Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-410 Questions and Answers

Question # 6

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 7

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 8

Refer to the exhibits.

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two

commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

C.

The ip nhrp redirect commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Full Access
Question # 9

:580

An engneer must configure encrypted packets for a single router OSPF neighoorsMp Which configuration meets this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Full Access
Question # 11

Refer to the exhibit.

An engineer configured IP SLA to monitor a next hop on a router for reachability When the next hop is unreachable, the router is executing tracking and failing over another route, but packet loss is experienced because the reachability is flapping. Which action resolves the issue?

A.

Append delay up 0 down Ovto the track command

B.

Increase the timeout of the sla probe to 6000

C.

Append delay up SO down 60vto the track command

D.

Increase the frequency of the sla probe to 60.

Full Access
Question # 12

In a DMVPN network, the Spoke1 user observed that the voice traffic is coming to Spoke2 users via the hub router. Which command is required on both spoke routers to communicate directly to one another?

A.

ip nhrp map dynamic

B.

ip nhrp shortcut

C.

ip nhrp nhs multicast

D.

ip nhrp redirect

Full Access
Question # 13

Refer to the exhibit. The 130.130.130.0/24 route shows in the R2 routing table but is getting filtering toward R3. Which action resolves the issue?

A.

Automatic route summarization must be enabled on R2.

B.

The incoming filter list for all interfaces must be set on R2.

C.

IGP synchronization must be disabled on R2.

D.

The outgoing filter list for all interfaces must be set on R2.

Full Access
Question # 14

A CoPP policy is applied for receiving SSH traffic from the WAN interface on a Cisco ISR4321 router.

However, the SSH response from the router is abnormal and stuck during the high link utilization. The problem is identified as SSH traffic does not match in the ACL. Which action resolves the issue?

A.

Rate-limit SSH traffic to ensure dedicated bandwidth.

B.

Apply CoPP on the control plane interface.

C.

Increase the IP precedence value of SSH traffic to 6.

D.

Apply CoPP on the WAN interface inbound direction.

Full Access
Question # 15

Which protocol must be secured with MD-5 authentication across the MPLS cloud to prevent hackers from introducing bogus routers?

A.

MP-BGP

B.

LSP

C.

RSVP

D.

LDP

Full Access
Question # 16

A network administrator must optimize the segment size of the TCP packet on the DMVPN IPsec protected tunnel interface, which carries application traffic from the head office to a designated branch. The TCP segment size must not overwhelm the MTU of the outbound link. Which configuration must be applied to the router to improve the application performance?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

:588

Refer to the exhibit. An engineer must filter prefixes that originate from AS65412. but it is not working correctty. Which configuration must the engineer apply to R1 to resolve the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Refer to the exhibit EIGRP adjacency between router A and router C is not working as expected Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 19

Refer to the exhibit.

An engineer must configure a LAN-to-LAN IPsec VPN between R1 and the remote router. Which IPsec

Phase 1 configuration must the engineer use for the local router?

A.

crypto isakmp policy 5authentication pre-shareencryption 3deshash shagroup 2!crypto isakmp key cisco123 address 200.1.1.3

B.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123 address 200.1.1.3

C.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123 address 199.1.1.1

D.

crypto isakmp policy 5authentication pre-shareencryption 3deshash md5group 2!crypto isakmp key cisco123! address 199.1.1.1

Full Access
Question # 20

Refer to the exhibit.

The forwarding entries how that the next hop for prefixes from the 172.16.0.0/16 network is set to 10.2.2.2 instead of 10.1.1.1. Which action resolves the issue?

A.

Add set ip next hop 10.1.1.1 in route-map RED permit 20.

B.

Add the continue statement in route-map RED permit 10 instead of continue 20.

C.

Remove match ip address prefix-list 1 from route-map RED permit 10.

D.

Remove the continue 20 statement from route-map RED permit 10

Full Access
Question # 21

Refer to the exhibit.

A prefix list is created to filter routes inbound to an EIGRP process except for network 10 prefixes After the prefix list is applied no network 10 prefixes are visible in the routing table from EIGRP. Which configuration resolves the issue?

A.

ip prefix-list EIGRP seq 20 permit 10.0.0.0/8 ge 9.

B.

ip prefix-list EIGRP seq 10 permit 0.0.0.0/0 le 32

C.

ip prefix-list EIGRP seq 5 permit 10.0.0.0/8 ge 9 no ip prefix-list EIGRP seq 20 permit 10.0.0.0/8

D.

ip prefix-list EIGRP seq 20 permit 10.0.0.0/8 ge 9 ip prefix-list EIGRP seq 10 permit 0.0.0.0/0 le 32

Full Access
Question # 22

Refer to the exhibit An enterprise operations team must monitor all application server traffic in the data center The team finds that traffic coming from the hub site from R3 and R6 rs monitored successfully but traffic destined to the application server is not monitored Which action resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

What is a function of IPv6 Source Guard?

