a P router to transfer VPN traffic between PE routers in an MPLS network? (Choose two.)

A.

BGP

B.

OSPF

C.

MP-BGP

D.

LDP

E.

RSVP

Full Access
Question # 9

What are two characteristics of IPv6 Source Guard? (Choose two.)

A.

requires IPv6 snooping on Layer 2 access or trunk ports

B.

used in service provider deployments to protect DDoS attacks

C.

requires the user to configure a static binding

D.

requires that validate prefix be enabled

E.

recovers missing binding table entries

Full Access
Question # 10

R1 cannot receive the R2 Interfaces with individual prefixes. What must be reconfigured to advertise R2 Interfaces to R1?

A.

EIGRP process on R2 by removing the stub command Keyword summary

B.

interface FastEthernet0/1 on R2 with an EIGRP summary for all three loopback prefixes

C.

EIGRP process on R2 with the command stub summary receive-only

D.

ElGRP process on R2 with the command stub summary connected

Full Access
Question # 11

A customer is running an mGRE DMVPN tunnel over WAN infrastructure between hub and spoke sites. The existing configuration allows NHRP to add spoke routers automatically to the multicast NHRP mappings. The customer is migrated the network from IPv4 to the IPv6 addressing scheme for those spokes’ routers that support IPv6 and can run DMVPN tunnel over the IPv6 network. Which configuration must be applied to support IPv4 and IPv6 DMVPN tunnel on spoke routers?

A.

Tunnel mode ipv6ip 6to4

B.

Tunnel mode ipv6ip isatap

C.

Tunnel mode ipv6ip auto-tunnel

D.

Tunnel mode ipv6ip 6rd

Full Access
Question # 12

Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies?

A.

RIB

B.

FEC

C.

LDP

D.

CEF

Full Access
Question # 13

Refer to the exhibit. A network engineer cannot remote access R3 using Telnet from switch S1. Which action resolves the issue?

A.

Allow the inbound connection via the exec command on R3.

B.

Add the transport input telnet command on R3.

C.

Allow to use the ssh -I admin 10.0.0.1 command on the switch.

D.

Add the login admin command on the switch.

Full Access
Question # 14

A network administrator performed a Compact Flash Memory upgrade on a Cisco Catalyst 6509 Switch. Everything is functioning normally except SNMP, which was configured to monitor the bandwidth of key interfaces but the interface indexes are changed. Which global configuration resolves the issue?

A.

snmp-server ifindex permanent

B.

snmp ifindex permanent

C.

snmp-server ifindex persist

D.

snmp ifindex persist

Full Access
Question # 15

Refer to the exhibit.

A loop occurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled. Which action prevents the loop between R1, R2, and R3?

A.

Configure route tagging

B.

Enable split horizon

C.

Configure R2 as stub receive-only

D.

Configure route filtering

Full Access
Question # 16

Refer to the exhibit. The services at branch B are down. An engineer notices mal rouler A and router B are not exchanging any routes Which configuration resolves the issue on router B?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

Refer to the exhibit.

A network administrator is trying to switch to the privileged EXEC level on R1 but failed. Which configuration resolves the issue?

A.

Enable password Cisco@123

B.

tacass server enable-password Cisco@123

C.

tacacs-server enable-password Cisco@123

D.

enable-password Cisco@123

Full Access
Question # 18

Refer to the exhibits.

London must reach Rome using a faster path via EIGRP if all the links are up but it failed to take this path Which action resolves the issue?

A.

Increase the bandwidth of the link between London and Barcelona

B.

Use the network statement on London to inject the 172 16 X 0/24 networks into EIGRP.

C.

Change the administrative distance of RIP to 150

D.

Use the network statement on Rome to inject the 172 16 X 0/24 networks into EIGRP

Full Access
Question # 19

Refer to the exhibit. R1 uses SP1 as the primary path. A network engineer must force all SSH traffic generated from R1 toward SP2. Which configuration accomplishes the task?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 20

Refer to the exhibit. Users on a call center report that they cannot browse the internet on Saturdays during the afternoon. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

An engineer configured a router with this configuration

ip access-hst DENY TELNET

10 deny tcp any any eq 23 log-input

The router console starts receiving log message :%SEC-6-IPACCESSLOGP: list DENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) ->192.168.2.20(23), 1 packet"

Which action stops messages on the console while still denying Telnet?

