Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-410 Questions and Answers

Question # 6

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 7

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 8

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) to the outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

What is the role of a route distinguisher via a VRF-Lite setup implementation?

A.

It extends the IP address to identify which VFP instance it belongs to.

B.

It manages the import and export of routes between two or more VRF instances

C.

It enables multicast distribution for VRF-Lite setups to enhance EGP routing protocol capabilities

D.

It enables multicast distribution for VRF-Lite setups to enhance IGP routing protocol capabilities

Full Access
Question # 10

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 12

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 13

Which component of MPLS VPNs is used to extend the IP address so that an engineer is able to

identify to which VPN it belongs?

A.

VPNv4 address family

B.

RD

C.

RT

D.

LDP

Full Access
Question # 14

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Full Access
Question # 15

What is an advantage of using BFD?

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Full Access
Question # 16

Refer to the exhibit.

An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A.

Configure the service timestamps log uptime command in global configuration mode.

B.

Configure the logging clock synchronize command in global configuration mode.

C.

Configure the service timestamps log datetime localtime command in global configuration mode.

D.

Make sure that the clock on the device is synchronized with an NTP server.

Full Access
Question # 17

Refer to the exhibit.

After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

A.

Set the administrative distance 100 under the RIP process on R2.

B.

Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.

C.

Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.

D.

Redistribute the directly connected interfaces on R2.

Full Access
Question # 18

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 19

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 20

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

Full Access
Question # 21

Refer to the exhibit.

A company is evaluating multiple network management system tools. Trending graphs generated by SNMP data are returned by the NMS and appear to have multiple gaps. While troubleshooting the issue, an engineer noticed the relevant output. What solves the gaps in the graphs?

A.

Remove the exceed-rate command in the class map.

B.

Remove the class map NMS from being part of control plane policing.

C.

Configure the CIR rate to a lower value that accommodates all the NMS tools

D.

Separate the NMS class map in multiple class maps based on the specific protocols with appropriate CoPP actions

Full Access
Question # 22

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 23

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 24

Which SNMP verification command shows the encryption and authentication protocols that are used in

SNMPV3?

A.

show snmp group

B.

show snmp user

C.

show snmp

D.

show snmp view

Full Access
Question # 25

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 26

Refer to the exhibit.

An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A.

Use the icmp-echo command to track both default routes

B.

Use the same AD for both default routes

C.

Start IP SLA by matching numbers for track and ip sla commands

D.

Start IP SLA by defining frequency and scheduling it

Full Access
Question # 27

When provisioning a device in Cisco DNA Center, the engineer sees the error message “Cannot select the device. Not compatible with template”.

What is the reason for the error?

A.

The template has an incorrect configuration.

B.

The software version of the template is different from the software version of the device.

C.

The changes to the template were not committed.

D.

The tag that was used to filter the templates does not match the device tag.

Full Access
Question # 28

What is a prerequisite for configuring BFD?

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Full Access
Question # 29

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 30

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A.

R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.

B.

R1 does not accept any routes other than 192.168.130.0/24

C.

R1 does not forward traffic that is destined for 192.168.30.0/24

D.

Network 192.168.130.0/24 is not allowed in the R1 table

Full Access
Question # 31

Refer to the exhibit.

R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?

A.

R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.

B.

Route reflector setup requires full IBGP mesh between the routers.

C.

In route reflector setup, only classful prefixes are advertised to other clients.

D.

In route reflector setups, prefixes are not advertised from one client to another.

Full Access
Question # 32

Exhibit:

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-

7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 33

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Full Access
Question # 34

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Full Access
Question # 35

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 36

An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

A.

set ip next-hop

B.

set ip default next-hop

C.

set ip next-hop recursive

D.

set ip next-hop verify-availability

Full Access
Question # 37

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 38

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

Refer to the exhibit.

The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 41

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?

A.

BGP

B.

LLDP

C.

EIGRP

D.

NHRP

Full Access
Question # 42

Refer to the exhibit.

An engineer is trying to redistribute OSPF to BGP, but not all of the routes are

redistributed. What is the reason for this issue?

A.

By default, only internal routes and external type 1 routes are redistributed into BGP

B.

Only classful networks are redistributed from OSPF to BGP

C.

BGP convergence is slow, so the route will eventually be present in the BGP table

D.

By default, only internal OSPF routes are redistributed into BGP

Full Access
Question # 43

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 44

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 45

Which is statement about IPv6 inspection is true?

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 46

Refer to the exhibit.

An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?

A.

Add the aaa authentication login default none command to the global configuration.

B.