A.

It works with address glean or ND to find existing addresses.

B.

It inspects ND and DHCP packets to build an address binding table.

C.

It denies traffic from known sources and allocated addresses.

D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

Full Access
Question # 24

Refer to the exhibit.

A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?

A.

Remove ipv6 inspect ipv6-firewall in from interface gi0/1

B.

Add permit udp any eq domain any log in the access list.

C.

inspect ipv6 inspect name ipv6-firewall udp 53 in global config.

D.

Add permit any eq domain 53 any log in the access list.

Full Access
Question # 25

A network administrator opens a telnet connection to the router and gets the message:

R1#telnet 10.1.1.2

Trying 10 1.1 2 Open

(Connection to 10.1.1.2 closed by foreign host)

Router R2 is configured with enable secret and password commands. Which action resolves the issue?

A.

Configure the logging synchronous command on line vty.

B.

Configure the exec command on line vty.

C.

Configure the login local command on line vty

D.

Configure the enable password command on line vty.

Full Access
Question # 26

An administrator attempts to download the pack NBAR2 file using TFTP from the CPE router to another device over the Gi0/0 interface. The CPE is configured as below:

The transfer fails. Which action resolves the issue?

A.

Change the WAN ACL to permit the UDP port 69 to allow TFTP

B.

Make the permit udp any eq tftp any entry the last entry in the WAN ACL.

C.

Change the WAN ACL to permit the entire UDP destination port range

D.

Shorten the file name to the 8+3 naming convention.

Full Access
Question # 27

Refer to the exhibit An engineer must ensure that R3 sees only type 1 and 2 LSAs in area 1. Which command must the engineer apply on R2?

A.

Area 1 stub nssa

B.

Area 1nssa no-summary

C.

Area a stub no-summary

D.

Area 1 stub

Full Access
Question # 28

:585

Which type of ports are protected by IPv6 Source Guard?

A.

Layer 2 ports

B.

access ports

C.

Layer 3 ports

D.

trunk ports

Full Access
Question # 29

Refer to the exhibit.

R6 should reach R1 via R5>R2>R1.Which action resolves the issue?

A.

Increase the cost to 61 between R2-R3-R1

B.

Increase the cost to 61 between R2 and R3

C.

Decrease the cost to 2 between R6-R5-R2

D.

Decrease the cost to 41 between R2 and R1

Full Access
Question # 30

Refer to the exhibit. An engineer configured router R3 to redistribute the prefix 10.10.10.0/24 from OSPF into EIGRP R1 has no connectivity to the prefix. Which action enables receipt of prefixes on R1?

A.

R3 is advertising the 10.20.20 0'24 prefix with a TTL of 1, R3 must set the TTL to 2 for this prefix.

B.

R1 docs not have a neighbor relationship with R2. The EIGRP process should be cleared on R1.

C.

Duplicate router IDs on R1 and R3, R1 should modify its router ID.

D.

R1 is not receiving the next-hop IP address of R3. R2 must enable the network 10 20.20.0V24 within EIGRP.

Full Access
Question # 31

Refer to the exhibit.

A network administrator sets up an OSPF routing protocol for a DMVPN network on the hub router. Which configuration required to establish a DMVPN tunnel with multiple spokes?

A.

ip ospf network point-to-multipoint on both spoke routers

B.

ip ospf network point-to-point on the hub router

C.

ip ospf network point-to-multipoint on One spoke router

D.

ip ospf network point-to-point on both spoke routers

Full Access
Question # 32

Refer to the exhibit.

An engineer must redistribute networks 192.168.10.0/24 and 192.168.20.0/24 into OSPF from EIGRP. where the metric must be added when traversing through multiple hops to start an external route of 20 The engineer notices that the external metric is fixed and does not add at each hop. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 33

Refer to the exhibit. Which configuration resolves the route filtering issue on R1 to redistribute all the routes except 172.16.2.48/28?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 34

A company is expanding business by opening 35 branches over the Internet. A network engineer must configure DMVPN at the branch routers to connect with the hub router and allow NHRP to add spoke routers securely to the multicast NHRP mappings automatically Which configuration meets this requirement at the hub router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

Refer to Exhibit.

PC2 is directly connected to R1. A user at PC2 cannot Telnet to 2001:db8:a:b::10. The user can ping

2001:db8:a:b::10 and receive DHCP-related information from the DHCP server. Which action resolves

the issue?

A.

Remove sequence 10 and put it back as sequence 25.

B.

Remove sequence 20 and put it back as sequence 45.

C.

Remove sequence 30 and put it back as sequence 5.

D.

Remove sequence 40 and put it back as sequence 15.