A.

Configure a 20 permit ip any any command

B.

Remove log-Input keyword from the access list.

C.

Replace log-input keyword with the log keyword in the access list.

D.

Configure a 20 permit ip any any log-input command.

Full Access
Question # 22

Refer to the exhibit.

While troubleshooting a BGP route reflector configuration, an engineer notices that reflected routes are missing from neighboring routers. Which two BGP configurations are needed to resolve the issue? (Choose two)

A.

neighbor 10.1.1.14 route-reflector-client

B.

neighbor R2 route-reflector-client

C.

neighbor 10.1.1.2 allowas-in

D.

neighbor R4 route-reflector-client

E.

neighbor 10.1.1.2 route-reflector-client

Full Access
Question # 23

Refer to the exhibit.

An engineer must configure EIGRP between R1 and R2 with no summary route. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

Refer to the exhibit.

The network administrator configured the network to establish connectivity between all devices and notices that the ASBRs do not have routes for each other. Which set of configurations resolves this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

Refer to lhe exhibit After an engineer configured a new Cisco rouler as a DHCP server, users reponed iwo primary issues:

Devices in the HR subnet have intermittent connectivity problems.

Workstations in the LEGAL subnet cannot obtain IP addresses.

Which configurations must the engineer apply to ROUTER_1 to restore connectivity for the affected devices?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

Refer to the exhibit.

An administrator configures a router to stop using a particular default route if the DNS server 8.8.8.8 is not reachable through that route. However, this configuration did not work as desired and the default route still works even if the DNS server 8.8.8 8 is unreachable. Which two configuration changes resolve the issue? (Choose two.)

A.

Configure two static routes for the 8.8.8.8/32 destination to match the IP SLA probe for each ISP.

B.

Associate every IP SLA probe with the proper WAN address of the router.

C.

Reference the proper exit interfaces along with the next hops in both static default routes.

D.

Use a separate track object to reference the existing IP SLA 1 probe for every static route.

E.

Use a separate IP SLA probe and track object for every static route

Full Access
Question # 27

A DMVPN network is preconfigured with tunnel 0 IP address 192.168.1.254 on the HUB, IP connectivity, crypto policies, profiles, and EIGRP AS 100. The NHRP password is ccnp123, and the network ID and tunnel key is EIGRP ASN Do not introduce a static route. Configure DMVPN connectivity between routers BR1 and BR2 to the HUB router using physical interface as the tunnel source to achieve these goals:

Full Access
Question # 28

Refer to the exhibit.

A network administrator must block ping from user 3 to the App Server only. An inbound standard access list is applied to R1 interface G0/0 to block ping. The network administrator was notified that user 3 cannot even ping user 9 anymore. Where must the access list be applied in the outgoing direction to resolve the issue?

A.

R2 interface G1/0

B.

R2 interface G0/0

C.

SW1 interface G1/10

D.

SW1 interface G2/21

Full Access
Question # 29

A network administrator successfully established a DMVPN tunnel with one hub and two spokes using EIGRP. One of the requirements was to enable spoke-to-spoke tunnels through the hub router using EIGRP. Which configuration command must the engineer configure to meet the requirement?

A.

no ip eigrp 1 mode multipoint

B.

no ip eigrp 1 split-horizon

C.

no ip eigrp 1 tunnel-redirect

D.

no ip eigrp 1 mode mgre

Full Access
Question # 30

An engineer is creating a policy that overrides normal routing behavior.if the route to a destination of

10.100.100.0/24 is withdrawn from the routing

Table, the policy must direct traffic to a next hop of 10.1 1.1. if the route is present in the routing table, then

normal forwarding must occur. Which

configuration meets the requirements?