Replace the capital “C” with a lowercase “c” in the aaa authentication login Console local command.

C.

Add the aaa authentication login default group tacacs+ local-case command to the global

configuration.

D.

Add the login authentication Console command to the line configuration

Full Access
Question # 47

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 48

An engineer configured a company’s multiple area OSPF head office router and Site A cisco

routers with VRF lite. Each site router is connected to a PE router of an MPLS backbone.

After finishing both site router configurations, none of the LSA 3,4 5, and 7 are installed at Site A router. Which configuration resolves this issue?

A.

configure capability vrf-lite on Site A and its connected PE router under router ospf 1 vrf abc

B.

configure capability vrf-lite on Head Office and its connected PE router under router ospf 1 vrf abc

C.

configure capability vrf-lite on both PE routers connected to Head Office and Site A routers under routtr ospf 1 vrf abc

D.

configure capability vrf-lite on Head Office and Site A routers under router ospf 1 vrf abc

Full Access
Question # 49

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 50

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 51

While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?

A.

The device must be resynced to Cisco DNA Center.

B.

The software image for the device is in install mode.

C.

The device has lost connectivity to Cisco DNA Center.

D.

The software image for the device is in bundle mode

Full Access
Question # 52

Refer to the exhibit.

AAA server 10.1.1.1 is configured with the default authentication and accounting settings, but the switch cannot communicate with the server Which action resolves this issue?

A.

Match the authentication port

B.

Match the accounting port

C.

Correct the timeout value.

D.

Correct the shared secret.

Full Access
Question # 53

Refer to the exhibit.

Redistribution is enabled between the routing protocols, and nowPC2 PC3, and PC4 cannot reach PC1. What are the two solutions to fix the problem? (Choose two.)

A.

Filter RIP routes back into RIP when redistributing into RIP in R2

B.

Filter OSPF routes into RIP FROM EIGRP when redistributing into RIP in R2.

C.

Filter all routes except RIP routes when redistributing into EIGRP in R2.

D.

Filter RIP AND OSPF routes back into OSPF from EIGRP when redistributing into OSPF in R2

E.

Filter all routes except EIGRP routes when redistributing into OSPF in R3.

Full Access
Question # 54

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 55

Refer to the exhibit.

An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?

A.

An authentication error with the NTP server results in an incorrect timestamp.

B.

The keyword localtime is not defined on the timestamp service command.

C.

The NTP server is in a different time zone.

D.

The system clock is set incorrectly to summer-time hours.

Full Access
Question # 56

Refer to Exhibit.

Which statement about redistribution from BGP into OSPF process 10 is true?

A.

Network 172.16.1.0/24 is not redistributed into OSPF.

B.

Network 10.10 10.0/24 is not redistributed into OSPF

C.

Network 172.16.1.0/24 is redistributed with administrative distance of 1.

D.

Network 10.10.10.0/24 is redistributed with administrative distance of 20.

Full Access
Question # 57

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

A.

Detect Mult

B.

Required Min Echo RX Interval

C.

Desired Min TX Interval

D.

Required Min RX Interval

Full Access
Question # 58

A network administrator is tasked to permit http and https traffic only toward the internet from the User1 laptop to adhere to company’s security policy. The administrator can still ping to www.cisco .com Which interface should the access list 101 be applied to resolve this issue?

A.

Interface G0/48 in the incoming direction

B.

Interface G0/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

D.

Interface G0/0 in the incoming direction.

Full Access
Question # 59

Refer to the exhibit.

While troubleshooting an EIGRP neighbor adjacency problem, the network engineer notices that the interface connected to the neighboring router is not participating in the EIGRP process. Which action resolves the issues?

A.

Configure the network command to network 172.16.0.1 0.0.0.0

B.

Configure the network command under EIGRP address family vrf CLIENT1

C.

Configure EIGRP metrics on interface FastEthernet0/3

D.

Configure the network command under EIGRP address family ipv4

Full Access
Question # 60

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 61

What does the PE router convert the Ipv4 prefix to within an MPLS VPN?

A.

VPN-IPv4 prefix combined with the 64-bit route distinguisher

B.

48-bit route combining the IP and PE router-id

C.

prefix that combines the ASN, PE router-id, and IP prefix

D.

eBGP path association between the PE and CE sessions

Full Access
Question # 62

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 63

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 64

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 65

What are two characteristics of VRF instance? (Choose two.)

A.

All VRFs share customers routing and CEF tables .

B.

An interface must be associated to one VRF.

C.

Each VRF has a different set of routing and CEF tables

D.