Full Access
Question # 36

Which routing protocol is used by the PE router to advertise routes to a CE router without redistribution or static after removing the RD tag from the P router?

A.

IS-IS

B.

OSPF

C.

BGPIPv4

D.

MP-BGP

Full Access
Question # 37

Refer to the exhibit.

An engineer has configured policy-based routing and applied the configured to the correct interface. How is the configuration applied to the traffic that matches the access list?

A.

It is sent to 209.165.202.131.

B.

It is sent to 209.165.202.129.

C.

It is dropped.

D.

It is forwarded using the routing table lookup.

Full Access
Question # 38

Refer to the exhibit. The ISP router is fully configured for customer A and customer B using the VRF-Lite feature. What is the minimum configuration required for customer A to communicate between routers A1 and A2?

A.

A1interface fa0/0description To->ISPip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0

B.

A1interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0A2interfacefa0/0description To->ISPip vrf forwarding Aip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0

C.

A1interface fa0/0description To->ISPip add 172.31.200.1 255.255.255.0no shut!router ospf 100net 172.31.200.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip add 172.31.100.1 255.255.255.0no shut!router ospf 100net 172.31.100.1 0.0.0.255 area 0

D.

A1interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100 vrf Anet 172.31.200.1 0.0.0.255 area 0A2interface fa0/0description To->ISPip vrf forwarding Aip add 172.31.100.1 255.255.255.0no shut!router ospf 100 vrf Anet 172.31.200.1 0.0.0.255 area 0

Full Access
Question # 39

Refer to the exhibit. After recovering from a power failure. Ethernet0/1 stayed down while Ethernet0/0 returned to the up/up state The default route through ISP1 was not reinstated m the routing table until Ethernet0/1 also came up Which action resolves the issue?

A.

Reference the track object 1 in both static default routes

B.

Remove the references to the interface names from both static default routes

C.

Configure the default route through ISP1 with a higher administrative distance than 2.

D.

Add a static route to the 8 8.8 8/32 destination through the next hop 203.0.113.1

Full Access
Question # 40

Refer to the exhibit. In Cuco DNA Center, a network engineer identifies that BGP-learned networks are repeatedly withdrawn from peers. Which configuration must the engineer apply to resolve the Issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Refer to the exhibit. Router R4 is configured correctly with default OSPF values. A network engineer configured R7 for OSPF. R7 must not be elected as a DR for the segment between R4-R7. The adjacency between R4 and R7 failed to form. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 42

Refer to the exhibit. The traffic from spoke to hub is dropping. The operations team observes:

R2-R3 link is down due to the fiber cut.

R2 and R5 receive traffic from R1 in AS 65101.

R3 and R5 receive traffic from R4 in AS 65201.

Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Refer to the exhibit.

A network engineer receives a fault ticket about traffic drops from BANK SITE to BANK

Users can reach BANK SITE Y from router RA as a source.

Routers RB and RD are acting as route reflectors.

Which configuration resolves the issue?

A.

RC(config)#router bgp 65201RC(config-router)#neighbor 10.10.10.4 route-reflector-client

B.

RF(config)#router bgp 65201RF(config-router)#neighbor 10.10.10.6 route-reflector-client

C.

RC(config)#router bgp 65201RC(config-router)#neighbor 10.10.10.2 route-reflector-client

D.

RB(config)router bgp 65201RB(config-router)#neighbor 10.10.10.3 route-reflector-client

Full Access
Question # 44

Refer to the exhibit.

A network administrator is troubleshooting IPv6 address assignment for a DHCP client that is not getting an IPv6 address from the server.

Which configuration retrieves the client IPv6 address from the DHCP server?

A.

ipv6 address autoconfig command on the interface

B.

ipv6 dhcp server automatic command on DHCP server

C.

ipv6 dhcp relay-agent command on the interface

D.

service dhcp command on DHCP server

Full Access
Question # 45

Refer to the exhibit.

A network administrator successfully logs in to a switch using SSH from a (RADIUS server When the network administrator uses a console port to access the switch the RADIUS server returns shell:priv-lvl=15’’ and the switch asks to enter the enable command \ the command is entered, it gets rejected. Which command set is used to troubleshoot and reserve this issue?

A.

line con 0aaa authorization consoleauthorization exec!line vty 0 4transport input ssh

B.

line con 0aaa authorization console!line vty 0 4authorization exec

C.

line con 0aaa authorization console priv15!line vty 0 4authorization exec

D.

line con 0aaa authorization consoleauthorization priv15!line vty 0 4transport input ssh

Full Access
Question # 46

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit ip host 172.16.1.99 any

!

class-map CM-ADMIN

match access-group 100

!

policy-map PM-COPP

class CM-ADMIN

police 500000 conform-action transmit

!

interface E0/0

service-policy input PM-COPP

CoPP failed to capture the desired traffic and the CPU load is getting higher.