A.

access-list 100 permit ip any any!route-map POLICY permit 10match ip address 100set ip next-hop recursive 10.1.1.1

B.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!Route-map POLICY permit 10match ip address 100set ip default next-hop 10.1.1.1

C.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route-map POLICY permit 10match ip address 100set ip next-hop 10.1.1.1!route map POLICY permit 20

D.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route map POLICY permit 10match ip address 100Set ip next-hop recursive 10.1.1.1!route-map POLICY permit 20

Full Access
Question # 31

Refer to the exhibit.

An administrator is troubleshooting a time synchronization problem for the router time to another Cisco IOS XE-based device that has recently undergone hardening. Which action resolves the issue?

A.

Allow NTP in the ingress ACL on 10.1.225.40 by permitting UDP destined to port 123.

B.

Ensure that he CPE router has a valid route to 10.1.255. 40 for NTP and rectify if not reachable.

C.

NTP service is disabled and must be enabled on 10.1.225.40.

D.

Allow NTP in the ingress ACL on 10.1.255.40 by permitting TCP destined to port 123.

Full Access
Question # 32

What is a function of IPv6 Source Guard?

A.

It works with address glean or ND to find existing addresses.

B.

It inspects ND and DHCP packets to build an address binding table.

C.

It denies traffic from known sources and allocated addresses.

D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

Full Access
Question # 33

Refer to the exhibit. An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 34

Refer to the exhibit EIGRP adjacency between router A and router C is not working as expected Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 35

A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router?

A.

ip nhrp registration ignore

B.

ip nhrp registration no-registration

C.

ip nhrp registration dynamic

D.

ip nhrp registration no-unique

Full Access
Question # 36

Refer to the exhibit.

An administrator configured a Cisco router for TACACS authentication, but the router is using the local enable password instead Which action resolves the issue?

A.

Configure the aaa authentication login admin group admin local enable command instead.

B.

Configure the aaa authentication login admin group tacacs* local enable none command instead.

C.

Configure the aaa authentication login admin group tacacs* local if-authenticated command instead.

D.

Configure the aaa authentication login default group admin local if-authenticated command instead.

Full Access
Question # 37

Refer to the exhibit. After recovering from a power failure. Ethernet0/1 stayed down while Ethernet0/0 returned to the up/up state The default route through ISP1 was not reinstated m the routing table until Ethernet0/1 also came up Which action resolves the issue?

A.

Reference the track object 1 in both static default routes

B.

Remove the references to the interface names from both static default routes

C.

Configure the default route through ISP1 with a higher administrative distance than 2.

D.

Add a static route to the 8 8.8 8/32 destination through the next hop 203.0.113.1

Full Access
Question # 38

:587

Which IP precedence value does BFD use to prioritize traffic within an infrastructure device?

A.

4

B.

5

C.

6

D.

7

Full Access
Question # 39

How are CE advertised routes segmented from other CE routers on an MPLS PE router?

A.

with a combination of VRF-Lite and MP-BGP

B.

by pushing MPLS labels advertised by LDP on customer routes

C.

by enabling multiple instances of BGP. one for each CE router

D.

by assigning CE-facing interfaces to different VRFs

Full Access
Question # 40

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

WAN

CORE

MGMT

Full Access
Question # 41

Refer to the exhibit. An engineer configured two ASBRs, 10.4.17.6 and 10.4.15.5, in an OSPF network to redistribute identical routes from BGR However, only prefixes from 10.4.17.6 are installed into the routing table on R1. Which action must the engineer take to achieve load sharing for the BGP-originated prefixes?

A.

The ASBRs are advertising the redistributed prefixes with the iBGP metric and must be modified to Type 1 on ASBR 10.4.17.6.

B.

The ASBRs are advertising the redistributed prefixes with a different admin distance and must be changed to 110 on ASBR 10.4.15.5.

C.

The admin distance of the prefixes must be adjusted to 20 on ASBR 10.4.15.5 to advertise prefixes to R1 identically from both ASBRs.

D.

The ASBRs are advertising the redistributed prefixes as Type 1 and must be modified to Type 2

Full Access
Question # 42

Refer to the exhibit.

Which set of commands restore reachability to loopback0?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Which two components are required for MPLS Layer 3 VPN configuration? (Choose two)

A.