It is defined by the VPN membership of a customer site attached to a P device.

E.

A customer site can be associated to different VRFs

Full Access
Question # 66

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Full Access
Question # 67

Refer to the exhibit.

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

A.

Configure TACACS+ synchronization with the Active Directory admin group

B.

Configure the username from a local database

C.

Configure full access for the username from TACACS+ server

D.

Configure an authorized IP address for this user to access this router

Full Access
Question # 68

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 69

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Full Access
Question # 70

Refer to the exhibit.

An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface. Which action resolves the issue?

A.

Modify line 10 of the access list to permit instead of deny.

B.

Remove line 60 from the access list.

C.

Modify line 30 of the access list to permit instead of deny.

D.

Remove line 70 from the access list.

Full Access
Question # 71

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 72

Refer to the exhibit.

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 73

Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Full Access
Question # 74

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 75

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 76

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 77

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 78

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 79

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 80

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

A.

Interface Tunnel1

no ip split-horizon eigrp 111

B.

Interface Tunnel1

Ip next-hop-self elgrp 111

C.

Interface Tunnel1

tunnel mode Ipsec Ipv4

D.

Interface Tunnel1

tunnel protection ipsec profile IPSec-PROFILE

Full Access
Question # 81

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Full Access
Question # 82

Refer to the exhibit.

AS65510 iBGP is configured for directly connected neighbors. R4 cannot ping or traceroute network 192 168.100.0/24 Which action resolves this issue?

A.

Configure R4 as a route reflector server and configure R1 as a route reflector client

B.

Configure R1 as a route reflector server and configure R2 and R3 as route reflector clients

C.

Configure R4 as a route reflector server and configure R2 and R3 as route reflector clients.

D.

Configure R1 as a route reflector server and configure R4 as a route reflector client

Full Access
Question # 83

Drag and drop the actions from the left into the correct order on the right to configure a policy to avoid following packet forwarding based on the normal routing path.

Full Access
Question # 84

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

interface Ethernet0/3

ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

interface Ethernet0/1

ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

!

interface Ethernet0/3

ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

!

interface Ethernet0/1

ip policy route-map PBR1

Full Access
Question # 85

Refer to the exhibits.

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 86

Refer to Exhibit.

The network administrator configured the branch router for IPv6 on the E0/0 interface. The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

B.

Disable IPv6 on the E0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the E0/0 interface by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E0/0 interface

Full Access
Question # 87

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 88

Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue?

A.

HQ_R3(config)# ip sla responder

HQ_R3(config)# ip sla responder icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 192.168.100.2

C.

HQ R3(config)# Ip sla responder

HQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5

D.

BRANCH(config)# Ip sla 1

BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1

Full Access
Question # 89

Refer to the exhibit.

The Math and Science departments connect through the corporate. IT router but users in the Math department must not be able to reach the Science department and vice versa Which configuration accomplishes this task?

A.

vrf definition Science

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

B.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

vrf forwarding Science

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

vrf forwarding Science

no shut

C.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

D.

vrf definition Science

address-family ipv4

!

interface E 0/2

vrf forwarding Science

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

vrf forwarding Science

ip address 192.168.2.1

Full Access
Question # 90

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 91

Refer to the exhibits.

When DMVPN is configured, which configuration allows spoke-to-spoke communication using loopback as a tunnel source?

A.

Configure crypto isakmp key cisco address 0.0.0.0 on the hub.

B.

Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.

C.

Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.

D.

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.

Full Access
Question # 92

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 93

What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)

A.

The VPNv4 address is used to advertise the MPLS VPN label.

B.

RD is prepended to the IPv4 route to make it unique.

C.

MP-BGP is used to allow overlapping IPv4 addresses between customers to advertise

through the network.

D.

The IPv4 address is needed to tag the MPLS label.

E.

The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4

prefix.

Full Access
Question # 94

Refer to the exhibit.

The OSPF routing protocol is redistributed into the BGP routing protocol, but not all the OSPF routes are distributed into BGP Which action resolves the issue?

A.

Include the word external in the redistribute command

B.

Use a route-map command to redistribute OSPF external routes defined in an access list

C.

Include the word internal external in the redistribute command

D.

Use a route-map command to redistribute OSPF external routes defined in a prefix list.

Full Access
Question # 95

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 96

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 97

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Full Access
Question # 98

What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Full Access
Question # 99

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responder

HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responder

HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 100

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 101

Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted on the 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip route command. Which action stabilizes the service?

A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.

B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.

C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.

Full Access
Question # 102

How does an MPLS Layer 3 VPN function?