Which two configurations resolve the issue? (Choose two.)

A.

interface E0/0no service-policy input PM-COPP!control-planeservice-policy input PM-COPP

B.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit!control-planeservice-policy input PM-COPP

C.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80

D.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80access-list 100 permit tcp host 172.16.1.99 any eq 443

E.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit

Full Access
Question # 47

Refer to lhe exhibit After an engineer configured a new Cisco rouler as a DHCP server, users reponed iwo primary issues:

Devices in the HR subnet have intermittent connectivity problems.

Workstations in the LEGAL subnet cannot obtain IP addresses.

Which configurations must the engineer apply to ROUTER_1 to restore connectivity for the affected devices?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

Refer to the exhibit. An engineer cannot determine the time of the problem on R1 due to a mismatch between the router local clock and legs. Which command synchronizes the time between new log entries and the local clock on R1?

A.

service timestamps debug datetime msec show.timezone

B.

service timestamps log datetime locatetime msec

C.

service timestamps datebug datetime localtime msec

D.

service timestamps log datetime msec show-timezone

Full Access
Question # 49

Refer to the exhibit. An engineer configured NetFlow on R1, but the flows do not reach the NMS server from R1. Which configuration resolves this Issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 50

Refer to the exhibit.

An engineer is trying to add an encrypted user password that should not be visible in the router configuration. Which two configuration commands resolve the issue? (Choose two)

A.

password encryption aes

B.

username Admin password Cisco@maedeh motamedi

C.

username Admin password 5 Cisco@maedeh motamedi

D.

username Admin secret Cisco@maedeh motamedi

E.

no service password-encryption

F.

service password-encryption

Full Access
Question # 51

Refer to the exhibit. An engineer notices a connectivity problem between routers R1 and R2. The frequency of this problem is high during peak business hours. Which action resolves the issue?

A.

Increase the MTU on the interfaces that connect R1 and R2.

B.

Increase the available bandwidth between R1 and R2.

C.

Decrease the EIGRP keepallve and hold down timers on R1 and R2.

D.

Set static EIGRP neighborship between R1 and R2.

Full Access
Question # 52

Refer to the exhibit. An administrator wanted to make R1 always elected as DR. R2 as BDR. and R3 as DROTHER but could not achieve the desired results. Which two configurations resolve the issue? (Choose two.)

A.

On the R1 FO/0 interface, configure OSPF priority to 255.

B.

On the R2 FO/0 interface, configure OSPF priority to 201.

C.

On the R1 F0/0 interface, configure OSPF priority to 202.

D.

On the R3 FO'O interface, configure OSPF priority to 201.

E.

On the R2 FO/0 interface, configure OSPF priority to 200.

Full Access
Question # 53

Refer to the exhibit A network administrator is troubleshooting to reduce the routing table of R4 and R5 to learn only the default route to communicate from Inter-Area and Intra-Area networks Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

Refer to the exhibit Which command must be configured to make VRF CCNP work?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 55

Refer to the exhibit SW100 cannot receive routes from R1 Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option C

Full Access
Question # 56

Refer to the exhibit.

The Customer Edge router (AS 65500) wants to use ASC100 as the preferred ISP for all external routes.

This configuration failed to send routes to AS 100 as the preferred path. Which set of configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 57

An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 58

Refer to the exhibit.

A network engineer must establish communication between three different customer sites with these requirements:

Site-A: must be restricted to access to any users at Site-B or Site-C.

Site-B and Site-C must be able to communicate between sites and share routes using OSPF.

Which configuration meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

What is considered the primary advantage of running BFD?

A.

reduction in time needed to detect Layer 2 switched neighbor failures

B.

reduction in time needed to detect Layer 3 routing neighbor failures

C.

reduction in CPU needed to detect Layer 2 switch neighbor failures

D.

reduction in CPU needed to detect Layer 3 routing neighbor failures

Full Access
Question # 60

The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123.

The administrator has configured the following on R1:

ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 61

Refer to the exhibit A customer reported an issue with a fiber link failure between RC and RE Users connected through the spoke location face disconnection and packet drops with the primary email server (172.16.16.1) but have no issues with the backup email server (172.16.26.1). All the router loopback IPs are advertised through the OSPF protocol. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 62

Refer to the exhibit. The IT router has been configured with the Science VRF and the interfaces have been assigned to the VRF. Which set of configurations advertises Science-1 and Science-2 routes using EIGRPAS 111?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 63

Refer to the exhibit.

Mutual redistribution is enabled between RIP and EIGRP on R2 and R5. Which configuration resolves the routing loop for the 192.168.1.0/24 network?

A.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

B.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

C.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

D.