Use pseudowire for Layer 2 routes

B.

Use MP-BGP for customer routes

C.

Use OSPF between PE and CE

D.

Use a unique RD per customer VRF

E.

Use LDP for customer routes

Full Access
Question # 44

Refer to the exhibit.

An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue?

A.

ip access-list extended OSPF permit ospf any any

B.

policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop

C.

control-plane service-policy input COPP

D.

class-map match-all OSFP match access-group name OSPF

Full Access
Question # 45

Refer to the exhibit.

Which policy configuration on R1 forwards any traffic that is sourced from the 192 168 130 0'24 network to R2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

Refer to the exhibit. The default route is not advertised to the neighboring router. Which action resolves the issue?

A.

Configure the redistribute static metric 200 subnets command under OSPF.

B.

Configure OSPF on the Dialer0 interface.

C.

Configure the network 0.0.0.0 255.255.255.255 area 0 command under OSPF.

D.

Configure the default-information originate command under OSPF.

Full Access
Question # 47

Refer to the exhibit.

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 48

Which rouler takes an active role between two LDP neighbors when initiating LDP session negotiation and LDP TCP connection establishment?

A.

with the higher IP address

B.

with the larger number of LDP TCP neighbors

C.

with the lowest IP address

D.

with one interface in the MPLS backbone

Full Access
Question # 49

What is the role of LDP in MPLS networks?

A.

It enables label binding that exchanges route descriptors

B.

It creates MPLS packet forwarding along with the IGP routes.

C.

It disables label binding information to exchange with peer LSRs.

D.

It enables label binding information to exchange with peer LSRs

Full Access
Question # 50

Refer to the exhibit A network administrator is troubleshooting to reduce the routing table of R4 and R5 to learn only the default route to communicate from Inter-Area and Intra-Area networks Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

Refer to the exhibit.

A bank ATM site has difficulty connecting with the bank server. A network engineer troubleshoots the issue and finds that R4 has no active route to the bank ATM site. Which action resolves the issue?

A.

Advertise 10.10.30.0/24 subnet in R1 EIGRP AS.

B.

EIGRP peering between R3 and R4 to be fixed.

C.

EIGRP peering between R1 and R2 to be fixed.

D.

Advertise 10.10.30.0/24 subnet in R3 EIGRP AS.

Full Access
Question # 52

Refer to the exhibit A company builds WAN infrastructure between the head office and POPs using DMVPN hub-and-spoke topology to provide end-to-end communication All POPs must maintain point-to-point connectivity with the head office Which configuration meets the requirement at routers R12 and R13?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 53

Refer to the exhibit.

An engineer cannot copy the IOS.bin file from the FTP server to the switch.

Which action resolves the issue?

A.

Allow file permissions to download the file from the FTP server.

B.

Add the IOS.bin file, which does not exist on FTP server.

C.

Make memory space on the switch flash or USB drive to download the file.

D.

Use the copy flash:/ ftp://cisco@10.0.0.2/IOS.bin command.

Full Access
Question # 54

Which routing protocol is used by the PE router to advertise routes to a CE router without redistribution or static after removing the RD tag from the P router?

A.

IS-IS

B.

OSPF

C.

BGPIPv4

D.

MP-BGP

Full Access
Question # 55

What are the two goals of micro BFD sessions? (Choose two.)

A.

The high bandwidth member link of a link aggregation group must run BFD

B.

Run the BFD session with 3x3 ms hello timer

C.

Continuity for each member link of a link aggregation group must be verified

D.

Eny member link on a link aggregation group must run BFD

E.

Each member link of a link aggregation group must run BFD.

Full Access
Question # 56

Which 0S1 model is used to insert an MPLS label?

A.

between Layer 5 and Layer 6

B.

between Layer 1 and Layer 2

C.

between Layer 3 and Layer 4

D.

between Layer 2 and Layer 3

Full Access
Question # 57

An engineer configured routing between multiple OSPF domains and introduced a routing loop that caused network instability. Which action resolves the problem?

A.

Set a tag using the redistribute command toward a domain and deny inbound m the other domain by a matching tag

B.