A.

set of sites use multiprotocol BGP at the customer site for aggregation

B.

multiple customer sites interconnect through service provider network to create secure tunnels between customer edge devices

C.

set of sites interconnect privately over the Internet for security

D.

multiple customer sites interconnect through a service provider network using customer edge to provider edge connectivity

Full Access
Question # 103

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 104

Refer to the exhibit.

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 105

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 106

What are two functions of MPLS Layer 3 VPNs? (Choose two.)

A.

LDP and BGP can be used for Pseudowire signaling.

B.

It is used for transparent point-to-multipoint connectivity between Ethernet links/sites.

C.

BGP is used for signaling customer VPNv4 routes between PE nodes.

D.

A packet with node segment ID is forwarded along with shortest path to destination.

E.

Customer traffic is encapsulated in a VPN label when it is forwarded in MPLS network.

Full Access
Question # 107

What does IPv6 Source Guard utilize to determine if IPv6 source addresses should be forwarded?

A.

ACE

B.

ACLS

C.

DHCP

D.

Binding Table

Full Access
Question # 108

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 109

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 110

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 111

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 112

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 113

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 114

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 115

Refer to the exhibit.

An administrator is troubleshooting a time synchronization problem for the router time to another Cisco IOS XE-based device that has recently undergone hardening. Which action resolves the issue?

A.

Allow NTP in the ingress ACL on 10.1.225.40 by permitting UDP destined to port 123.

B.

Ensure that he CPE router has a valid route to 10.1.255. 40 for NTP and rectify if not reachable.

C.

NTP service is disabled and must be enabled on 10.1.225.40.

D.

Allow NTP in the ingress ACL on 10.1.255.40 by permitting TCP destined to port 123.

Full Access
Question # 116

Refer to the exhibit.

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1

destination 10.221.10.11

B.

flow exporter FlowAnalyzer1

destination 10.221.10.11

C.

interface Ethernet0/1

flow-destination 10.221.10.11

D.

interface Ethernet0/0

flow-destination 10.221.10.11

Full Access
Question # 117

Drag and drop the IPv6 first hop security device roles from the left onto the corresponding descriptions on the right.

Full Access
Question # 118

Refer to the exhibit.

A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?

A.

Remove ipv6 inspect ipv6-firewall in from interface gi0/1

B.

Add permit udp any eq domain any log in the access list.

C.

inspect ipv6 inspect name ipv6-firewall udp 53 in global config.

D.

Add permit any eq domain 53 any log in the access list.

Full Access
Question # 119

Refer to the exhibit.

Although summarization is configured for R1 to receive 10.0.0.0/8. more specific routes are received by R1. How should the 10.0.0.0/8 summary route be received from the neighbor, attached to R1 via Fast Ethernet0/0 interface?

A.

R1 should configure the ip summary-address eigrp 10.0.0.0.255.0.0.0 command under the Fast Ethernet 0/0 interface.

B.

The summarization condition is not met Router 10 1 100.10 requires a route for 10 0.0.0/8 that points to null 0

C.

The summarization condition is not met. The network 10.1.100.0/24 should be changed to 172.16.0.0/24.

D.

R1 should configure the ip summary-address eigrp 10.0.0.0 0.0.0.255 command under the Fast Ethernet 0/0 interface.

Full Access
Question # 120

Refer to the exhibit.

An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue?

A.

ip access-list extended OSPF permit ospf any any

B.

policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop

C.

control-plane service-policy input COPP

D.

class-map match-all OSFP match access-group name OSPF

Full Access
Question # 121

What are two characteristics of IPv6 Source Guard? (Choose two.)

A.

requires IPv6 snooping on Layer 2 access or trunk ports

B.

used in service provider deployments to protect DDoS attacks

C.

requires the user to configure a static binding

D.

requires that validate prefix be enabled

E.

recovers missing binding table entries

Full Access
Question # 122

Refer to the exhibit An engineer is troubleshooting an OSPF adjacency issue between directly connected routers R1 and R2 Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 123

Refer to the exhibit. An engineer notices a connectivity problem between routers R1 and R2. The frequency of this problem is high during peak business hours. Which action resolves the issue?

A.

Increase the MTU on the interfaces that connect R1 and R2.

B.

Increase the available bandwidth between R1 and R2.

C.

Decrease the EIGRP keepallve and hold down timers on R1 and R2.

D.

Set static EIGRP neighborship between R1 and R2.

Full Access
Question # 124

Which technique removes the outermost label of an MPLS-tagged packet before the packet is forwarded to an adjacent LER?