R2:router eigrp 7network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 7 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 7network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 7 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

Full Access
Question # 64

:590

Refer to the exhibit The R2 OSPF route 10 2 2 0/24 shows in the R1 EIGRP routing table without route redistribution performed between OSPF and EIGRP routing protocols Which configuration is required on router R2 to resolve the issue?

A.

passive-interface FastEthernet 0/0 command in OSPF1.

B.

Add the no auto-summary command in EIGRP 100.

C.

Replace the network 10.0.0.0 command with FastEthernet0/0network in EIGRP 100.

D.

Addthe passive-interface FastEthernet 1/0 command in EIGRP 100

Full Access
Question # 65

Refer to the exhibit.

The security department recently installed a monitoring device between routers R3 and R5, which a loss of network connectivity for users connected to R5. Troubleshooting revealed that the monitoring device cannot forward multicast packets. The team already updated R5 with the correct configuration. Which configuration must be implemented on R3 to resolve the problem by ensuring R3 as the DR for the R3-R5 segment?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

Which router attaches the VPN label to incoming packets from CE routing?

A.

CE router

B.

core router

C.

P router

D.

PE router

Full Access
Question # 67

Refer to the exhibit.

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 68

R1 and R2 are configured as eBGP neighbor , R1 is in AS100 and R2 is in AS200. R2 is advertising these networks to R1:

The network administrator on R1 must improve convergence by blocking all subnets of 172-16.0.0/16 major network with a mask lower than 23 from coming in, Which set of configurations accomplishes the task on R1?

A.

ip prefix-list PL-1 deny 172.16.0.0/16 le 23ip prefix-list PL-1 permit 0.0.0.0/0 le 32!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

B.

ip prefix-list PL-1 deny 172.16.0.0/16 ge 23ip prefix-list PL-1 permit 0.0.0.0/0 le 32!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

C.

access-list 1 deny 172.16.0.0 0.0.254.255access-list 1 permit any!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 distribute-list 1 in

D.

ip prefix-list PL-1 deny 172.16.0.0/16ip prefix-list PL-1 permit 0.0.0.0/0!router bgp 100neighbor 192.168.100.2 remote-as 200neighbor 192.168.100.2 prefix-list PL-1 in

Full Access
Question # 69

Users were moved from the local DHCP server to the remote corporate DHCP server. After the move,

none of the users were able to use the network.

Which two issues will prevent this setup from working properly? (Choose two)

A.

Auto-QoS is blocking DHCP traffic.

B.

The DHCP server IP address configuration is missing locally

C.

802.1X is blocking DHCP traffic

D.

The broadcast domain is too large for proper DHCP propagation

E.

The route to the new DHCP server is missing

Full Access
Question # 70

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 71

Refer to the exhibit.

A company is evaluating multiple network management system tools. Trending graphs generated by SNMP data are returned by the NMS and appear to have multiple gaps. While troubleshooting the issue, an engineer noticed the relevant output. What solves the gaps in the graphs?

A.

Remove the exceed-rate command in the class map.

B.

Remove the class map NMS from being part of control plane policing.

C.

Configure the CIR rate to a lower value that accommodates all the NMS tools

D.

Separate the NMS class map in multiple class maps based on the specific protocols with appropriate CoPP actions

Full Access
Question # 72

Refer to the exhibit.

During troubleshooting it was discovered that the device is not reachable using a secure

web browser. What is needed to fix the problem?

A.

permit tcp port 443

B.

permit udp port 465

C.

permit tcp port 465

D.

permit tcp port 22

Full Access
Question # 73

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A.

Copy the file to the destination router with the copy tftp: flash: command

B.

Enable the TFTP server on the source router with the tftp-server flash: command

C.

TFTP is not supported in recent IOS versions, so an alternative method must be used

D.

Configure a user on the source router with the username tftp password tftp command

E.

Configure the TFTP authentication on the source router with the tftp-server authentication local command

Full Access
Question # 74

Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?

A.

show track

B.

show threshold

C.

show timer

D.

show delay

Full Access
Question # 75

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 76

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?

A.

BGP

B.

LLDP

C.

EIGRP

D.

NHRP

Full Access
Question # 77

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 78

Refer the exhibit.

Which action resolves intermittent connectivity observed with the SNMP trap

packets?

A.

Decrease the committed burst Size of the mgmt class map

B.

Increase the CIR of the mgmt class map

C.

Add a new class map to match TCP traffic

D.

Add one new entry in the ACL 120 to permit the UDP port 161

Full Access
Question # 79

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

Full Access
Question # 80

Refer to the exhibit.

After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

A.

Set the administrative distance 100 under the RIP process on R2.

B.

Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.

C.

Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.

D.

Redistribute the directly connected interfaces on R2.

Full Access
Question # 81

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 82

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 83

Refer to the exhibit.