Set a tag using the redistribute command toward a different domain and deny the matching tag when exiting from that domain

C.

Set a tag using the network command in a domain and use the route-map command to deny the matching lag when exiting toward a different domain

D.

Set a tag using the network command in a domain and use the route-map command to deny the matching tag when entering into a different domain

Full Access
Question # 58

Refer to the exhibit The engineer configured route redistribution in the network but soon received reports that R2 cannot access 192 168 7 0/24 and 192 168 15 0/24 subnets Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

Which is statement about IPv6 inspection is true?

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 61

Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A.

nonbroadcast multiaccess

B.

packet switching

C.

policy-based routing

D.

forwarding information base

Full Access
Question # 62

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 63

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

A.

DMVPN

B.

GETVPN

C.

Cisco Easy VPN

D.

FlexVPN

Full Access
Question # 64

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 65

While troubleshooting connectivity issues to a router, these details are noticed:

Standard pings to all router interfaces, including loopbacks, are successful.

Data traffic is unaffected.

SNMP connectivity is intermittent.

SSH is either slow or disconnects frequently.

Which command must be configured first to troubleshoot this issue?

A.

show policy-map control-plane

B.

show policy-map

C.

show interface | inc drop

D.

show ip route

Full Access
Question # 66

Which option is the best for protecting CPU utilization on a device?

A.

fragmentation

B.

COPP

C.

ICMP redirects

D.

ICMP unreachable messages

Full Access
Question # 67

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 68

Refer to the exhibit.

Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and

ignores BGP traffic that is sent at higher rate?

A.

policy-map SHAPE_BGP

B.

policy-map LIMIT_BGP

C.

policy-map POLICE_BGP

D.

policy-map COPP

Full Access
Question # 69

Refer to the exhibit.

A company is evaluating multiple network management system tools. Trending graphs generated by SNMP data are returned by the NMS and appear to have multiple gaps. While troubleshooting the issue, an engineer noticed the relevant output. What solves the gaps in the graphs?

A.

Remove the exceed-rate command in the class map.

B.

Remove the class map NMS from being part of control plane policing.

C.

Configure the CIR rate to a lower value that accommodates all the NMS tools

D.

Separate the NMS class map in multiple class maps based on the specific protocols with appropriate CoPP actions

Full Access
Question # 70

An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A.

sudo maglev-config update

B.

sudo maglev install config update

C.

sudo maglev reinstall

D.

sudo update config install

Full Access
Question # 71

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 72

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 73

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 74

Refer to the exhibit.

An engineer configures a static route on a router, but when the engineer checks the route

to the destination, a different next hop is chosen. What is the reason for this?

A.

Dynamic routing protocols always have priority over static routes.

B.

The metric of the OSPF route is lower than the metric of the static route.

C.

The configured AD for the static route is higher than the AD of OSPF.

D.

The syntax of the static route is not valid, so the route is not considered.

Full Access
Question # 75

Which command displays the IP routing table information that is associated with VRF-Lite?

A.

show ip vrf

B.

show ip route vrf

C.

show run vrf

D.

show ip protocols vrf

Full Access
Question # 76

Refer to the exhibit.

Why is user authentication being rejected?

A.

The TACACS+ server expects “user”, but the NT client sends “domain/user”.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

C.

The TACACS+ server is down, and the user is in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Full Access
Question # 77

What is an advantage of using BFD?

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Full Access
Question # 78

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 79

Which transport layer protocol is used to form LDP sessions?

A.

UDP

B.

SCTP

C.

TCP

D.

RDP

Full Access
Question # 80

Drag and drop the operations from the left onto the locations where the operations are performed on the right.

Full Access
Question # 81

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 82

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?

A.

shared risk link group-disjoint

B.

linecard-disjoint

C.

lowest-repair-path-metric

D.

interface-disjoint

Full Access
Question # 84

Refer to Exhibit.

Which statement about redistribution from BGP into OSPF process 10 is true?

A.

Network 172.16.1.0/24 is not redistributed into OSPF.

B.

Network 10.10 10.0/24 is not redistributed into OSPF

C.