A.

label swap

B.

explicit-null

C.

label imposition

D.

PHP

Full Access
Question # 125

Refer to the exhibit The engineer configured route redistribution in the network but soon received reports that R2 cannot access 192 168 7 0/24 and 192 168 15 0/24 subnets Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 126

Refer to the exhibit.

An administrator is configuring a GRE tunnel to establish an EIGRP neighbor to a remote router. The other tunnel endpoint is already configured. After applying the configuration as shown, the tunnel started flapping. Which action resolves the issue?

A.

Stop sending a route matching the tunnel destination across the tunnel.

B.

Modify the network command to use the Tunne10 Interface netmask.

C.

Advertise the Loopback0 interface from R2 across the tunnel.

D.

Readdress the IP network on the Tunne10 on both routers using the /31 netmask.

Full Access
Question # 127

Refer to the exhibit.

An engineer must configure PBR on R1 to reach to 10.2.2.0/24 via R3 AS64513 as the primary path and a backup route through default route via R2 AS64513. All BGP routes are in the routing table of R1. but a static default route overrides BGP routes. Which PBR configuration achieves the objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 128

A customer is running an mGRE DMVPN tunnel over WAN infrastructure between hub and spoke sites. The existing configuration allows NHRP to add spoke routers automatically to the multicast NHRP mappings. The customer is migrated the network from IPv4 to the IPv6 addressing scheme for those spokes’ routers that support IPv6 and can run DMVPN tunnel over the IPv6 network. Which configuration must be applied to support IPv4 and IPv6 DMVPN tunnel on spoke routers?

A.

Tunnel mode ipv6ip 6to4

B.

Tunnel mode ipv6ip isatap

C.

Tunnel mode ipv6ip auto-tunnel

D.

Tunnel mode ipv6ip 6rd

Full Access
Question # 129

Refer to the exhibit.

An administrator configures a router to stop using a particular default route if the DNS server 8.8.8.8 is not reachable through that route. However, this configuration did not work as desired and the default route still works even if the DNS server 8.8.8 8 is unreachable. Which two configuration changes resolve the issue? (Choose two.)

A.

Configure two static routes for the 8.8.8.8/32 destination to match the IP SLA probe for each ISP.

B.

Associate every IP SLA probe with the proper WAN address of the router.

C.

Reference the proper exit interfaces along with the next hops in both static default routes.

D.

Use a separate track object to reference the existing IP SLA 1 probe for every static route.

E.

Use a separate IP SLA probe and track object for every static route

Full Access
Question # 130

What are the two reasons for RD and VPNv4 addresses in an MPLS Layer 3 VPN? (Choose two.)

A.

RD is prepended to each prefix to make routes unique.

B.

VPN RT communities are used to identify customer unique routes.

C.

When the PE redistributes customer routes into MP-BGP, they must be unique.

D.

They are on a CE device to use for static configuration.

E.

They are used for a BGP session with the CE device.

Full Access
Question # 131

Refer to the exhibit.

While troubleshooting a BGP route reflector configuration, an engineer notices that reflected routes are missing from neighboring routers. Which two BGP configurations are needed to resolve the issue? (Choose two)

A.

neighbor 10.1.1.14 route-reflector-client

B.

neighbor R2 route-reflector-client

C.

neighbor 10.1.1.2 allowas-in

D.

neighbor R4 route-reflector-client

E.

neighbor 10.1.1.2 route-reflector-client

Full Access
Question # 132

R1 cannot receive the R2 Interfaces with individual prefixes. What must be reconfigured to advertise R2 Interfaces to R1?

A.

EIGRP process on R2 by removing the stub command Keyword summary

B.

interface FastEthernet0/1 on R2 with an EIGRP summary for all three loopback prefixes

C.

EIGRP process on R2 with the command stub summary receive-only

D.

ElGRP process on R2 with the command stub summary connected

Full Access
Question # 133

A network administrator is trying to access a branch router using TACACS+ username and password credentials, but the administrator cannot log in to the router because the WAN connectivity is down. The branch router has following AAA configuration:

Which command will resolve this problem when WAN connectivity is down?

A.

aaa authentication login default group tacacs+ local

B.

aaa authentication login default group tacacs+ enable

C.

aaa authentication login default group tacacs+ console

D.

aaa authentication login console group tacacs+ enable

Full Access
Question # 134

Refer to the exhibit. The authentication is not working as desired and the user drops into user-exec mode. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 135

The summary route is not shown in the RouterB routing table after this below configuration on Router_A

.