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 84

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 85

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Full Access
Question # 86

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 87

Refer to the exhibit.

Drag and drop the credentials from the left onto the remote login information on the right to resolve a failed login attempt to vtys. Not all credentials are uf SLA by defining frequency and schedulingsed

Full Access
Question # 88

Which is statement about IPv6 inspection is true?

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 89

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 90

Refer to Exhibit.

Which statement about redistribution from BGP into OSPF process 10 is true?

A.

Network 172.16.1.0/24 is not redistributed into OSPF.

B.

Network 10.10 10.0/24 is not redistributed into OSPF

C.

Network 172.16.1.0/24 is redistributed with administrative distance of 1.

D.

Network 10.10.10.0/24 is redistributed with administrative distance of 20.

Full Access
Question # 91

Refer to the exhibit.

Users report that IP addresses cannot be acquired from the DHCP server. The DHCP

server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?

A.

Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool

B.

Configure the DHCP lease time to a smaller value

C.

Configure the DHCP lease time to a bigger value

D.

Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool

Full Access
Question # 92

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 93

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A.

service timestamps log uptime

B.

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.

service timestamps log datetime localtime show-timezone

D.

clock calendar-valid

Full Access
Question # 94

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 95

Refer to the exhibit.

Why is user authentication being rejected?

A.

The TACACS+ server expects “user”, but the NT client sends “domain/user”.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

C.

The TACACS+ server is down, and the user is in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Full Access
Question # 96

Which option is the best for protecting CPU utilization on a device?

A.

fragmentation

B.

COPP

C.

ICMP redirects

D.

ICMP unreachable messages

Full Access
Question # 97

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

A.

DMVPN

B.

MPLS VPN

C.

Virtual Tunnel Interface (VTI)

D.

SSL VPN

E.

PPPoE

Full Access
Question # 98

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) to the outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?

A.

The device must be resynced to Cisco DNA Center.

B.

The software image for the device is in install mode.

C.

The device has lost connectivity to Cisco DNA Center.

D.

The software image for the device is in bundle mode

Full Access
Question # 101

Which two statements about VRF-Lite configurations are true? (Choose two.)

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

Full Access
Question # 102

Refer to the exhibit.

Which statement about R1 is true?

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Full Access
Question # 103

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 104

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 105

Which component of MPLS VPNs is used to extend the IP address so that an engineer is able to

identify to which VPN it belongs?

A.

VPNv4 address family

B.

RD

C.

RT

D.

LDP

Full Access
Question # 106

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 107

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 108

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 109

What is an advantage of using BFD?

A.

It detects local link failure at layer 1 and updates routing table.

B.

It detects local link failure at layer 2 and updates routing protocols.

C.

It has sub-second failure detection for layer 1 and layer 3 problems.

D.

It has sub-second failure detection for layer 1 and layer 2 problems.

Full Access
Question # 110

What is the output of the following command:

show ip vrf

A.

Show's default RD values

B.

Displays IP routing table information associated with a VRF

C.

Show's routing protocol information associated with a VRF.

D.

Displays the ARP table (static and dynamic entries) in the specified VRF

Full Access
Question # 111

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 112

Refer to the exhibit.

An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A.

Use the icmp-echo command to track both default routes

B.

Use the same AD for both default routes

C.

Start IP SLA by matching numbers for track and ip sla commands

D.

Start IP SLA by defining frequency and scheduling it

Full Access
Question # 113

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 114

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 115

Drag and drop the packet types from the left onto the correct descriptions on the right.

Full Access
Question # 116

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Full Access
Question # 117

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 118

While troubleshooting connectivity issues to a router, these details are noticed:

Standard pings to all router interfaces, including loopbacks, are successful.

Data traffic is unaffected.

SNMP connectivity is intermittent.

SSH is either slow or disconnects frequently.

Which command must be configured first to troubleshoot this issue?

A.

show policy-map control-plane

B.

show policy-map

C.

show interface | inc drop

D.

show ip route

Full Access
Question # 119

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 120

Drag and drop the operations from the left onto the locations where the operations are performed on the right.

Full Access
Question # 121

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Full Access
Question # 122

Refer to the exhibits.

When DMVPN is configured, which configuration allows spoke-to-spoke communication using loopback as a tunnel source?

A.

Configure crypto isakmp key cisco address 0.0.0.0 on the hub.

B.

Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.

C.

Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.

D.

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.

Full Access
Question # 123

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 124

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 125

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?

A.

router ospf 1default-information originate

B.

router ospf 1network 0.0.0.0 0.0.0.0 area 0

C.

router ospf 1redistribute connected 0.0.0.0

D.

router ospf 1redistribute static subnets

Full Access
Question # 126

Refer to the exhibit.

A user cannot SSH to the router. What action must be taken to resolve this issue?

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Full Access
Question # 127

Refer to the exhibit.