Network 172.16.1.0/24 is redistributed with administrative distance of 1.

D.

Network 10.10.10.0/24 is redistributed with administrative distance of 20.

Full Access
Question # 85

What is the role of a route distinguisher via a VRF-Lite setup implementation?

A.

It extends the IP address to identify which VFP instance it belongs to.

B.

It manages the import and export of routes between two or more VRF instances

C.

It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities

D.

It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities

Full Access
Question # 86

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

An engineer configured a company’s multiple area OSPF head office router and Site A cisco

routers with VRF lite. Each site router is connected to a PE router of an MPLS backbone.

After finishing both site router configurations, none of the LSA 3,4 5, and 7 are installed at Site A router. Which configuration resolves this issue?

A.

configure capability vrf-lite on Site A and its connected PE router under router ospf 1 vrf abc

B.

configure capability vrf-lite on Head Office and its connected PE router under router ospf 1 vrf abc

C.

configure capability vrf-lite on both PE routers connected to Head Office and Site A routers under routtr ospf 1 vrf abc

D.

configure capability vrf-lite on Head Office and Site A routers under router ospf 1 vrf abc

Full Access
Question # 88

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Full Access
Question # 89

Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?

A.

show track

B.

show threshold

C.

show timer

D.

show delay

Full Access
Question # 90

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 91

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 92

Exhibit:

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 93

Which configuration enabled the VRF that is labeled “Inet” on FastEthernet0/0?

A.

R1(config)# ip vrf InetR1(config-vrf)#interface FastEthernet0/0R1(config-if)#ip vrf forwarding Inet

B.

R1(config)#router ospf 1 vrf InetR1(config-router)#ip vrf forwarding FastEthernet0/0

C.

R1(config)#ip vrf Inet FastEthernet0/0

D.

R1(config)# ip vrf InetR1(config-vrf)#ip vrf FastEthernet0/0

Full Access
Question # 94

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A.

service timestamps log uptime

B.

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.

service timestamps log datetime localtime show-timezone

D.

clock calendar-valid

Full Access
Question # 95

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 96

Refer to the exhibits.

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two

commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

C.

The ip nhrp redirect commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Full Access
Question # 97

Refer to the exhibit.

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

A.

no ip ssh disable

B.

ip ssh enable

C.

ip ssh version 2

D.

crypto key generate rsa

Full Access
Question # 98

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 99

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 100

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 101

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A.

Copy the file to the destination router with the copy tftp: flash: command

B.

Enable the TFTP server on the source router with the tftp-server flash: command

C.

TFTP is not supported in recent IOS versions, so an alternative method must be used

D.

Configure a user on the source router with the username tftp password tftp command

E.

Configure the TFTP authentication on the source router with the tftp-server authentication local command

Full Access
Question # 102

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRPautonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Full Access
Question # 103

Refer to the exhibit.

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 104

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 105

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

A.

DMVPN

B.

MPLS VPN

C.

Virtual Tunnel Interface (VTI)

D.

SSL VPN

E.

PPPoE

Full Access
Question # 106

Drag and drop the MPLS terms from the left onto the correct definitions on the right.

Full Access
Question # 107

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 108

Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right.

Full Access
Question # 109

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 110

Which list defines the contents of an MPLS label?

A.

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.

32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

C.

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Full Access
Question # 111

Refer to the exhibit.

In which circumstance does the BGP neighbor remain in the idle condition?

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Full Access
Question # 112

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Full Access
Question # 113

Refer to the exhibit.

Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)

A.

Configure SNMP rw permission in addition to community ciscotest.

B.

Modify access list 1 and allow operations subnet in the access list.

C.

Modify access list 1 and allow SNMP in the access list.

D.

Configure SNMP rw permission in addition to version 1.

E.

Configure SNMP rw permission in addition to community ciscotest 1.

Full Access
Question # 114

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 115

What is the output of the following command:

show ip vrf

A.

Show's default RD values

B.

Displays IP routing table information associated with a VRF

C.

Show's routing protocol information associated with a VRF.

D.

Displays the ARP table (static and dynamic entries) in the specified VRF

Full Access
Question # 116

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 117

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 118

Refer to the exhibit.