Which Router_A configuration resolves the issue by advertising the summary route to Router B?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 136

What is an advantage of implementing BFD?

A.

BFD provides faster updates for any flapping route.

B.

BFD provides millisecond failure detection

C.

BFD is deployed without the need to run any routing protocol

D.

BFD provides better capabilities to maintain the routing table

Full Access
Question # 137

Refer to the exhibit. An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 138

Refer to the exhibit.

An OSPF neighbor relationship between R2 and R3 is showing stuck in EXCHANGE/EXSTART state. The neighbor is established between R1 and R2. The network engineer can ping from R2 to R3 and vice versa, but the

neighbor is still down. Which action resolves the issue?

A.

Restore the Layer 2/Layer 3 conectivity issue in the ISP network.

B.

Match MTU on both router interfaces or ignore MTU.

C.

Administrative "shut then no shut" both router interfaces.

D.

Enable OSPF on the interface, which is required.

Full Access
Question # 139

Refer to the exhibit. The default route is not advertised to the neighboring router. Which action resolves the issue?

A.

Configure the redistribute static metric 200 subnets command under OSPF.

B.

Configure OSPF on the Dialer0 interface.

C.

Configure the network 0.0.0.0 255.255.255.255 area 0 command under OSPF.

D.

Configure the default-information originate command under OSPF.

Full Access
Question # 140

A network administrator successfully established a DMVPN tunnel with one hub and two spokes using EIGRP. One of the requirements was to enable spoke-to-spoke tunnels through the hub router using EIGRP. Which configuration command must the engineer configure to meet the requirement?

A.

no ip eigrp 1 mode multipoint

B.

no ip eigrp 1 split-horizon

C.

no ip eigrp 1 tunnel-redirect

D.

no ip eigrp 1 mode mgre

Full Access
Question # 141

Refer to the exhibit.

An engineer applies a prefix-list filter that filters most of the network 10 prefixes instead of allowing them. Which action resolves the issue?

A.

Modify the ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 9 command.

B.

Modify the command Modify the Ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 32 command.

C.

Modify the Ip prefix-list ElGRP seq 20 permit 0.0.0.0/0 le 32 command.

D.

Modify the ip prefix-list ElGRP seq 20 permit 10.0.0.0/8 ge 9 command

Full Access
Question # 142

Refer to the exhibit The route to 192 168 200 0 is flapping between R1 and R2 Which set of configuration changes resolves the flapping route?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 143

Refer to the exhibit.

Which set of commands restore reachability to loopback0?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 144

Refer to the exhibit. An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead of current best path. Which action resolves the issue?

A.

Configure AS_PATH prepend for the desired best path

B.

Configure higher MED to select as the best path.

C.

Configure lower LOCAL_PREF to select as the best path.

D.

Configure AS_PATH prepend for the current best path

Full Access
Question # 145

Refer to the exhibit.

A shoe retail company implemented the uRPF solution for an antispoofing attack. A network engineer received the call that the branch A server is under an IP spoofing attack. Which configuration must be implemented to resolve the attack?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 146

An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 147

Refer to the exhibit.

An administrator must configure the router with OSPF for IPv4 and IPv6 networks under a single process. The OSPF adjacencies are not established and did not meet the requirement. Which action resolves the issue?

A.

Replace OSPF process 10 on the interface with OSPF process 1, and configure an additional router ID with IPv6 address.

B.

Replace OSPF process 10 on the interface with OSPF process 1, for the VPv6 addressma nd remove process route ID with IPv6 address.

C.

Replace OSPF process 10 on the interface with OSPF process 1, and remove process 10 from the global configuration.

D.

Replace OSPF process 10 on the interface with OSPF process 1 for the IPv4 address, and remove process 10 from the global configuration.

Full Access
Question # 148

Refer to the exhibit.

Which action restores OSPF adjacency between R1 and R2?

A.

Change the IP MTU of R1 Fa1/0 to 1300

B.

Change the IP MTU of R2 Fa0/0 to 1300

C.

Change the IP MTU of R1 Fa1/0 to 1500

D.

Change the IP MTU of R2 Fa0/0 to 1500

Full Access
Question # 149

Refer to the exhibit Which action ensures that 10 10 10 0/24 reaches 10 10 20 0/24 through the direct link between R1 and R2?

A.

Configure R1 and R2 LAN links as nonpassive.

B.

Configure R1 and R2 links under area 1

C.

Configure OSPF link cost to 1 between R1 and R2

D.

Configure OSPF path cost to 3 between R1 and R2

Full Access
Question # 150

Users report issues with reachability between areas as soon as an engineer configured summary routes between areas in a multiple area OSPF autonomous system. Which action resolves the issue?

