400 101 PDF
400 101 PDF
QUESTION NO: 1
Which two options are causes of out-of-order packets? (Choose two.)
A. a routing loop
B. a router in the packet flow path that is intermittently dropping packets
C. high latency
D. packets in a flow traversing multiple paths through the network
E. some packets in a flow being process-switched and others being interrupt-switched on a transit
router
Answer: D,E
Explanation:
In traditional packet forwarding systems, using different paths have varying latencies that cause
out of order packets, eventually resulting in far lower performance for the network application.
Also, if some packets are process switched quickly by the routing engine of the router while others
are interrupt switched (which takes more time) then it could result in out of order packets. The
other options would cause packet drops or latency, but not out of order packets.
QUESTION NO: 2
A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but
attempts to transmit larger amounts of data hang and then time out. What is the cause of this
problem?
A. A link is flapping between two intermediate devices.
B. The processor of an intermediate router is averaging 90 percent utilization.
C. A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a
port that has a sniffer attached.
D. There is a PMTUD failure in the network path.
Answer: D
Explanation:
Sometimes, over some IP paths, a TCP/IP node can send small amounts of data (typically less
than 1500 bytes) with no difficulty, but transmission attempts with larger amounts of data hang,
then time out. Often this is observed as a unidirectional problem in that large data transfers
succeed in one direction but fail in the other direction. This problem is likely caused by the TCP
MSS value, PMTUD failure, different LAN media types, or defective links.
QUESTION NO: 3
Refer to the exhibit.
ICMP Echo requests from host A are not reaching the intended destination on host B. What is the
problem?
A. The ICMP payload is malformed.
B. The ICMP Identifier (BE) is invalid.
C. The negotiation of the connection failed.
D. The packet is dropped at the next hop.
E. The link is congested.
Answer: D
Explanation:
Here we see that the Time to Live (TTL) value of the packet is one, so it will be forwarded to the
next hop router, but then dropped because the TTL value will be 0 at the next hop.
QUESTION NO: 4
QUESTION NO: 5
Which three conditions can cause excessive unicast flooding? (Choose three.)
A. Asymmetric routing
B. Repeated TCNs
C. The use of HSRP
D. Frames sent to FFFF.FFFF.FFFF
E. MAC forwarding table overflow
F. The use of Unicast Reverse Path Forwarding
Answer: A,B,E
Explanation:
Causes of Flooding
The very cause of flooding is that destination MAC address of the packet is not in the L2
forwarding table of the switch. In this case the packet will be flooded out of all forwarding ports in
its VLAN (except the port it was received on). Below case studies display most common reasons
for destination MAC address not being known to the switch.
Cause 1: Asymmetric Routing
Large amounts of flooded traffic might saturate low-bandwidth links causing network performance
issues or complete connectivity outage to devices connected across such low-bandwidth links.
QUESTION NO: 6
Which congestion-avoidance or congestion-management technique can cause global
synchronization?
A. Tail drop
B. Random early detection
C. Weighted random early detection
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 7
Which two options are reasons for TCP starvation? (Choose two.)
A. The use of tail drop
B. The use of WRED
C. Mixing TCP and UDP traffic in the same traffic class
D. The use of TCP congestion control
Answer: C,D
Explanation:
It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially
Streaming-Video) within a single service-provider class because of the behaviors of these
protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when
drops are detected. Although some UDP applications have application-level windowing, flow
control, and retransmission capabilities, most UDP transmitters are completely oblivious to drops
and, thus, never lower transmission rates because of dropping.
When TCP flows are combined with UDP flows within a single service-provider class and the class
experiences congestion, TCP flows continually lower their transmission rates, potentially giving up
their bandwidth to UDP flows that are oblivious to drops. This effect is called TCP starvation/UDP
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 8
Refer to the exhibit.
While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the
error message that is shown in the exhibit in the log file.
What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
Answer: C
Explanation:
L3HWFORWADING-2
Error Message C4K_L3HWFORWARDING-2-FWDCAMFULL:L3 routing table is full. Switching to
software forwarding.
The hardware routing table is full; forwarding takes place in the software instead. The switch
performance might be degraded.
Recommended Action Reduce the size of the routing table. Enter the ip cef command to return to
hardware forwarding.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/31sg/system/message/message/emsg.html
QUESTION NO: 9
Refer to the exhibit.