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 128

Refer to the exhibit. A network administrator configured an IPv6 access list to allow TCP return traffic only, but it is not working as expected. Which changes resolve this issue?

A.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

B.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

C.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

D.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

Full Access
Question # 129

What does IPv6 Source Guard utilize to determine if IPv6 source addresses should be forwarded?

A.

ACE

B.

ACLS

C.

DHCP

D.

Binding Table

Full Access
Question # 130

Refer to Exhibit.

The network administrator configured the branch router for IPv6 on the E0/0 interface. The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

B.

Disable IPv6 on the E0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the E0/0 interface by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E0/0 interface

Full Access
Question # 131

Refer to the exhibit.

The network administrator can see the DHCP discovery packet in R1. but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the FaO/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)

A.

service dhcp-relay command on R1

B.

ip dhcp option 82 command on R2

C.

service dhcp command on R1

D.

ip dhcp relay information enable command on R1

E.

ip dhcp relay information trust-all command on R2

Full Access
Question # 132

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 133

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 134

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 135

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 136

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 137

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 138

Refer to exhibit.

Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when the show ip route profile

command is run. How must the services be stabilized?

A.

The issue with using BGP must be resolved by using another protocol and redistributing it into EIGRP on R3

B.

The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3

C.

The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3

D.

The issue with using iBGP must be fixed by running eBGP between R3 and R4

Full Access
Question # 139

Exhibit:

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 140

Refer to the exhibits.

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 141

A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?

A.

tunnel interface of the hub with ip nhrp ospf dr

B.

OSPF priority to 0

C.

route map to set the metrics of learned routes to 110

D.

OSPF priority greater than 1

Full Access
Question # 142

Refer to the exhibit.

An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 143

What are two functions of LDP? (Choose two.)

A.

It is defined in RFC 3038 and 3039.

B.

It requires MPLS Traffic Engineering.

C.

It advertises labels per Forwarding Equivalence Class.

D.

It must use Resource Reservation Protocol.

E.

It uses Forwarding Equivalence Class

Full Access
Question # 144

Refer to Exhibit.

Which two configurations allow clients to get dynamic ip addresses assigned?

A.

Configure access-list 100 permit udp any any eq 61 as the first line

B.

Configure access-list 100 permit udp any any eq 86 as the first line

C.

Configure access-list 100 permit udp any any eq 68 as the first line

D.

Configure access-list 100 permit udp any any eq 69 as the first line

E.

Configure access-list 100 permit udp any any eq 67 as the first line

Full Access
Question # 145

Refer to the exhibit.

The OSPF routing protocol is redistributed into the BGP routing protocol, but not all the OSPF routes are distributed into BGP Which action resolves the issue?

A.

Include the word external in the redistribute command

B.

Use a route-map command to redistribute OSPF external routes defined in an access list

C.

Include the word internal external in the redistribute command

D.

Use a route-map command to redistribute OSPF external routes defined in a prefix list.

Full Access
Question # 146

Refer to the exhibit.

The administrator successfully logs into R1 but cannot access privileged mode commands. What should be configured to resolve the issue?

A.

aaa authorization reverse-access

B.

secret cisco123! at the end of the username command instead of password cisco123!

C.

matching password on vty lines as cisco123!

D.

enable secret or enable password commands to enter into privileged mode

Full Access
Question # 147

Refer to the exhibit.

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

B.

Add icmp-echo command for the host.

C.

Add the control disable option to the tcp connect.

D.

Modify the ip sla schedule frequency to forever.

Full Access
Question # 148

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 149

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 150

How does an MPLS Layer 3 VPN function?

A.

set of sites use multiprotocol BGP at the customer site for aggregation

B.

multiple customer sites interconnect through service provider network to create secure tunnels between customer edge devices

C.

set of sites interconnect privately over the Internet for security

D.

multiple customer sites interconnect through a service provider network using customer edge to provider edge connectivity

Full Access
Question # 151

Refer to Exhibit.

A network administrator enables DHCP snooping on the Cisco Catalyst 3750-X switch and configures the uplink port (Port-channel2) as a trusted port. Clients are not receiving an IP address, but when DHCP snooping is disabled, clients start receiving IP addresses. Which global command resolves the issue?

A.

No ip dhcp snooping information option

B.

ip dhcp snooping

C.

ip dhcp relay information trust portchannel2

D.

ip dhcp snooping trust

Full Access
Question # 152

Refer to the exhibit.

All the serial between R1, R2, and R3 have the Same bandwidth. User on the 192.168.1.0/24 network report slow response times while they access resource on network 192.168.3.0/24. When a traceroute is run on the path. It shows that the packet is getting forwarded via R2 to R3 although the link between R1 and R3 is still up. What must the network administrator to fix the slowness?

A.