A.

Configure the summary-address command on the ASBR.

B.

Configure the summary-address command on the ABR.

C.

Configure the area range command on the ABR.

D.

Configure the area range command on the ASBR.

Full Access
Question # 151

A network engineer must configure a DMVPN network so that a spoke establishes a direct path to another spoke if the two must send traffic to each other. A spoke must send traffic directly to the hub if required Which configuration meets this requirement?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 152

What is the function of BFD?

A.

It provides uniform failure detection regardless of media type.

B.

It creates high CPU utilization on hardware deployments.

C.

It negotiates to the highest version if the neighbor version differs.

D.

It provides uniform failure detection on the same media type.

Full Access
Question # 153

Refer to the exhibit. An engineer implemented an access list on R1 to allow anyone to Telnet except R2 Loopback0 to R1 Loopback4 How must sequence 20 be replaced on the R1 access list to resolve the issue?

A.

sequence 20 permit tcp host 1001 ABC:2011:7:: 1 host 400A:0:400C::1 eq telnet

B.

sequence 20 deny tcp host 400A:0:400C::1 host 1001 :ABC:2011:7::1 eq telnet

C.

sequence 20 deny tcp host 1001:ABC:2011:7::1 host 400A:0:400C::1 eq telnet

D.

sequence 20 permit tcp host 400A:0:400C::1 host 1001ABC:2011:7::1 eq telnet

Full Access
Question # 154

A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?

A.

ip tcp adjust-mss 1360

crypto ipsec fragmentation after-encryption

B.

ip tcp adjust-mtu 1360

crypto ipsec fragmentation after-encryption

C.

ip tcp adjust-mss 1360

crypto ipsec fragmentation mtu-discovery

D.

ip tcp adjust-mtu 1360

crypto ipsec fragmentation mtu-discovery

Full Access
Question # 155

The network administrator configured R1 for Control Plane Policing so that the inbound Telnet traffic is policed to 100 kbps. This policy must not apply to traffic coming in from 10.1.1.1/32 and 172.16.1.1/32. The administrator has configured this:

The network administrator is not getting the desired results. Which set of configurations resolves this issue?

A.

control-plane

no service-policy input PM-CoPP

!

interface Ethernet 0/0

service-policy input PM-CoPP

B.

control-plane

no service-policy input PM-CoPP

service-policy input PM-CoPP

C.

no access-list 101

access-list 101 deny tcp host 10,1,1.1 any eq 23

access-list 101 deny tcp host 172,16.1.1 any eq 23

access-list 101 permit ip any any

D.

no access-list 101

access-list 101 deny tcp host 10,1.1.1 any eq 23

access-list 101 deny tcp host 172.16.1.1 any eq 23

access-list 101 permit ip any any

!

interface E0/0

service-policy input PM-CoPP

Full Access
Question # 156

IPv6 is enabled in the infrastructure to support customers with an IPv6 network over WAN and to connect the head office to branch offices in the local network. One of the customers is already running IPv6 and wants to enable IPv6 over the DMVPN network infrastructure between the headend and branch sites. Which configuration command must be applied to establish an mGRE IPv6 tunnel neighborship?

A.

tunnel protection mode ipv6

B.

ipv6 unicast-routing

C.

ipv6 nhrp holdtime 30

D.

tunnel mode gre multipoint ipv6

Full Access
Question # 157

Refer to the exhibit.

A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log message stream it is impossible to capture the problem Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two)

A.

debug condition interface

B.

debug condition ip

C.

debug condition ospf neighbor

D.

debug condition session-id ADJCHG

E.

debug condition all

Full Access
Question # 158

What are the two prerequisites to enable BFD on Cisco routers? (Choose two)

A.

A supported IP routing protocol must be configured on the participating routers.

B.

OSPF Demand Circuit must run BFD on all participating routers.

C.

ICMP must be allowed on all participating routers.

D.

UDP port 1985 must be allowed on all participating routers.

E.

Cisco Express Forwarding and IP Routing must be enabled on all participating routers.

Full Access
Question # 159

Refer to the exhibit.

An engineer is trying to connect to R1 via Telnet with no success. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 160

A DMVPN network is preconfigured with tunnel 0 IP address 192.168.1.254 on the HUB, IP connectivity, crypto policies, profiles, and EIGRP AS 100. The NHRP password is ccnp123, and the network ID and tunnel key is EIGRP ASN Do not introduce a static route. Configure DMVPN connectivity between routers BR1 and BR2 to the HUB router using physical interface as the tunnel source to achieve these goals:

Full Access
Question # 161

Refer to the exhibit.