An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A.

Configure the service timestamps log uptime command in global configuration mode.

B.

Configure the logging clock synchronize command in global configuration mode.

C.

Configure the service timestamps log datetime localtime command in global configuration mode.

D.

Make sure that the clock on the device is synchronized with an NTP server.

Full Access
Question # 119

Refer to the exhibit.

The R1 and R2 configurations are:

The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 tti-security hops 1neighbor 10.1.1.1 update-source loopback 0

B.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 disable-connected-checkneighbor 10.1.1.1 update-source loopback 0

C.

R2ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

D.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.1 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

E.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 disable-connected-checkneighbor 10.1.1.2 update-source Loopback0

Full Access
Question # 120

Refer to the exhibit.

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Full Access
Question # 121

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 122

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 123

Exhibit:

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 124

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 125

Exhibit:

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

A.

Check and resolve reachability between the WLC and the NTP server

B.

Reset the NTP server to resolve any synchronization issues for all devices

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Full Access
Question # 126

A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?

A.

tunnel interface of the hub with ip nhrp ospf dr

B.

OSPF priority to 0

C.

route map to set the metrics of learned routes to 110

D.

OSPF priority greater than 1

Full Access
Question # 127

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 128

What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)

A.

The VPNv4 address is used to advertise the MPLS VPN label.

B.

RD is prepended to the IPv4 route to make it unique.

C.

MP-BGP is used to allow overlapping IPv4 addresses between customers to advertisethrough the network.

D.

The IPv4 address is needed to tag the MPLS label.

E.

The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4prefix.

Full Access
Question # 129

What are two functions of LDP? (Choose two.)

A.

It is defined in RFC 3038 and 3039.

B.

It requires MPLS Traffic Engineering.

C.

It advertises labels per Forwarding Equivalence Class.

D.

It must use Resource Reservation Protocol.

E.

It uses Forwarding Equivalence Class

Full Access
Question # 130

Refer to the exhibit.

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 131

Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Full Access
Question # 132

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Full Access
Question # 133

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 134

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

A.

router bgp 64511aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511neighbor 192.168.100.1 summary-onlyneighbor 192.168.200.2 summary-only

C.

interface E 0/0ip bgp suppress-map BLOCK_SPECIFIC!interface E 0/1ip bgp suppress-map BLOCK_SPECIFIC!ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC!router bgp 64511aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Full Access
Question # 135

Refer to the exhibit.

R1 is being monitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?

A.

Modify the CoPP policy to increase the configured exceeded limit for SNMP.

B.

Modify the access list to include snmptrap.

C.

Modify the CoPP policy to increase the configured CIR limit for SNMP.

D.

Modify the access list to add a second line to allow udp any any eq snmp

Full Access
Question # 136

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 137

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access
Question # 138

Refer to the exhibit. Which action restores the routes from neighbors while still filtering 1.1.1.0/24?

A.

Add a second line in the access list to permit any.

B.

Modify the route map to permit the access list instead of deny it

C.

Modify the access list to deny instead of permit it.

D.

Add a second sequence in the route map permit 20

Full Access
Question # 139

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 140

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 141

Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue?

A.

HQ_R3(config)# ip sla responderHQ_R3(config)# ip sla responder icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 192.168.100.2

C.

HQ R3(config)# Ip sla responderHQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5

D.

BRANCH(config)# Ip sla 1BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1

Full Access
Question # 142

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 143

Refer to the exhibit.

The network administrator can see the DHCP discovery packet in R1. but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the FaO/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)

A.

service dhcp-relay command on R1

B.

ip dhcp option 82 command on R2

C.

service dhcp command on R1

D.

ip dhcp relay information enable command on R1

E.

ip dhcp relay information trust-all command on R2

Full Access
Question # 144

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 145

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Full Access
Question # 146

Refer to the exhibit.

PC-2 failed to establish a Telnet connection to the terminal server. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 147

Refer to the exhibit.

Troubleshoot and ensure that branch B only ever uses the MPLS B network to reach HQ. Which action achieves this requirement?

A.