Change the Administrative Distance of EIGRP to 5.

B.

Add a static route on R1 using the next hop of R3.

C.

Remove the static route on R1.

D.

Redistribute theR1 route to EIGRP

Full Access
Question # 153

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 154

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 155

Refer to the exhibit.

The neighbor relationship is not coming up Which two configurations bring the adjacency up? (Choose two)

A.

NYrouter ospf 1area 0 authentication message-digest

B.

LAinterface E 0/0ip ospf message-digest-key 1 md5 Cisco123

C.

NYinterface E 0/0no ip ospf message-digest-key 1 md5 Cisco123ip ospf authentication-key Cisco123

D.

LAinterface E 0/0ip ospf authentication-key Cisco123

E.

LArouter ospf 1area 0 authentication message-digest

Full Access
Question # 156

Refer to the exhibit.

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Full Access
Question # 157

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 158

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 159

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 160

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 161

Refer to the exhibit. The remote server is failing to receive the NetFlow data Which action resolves the issue?

A.

Modify the flow transport command transport udp 2055 to move under flow monitor profile.

B.

Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input.

C.

Modify the udp port under flow exporter profile to Ip transport udp 4739.

D.

Modify the flow record command record v4_r1 to move under flow exporter profile.

Full Access
Question # 162

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 163

How are MPLS Layer 3 VPN services deployed?

A.

The RD and RT values must match under the VRR

B.

The RD and RT values under a VRF must match on the remote PE router

C.

The import and export RT values under a VRF must always be the same.

D.

The label switch path must be available between the local and remote PE routers.

Full Access
Question # 164

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

Full Access
Question # 165

What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)

A.

The VPNv4 address is used to advertise the MPLS VPN label.

B.

RD is prepended to the IPv4 route to make it unique.

C.

MP-BGP is used to allow overlapping IPv4 addresses between customers to advertisethrough the network.

D.

The IPv4 address is needed to tag the MPLS label.

E.

The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4prefix.

Full Access
Question # 166

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/3ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/1ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/3ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/1ip policy route-map PBR1

Full Access
Question # 167

An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A.

match the passwords

B.

match the hello timers

C.

match the MTUs

D.

match the network types

Full Access
Question # 168

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second ISP link is up?

A.

LOCAL_PREF

B.

MED

C.

WEIGHT

D.

AS-PATH

Full Access
Question # 169

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 170

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 171

A network administrator is tasked to permit http and https traffic only toward the internet from the User1 laptop to adhere to company’s security policy. The administrator can still ping to www.cisco.com Which interface should the access list 101 be applied to resolve this issue?

A.

Interface G0/48 in the incoming direction

B.

Interface G0/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

D.

Interface G0/0 in the incoming direction.

Full Access
Question # 172

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 173

Refer to the exhibit. The network administrator configured the branch router for IPv6 on the E 0/0 interface The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the E 0/0 interface by using the address-family Ipv4 unicast command

B.

Disable IPv6 on the E 0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E 0/0 interface.

Full Access
Question # 174

Refer to the exhibit.

A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?

A.

no terminal monitor

B.

(config)#terminal no monitor

C.

#terminal no monitor

D.

(config)#no terminal monitor

Full Access
Question # 175

Refer to the exhibit.

An engineer configured BGP between routers R1 and R3 The BOP peers cannot establish neighbor adjacency to be able to exchange routes. Which configuration resolves this issue?

A.

R3router bgp 6502address-family ipv6neighbor AB01:2011:7:100::1 activate

B.

R1router bgp 6501address-family ipv6neighbor AB01:2011:7:100;:3 activate

C.

R3router bgp 6502neighbor AB01:2011:7:100::1 ebgp-muttlhop 255

D.

R1router bgp 6501 neighborAB01:2011:7:100::3ebgp-multihop255

Full Access
Question # 176

Drag and drop the MPLS VPN device types from the left onto the definitions on the right.

Full Access
Question # 177

Refer to the exhibit.

An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface. Which action resolves the issue?

A.

Modify line 10 of the access list to permit instead of deny.

B.

Remove line 60 from the access list.

C.

Modify line 30 of the access list to permit instead of deny.

D.

Remove line 70 from the access list.

Full Access
Question # 178

Refer to Exhibit.

A network administrator has successfully configured DMVPN topology between a hub and two spoke routers. Which two configuration commands should establish direct communications between spoke 1 and spoke 2 without going through the hub? (Choose two).

A.

At the hub router, configure the ip nhrp shortcut command.

B.

At the spoke routers, configure the ip nhrp spoke-tunnel command.

C.

At the hub router, configure ip nhrp redirect the command

D.

At the spoke routers, configure the ip nhrp shortcut command.

E.

At the hub router, configure tne Ip nhrp spoke-tunnel command

Full Access
Question # 179

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 180

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access