An engineer must redistribute networks 192.168.10.0/24 and 192.168.20.0/24 into OSPF from EIGRP. where the metric must be added when traversing through multiple hops to start an external route of 20 The engineer notices that the external metric is fixed and does not add at each hop. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 162

Refer to the exhibit. An engineer configured route exchange between two different companies for a migration project EIGRP routes were learned in router C but no OSPF routes were learned in router A. Which configuration allows router A to receive OSPF routes?

A.

(config-router-af)#redistribute ospf 10 1000000 10 255 1 1500

B.

(config-routeraf-topology)#redistribute ospf 10 metric 1000000 10 255 1 1500

C.

(config-router-af-topology)#redistribute connected

D.

(config-router-af-topology )£no redistribute ospf 10 match external 1 external 2 metric 1000000 10 255 1 1500

Full Access
Question # 163

How does LDP operate in an MPLS network?

A.

When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change.

B.

When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity.

C.

Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages

D.

LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP.

Full Access
Question # 164

Refer to the exhibit.

An engineer configured NetFlow to capture traffic information through the router, but it iOS not working as expected. Which action captures the flow information from this router to the collector?

A.

Change the interface configuration FLOW-MONITOR-1 from input to output.

B.

Configure a flow exporter under flow FLOW-MONITOR-1.

C.

Configure more than one flow exporter destination addresses.

D.

Change the flow exporter transport protocol from UDP to TCP

Full Access
Question # 165

Configure individual VRFs for each customer according to the topology to achieve these goals :

R1

R2

SW1

SW2

SW3

Full Access
Question # 166

Refer to the exhibit.

After a new regional office is set up,not all guests can access the internet via guest Wi

Fi. Clients are getting the correct IP address from guest Wi-Fi VLAN 364. which action resolves the issue ?

A.

Allow 10.66.46.0/23 in the outbound ACL

B.

Allow DNS traffic through the outbound ACL

C.

Allow DNS traffic through the inbound ACL

D.

Allow 10.66.46.0/23 in the inbound ACL

Full Access
Question # 167

Refer to the exhibit.

Which policy configuration on R1 forwards any traffic that is sourced from the 192 168 130 0'24 network to R2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 168

Refer to the exhibit. Router R4 is configured correctly with default OSPF values. A network engineer configured R7 for OSPF. R7 must not be elected as a DR for the segment between R4-R7. The adjacency between R4 and R7 failed to form. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 169

A newly Installeo router starts establishing an LDP session from another MPLS router to which it is not directly connected. Which LDP message type responds by target router to the Initiating router using UDP protocol?

A.

notification message

B.

session message

C.

extended discovery message

D.

advertisement message

Full Access
Question # 170

An engineer is implementing a coordinated change with a server team. As part of the change, the engineer must configure interlace GigabitEthernet2 in an existing VRF "RED" then move the interface to an existing VRF "BLUE" when the server team is ready. The engineer configured interface GigabitEthemet2 in VRF "RED"

Which configuration completes the change?

A.

interface GigabitEthernet2

no ip address

vrf forwarding BLUE

B.

interface GigabitEthernet2

no vrf forwarding RED

vrf forwarding BLUE

ip address 10.0.0.0 255.255.255.254

C.

interface GigabitEthernet2

no vrf forwarding RED

vrf forwarding BLUE

D.

interface GigabitEthernet2

no ip address

ip address 10.0.0.0 255.255.255.254

vrf forwarding BLUE

Full Access
Question # 171

Refer to the exhibit. An engineer configured router R3 to redistribute the prefix 10.10.10.0/24 from OSPF into EIGRP R1 has no connectivity to the prefix. Which action enables receipt of prefixes on R1?

A.

R3 is advertising the 10.20.20 0'24 prefix with a TTL of 1, R3 must set the TTL to 2 for this prefix.

B.

R1 docs not have a neighbor relationship with R2. The EIGRP process should be cleared on R1.

C.

Duplicate router IDs on R1 and R3, R1 should modify its router ID.

D.

R1 is not receiving the next-hop IP address of R3. R2 must enable the network 10 20.20.0V24 within EIGRP.

Full Access
Question # 172

Refer to the exhibit.

An engineer must configure a LAN-to-LAN IPsec VPN between R1 and the remote router. Which IPsec

Phase 1 configuration must the engineer use for the local router?

A.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash sha

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

B.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

C.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 199.1.1.1

D.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123! address 199.1.1.1

Full Access