Introduce an AS path filter on branch A routers so that only local prefixes are advertised into BGP

B.

increase the local preference for all HQ prefixes received at branch B from the MPLS B network to be higher than the local preferences used on the MPLS A network

C.

Introduce AS path prepending on the branch A MPLS B network connection so that any HQ advertisements from branch A toward the MPLS B network are prepended three times

D.

Modify the weight of all HQ prefixes received at branch B from the MPLS B network to be higher than the weights used on the MPLS A network

Full Access
Question # 148

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Full Access
Question # 149

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 150

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 151

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A.

VACL blocking broadcast frames from nonauthorized hosts

B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

Full Access
Question # 152

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 153

Refer to the exhibit.

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

A.

Configure logging history 2

B.

Configure logging history 3

C.

Configure logging history 4

D.

Configure logging history 5

Full Access
Question # 154

Refer to the exhibit.

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

A.

Configure TACACS+ synchronization with the Active Directory admin group

B.

Configure the username from a local database

C.

Configure full access for the username from TACACS+ server

D.

Configure an authorized IP address for this user to access this router

Full Access
Question # 155

Refer to the exhibit.

The administrator successfully logs into R1 but cannot access privileged mode commands. What should be configured to resolve the issue?

A.

aaa authorization reverse-access

B.

secret cisco123! at the end of the username command instead of password cisco123!

C.

matching password on vty lines as cisco123!

D.

enable secret or enable password commands to enter into privileged mode

Full Access
Question # 156

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 157

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 158

Refer to the exhibit.

While troubleshooting an EIGRP neighbor adjacency problem, the network engineer notices that the interface connected to the neighboring router is not participating in the EIGRP process. Which action resolves the issues?

A.

Configure the network command to network 172.16.0.1 0.0.0.0

B.

Configure the network command under EIGRP address family vrf CLIENT1

C.

Configure EIGRP metrics on interface FastEthernet0/3

D.

Configure the network command under EIGRP address family ipv4

Full Access
Question # 159

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 160

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 161

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 162

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Full Access
Question # 163

A network administrator is tasked to permit http and https traffic only toward the internet from the User1 laptop to adhere to company’s security policy. The administrator can still ping to www.cisco.com Which interface should the access list 101 be applied to resolve this issue?

A.

Interface G0/48 in the incoming direction

B.

Interface G0/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

D.

Interface G0/0 in the incoming direction.

Full Access
Question # 164

Refer to the exhibit. The network administrator configured the branch router for IPv6 on the E 0/0 interface The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the E 0/0 interface by using the address-family Ipv4 unicast command

B.

Disable IPv6 on the E 0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E 0/0 interface.

Full Access
Question # 165

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 166

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 167

Refer to the exhibit.

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Full Access
Question # 168

Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

B.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

C.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

D.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

Full Access
Question # 169

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 170

Refer to the exhibit.

A user cannot SSH to the router. What action must be taken to resolve this issue?

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Full Access
Question # 171

What does IPv6 Source Guard utilize to determine if IPv6 source addresses should be forwarded?

A.

ACE

B.

ACLS

C.

DHCP

D.

Binding Table

Full Access
Question # 172

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Full Access
Question # 173

Refer to the exhibit.

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Full Access
Question # 174

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

Full Access
Question # 175

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

A.

Interface Tunnel1no ip split-horizon eigrp 111

B.

Interface Tunnel1Ip next-hop-self elgrp 111

C.

Interface Tunnel1tunnel mode Ipsec Ipv4

D.

Interface Tunnel1tunnel protection ipsec profile IPSec-PROFILE

Full Access
Question # 176

An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A.

match the passwords

B.

match the hello timers

C.

match the MTUs

D.

match the network types

Full Access
Question # 177

Refer to the exhibit.

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 178

How does an MPLS Layer 3 VPN function?

A.

set of sites use multiprotocol BGP at the customer site for aggregation

B.

multiple customer sites interconnect through service provider network to create secure tunnels between customer edge devices

C.

set of sites interconnect privately over the Internet for security

D.

multiple customer sites interconnect through a service provider network using customer edge to provider edge connectivity

Full Access