Which two are causes of output queue drops on FastEthernet0/0? (Choose two.)
A. an oversubscribed input service policy on FastEthernet0/0
B. a duplex mismatch on FastEthernet0/0
C. a bad cable connected to FastEthernet0/0
D. an oversubscribed output service policy on FastEthernet0/0
E. The router trying to send more than 100 Mb/s out of FastEthernet0/0
Answer: D,E
Explanation:
Output drops are caused by a congested interface. For example, the traffic rate on the outgoing
interface cannot accept all packets that should be sent out, or a service policy is applied that is
oversubscribed. The ultimate solution to resolve the problem is to increase the line speed.
However, there are ways to prevent, decrease, or control output drops when you do not want to
increase the line speed. You can prevent output drops only if output drops are a consequence of
short bursts of data. If output drops are caused by a constant high-rate flow, you cannot prevent
QUESTION NO: 10
Refer to the exhibit.
QUESTION NO: 11
What is the cause of ignores and overruns on an interface, when the overall traffic rate of the
interface is low?
A. a hardware failure of the interface
B. a software bug
C. a bad cable
D. microbursts of traffic
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 12
Refer to the exhibit.
10
QUESTION NO: 14
Which two methods change the IP MTU value for an interface? (Choose two.)
A. Configure the default MTU.
B. Configure the IP system MTU.
C. Configure the interface MTU.
D. Configure the interface IP MTU.
Answer: C,D
Explanation:
An IOS device configured for IP+MPLS routing uses three different Maximum Transmission Unit
(MTU) values: The hardware MTU configured with the mtu interface configuration command
The hardware MTU specifies the maximum packet length the interface can support or at least
that's the theory behind it. In reality, longer packets can be sent (assuming the hardware interface
chipset doesn't complain); therefore you can configure MPLS MTU to be larger than the interface
11
QUESTION NO: 15
Which implementation can cause packet loss when the network includes asymmetric routing
paths?
A. the use of ECMP routing
B. the use of penultimate hop popping
C. the use of Unicast RPF
D. disabling Cisco Express Forwarding
Answer: C
Explanation:
When administrators use Unicast RPF in strict mode, the packet must be received on the interface
that the router would use to forward the return packet. Unicast RPF configured in strict mode may
drop legitimate traffic that is received on an interface that was not the router's choice for sending
return traffic. Dropping this legitimate traffic could occur when asymmetric routing paths are
present in the network.
Reference. http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html
QUESTION NO: 16
Which two mechanisms can be used to eliminate Cisco Express Forwarding polarization? (Choose
two.)
A. alternating cost links
"Pass Any Exam. Any Time." - www.actualtests.com
12
QUESTION NO: 17
Which two mechanisms provide Cisco IOS XE Software with control plane and data plane
separation? (Choose two.)
A. Forwarding and Feature Manager
B. Forwarding Engine Driver
C. Forwarding Performance Management
D. Forwarding Information Base
Answer: A,B
Explanation:
Control Plane and Data Plane Separation
IOS XE introduces an opportunity to enable teams to now build drivers for new Data Plane ASICs
outside the IOS instance and have them program to a set of standard APIs which in turn enforces
Control Plane and Data Plane processing separation.
IOS XE accomplishes Control Plane / Data Plane separation through the introduction of the
Forwarding and Feature Manager (FFM) and its standard interface to the Forwarding Engine
Driver (FED). FFM provides a set of APIs to Control Plane processes. In turn, the FFM programs
the Data Plane via the FED and maintains forwarding state for the system. The FED is the
instantiation of the hardware driver for the Data Plane and is provided by the platform.
Reference. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe"Pass Any Exam. Any Time." - www.actualtests.com
13
QUESTION NO: 18
Refer to the exhibit.
14
QUESTION NO: 19
Refer to the exhibit.
15
QUESTION NO: 20
What is the most efficient way to confirm whether microbursts of traffic are occurring?
A. Monitor the output traffic rate using the show interface command.
B. Monitor the output traffic rate using the show controllers command.
C. Check the CPU utilization of the router.
D. Sniff the traffic and plot the packet rate over time.
Answer: D
Explanation:
Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession,
leading to periods of full line-rate transmission that can overflow packet buffers of the network
stack, both in network endpoints and routers and switches inside the network.
In order to troubleshoot microbursts, you need a packet sniffer that can capture traffic over a long
period of time and allow you to analyze it in the form of a graph which displays the saturation
points (packet rate during microbursts versus total available bandwidth). You can eventually trace
it to the source causing the bursts (e.g. stock trading applications).
Reference. Adam, Paul (2014-07-12). All-in-One CCIE V5 Written Exam Guide (Kindle Locations
989-994). . Kindle Edition.
QUESTION NO: 21
What is a cause for unicast flooding?
A. Unicast flooding occurs when multicast traffic arrives on a Layer 2 switch that has directly
connected multicast receivers.
B. When PIM snooping is not enabled, unicast flooding occurs on the switch that interconnects the
PIM-enabled routers.
"Pass Any Exam. Any Time." - www.actualtests.com
16
QUESTION NO: 22
Refer to the exhibit.
17
Video Source S is sending interactive video traffic to Video Receiver R. Router R1 has multiple
routing table entries for destination R. Which load-balancing mechanism on R1 can cause out-oforder video traffic to be received by destination R?
A. per-flow load balancing on R1 for destination R
B. per-source-destination pair load balancing on R1 for destination R
C. CEF load balancing on R1 for destination R
D. per-packet load balancing on R1 for destination R
Answer: D
Explanation:
Per-packet load balancing guarantees equal load across all links, however potentially the packets
may arrive out-of-order at the destination as differential delay may exist within the network.
Reference.
http://www.cisco.com/en/US/products/hw/modules/ps2033/prod_technical_reference09186a00800
afeb7.html
QUESTION NO: 23
What is Nagle's algorithm used for?
A. To increase the latency
B. To calculate the best path in distance vector routing protocols
C. To calculate the best path in link state routing protocols
18
QUESTION NO: 24
Which statement is true regarding the UDP checksum?
A. It is used for congestion control.
B. It cannot be all zeros.
C. It is used by some Internet worms to hide their propagation.
D. It is computed based on the IP pseudo-header.
Answer: D
Explanation:
The method used to compute the checksum is defined in RFC 768:
Checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of
information from the IP header, the UDP header, and the data, padded with zero octets at the end
(if necessary) to make a multiple of two octets.
In other words, all 16-bit words are summed using one's complement arithmetic. Add the 16-bit
values up. Each time a carry-out (17th bit) is produced, swing that bit around and add it back into
the least significant bit. The sum is then one's complemented to yield the value of the UDP
checksum field.
If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the one's
complement (all 1s).
"Pass Any Exam. Any Time." - www.actualtests.com
19
QUESTION NO: 25
Which statement describes the purpose of the Payload Type field in the RTP header?
A. It identifies the signaling protocol.
B. It identifies the codec.
C. It identifies the port numbers for RTP.
D. It identifies the port numbers for RTCP.
Answer: B
Explanation:
PT, Payload Type. 7 bits: Identifies the format of the RTP payload and determines its
interpretation by the application. A profile specifies a default static mapping of payload type codes
to payload formats. Additional payload type codes may be defined dynamically through non-RTP
means. An RTP sender emits a single RTP payload type at any given time; this field is not
intended for multiplexing separate media streams. A full list of codecs and their payload type
values can be found at the link below:
Reference. http://www.networksorcery.com/enp/protocol/rtp.htm
QUESTION NO: 26
Which Cisco IOS XE process administers routing and forwarding?
A. Forwarding manager
B. Interface manager
C. Cisco IOS
D. Host manager
Answer: C
Explanation:
Some of the processes are listed in the table below:
Process
Purpose
Affected FRUs
"Pass Any Exam. Any Time." - www.actualtests.com
20
QUESTION NO: 27
Which circumstance can cause packet loss due to a microburst?
A. slow convergence
B. a blocked spanning-tree port
C. process switching
D. insufficient buffers
Answer: D
Explanation:
Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession,
leading to periods of full line-rate transmission that can overflow packet buffers of the network
21
QUESTION NO: 28
Which two statements about proxy ARP are true? (Choose two.)
A. It is supported on networks without ARP.
B. It allows machines to spoof packets.
C. It requires larger ARP tables
D. It reduces the amount of ARP traffic.
Answer: B,C
Explanation:
Disadvantages of Proxy ARP
Hosts have no idea of the physical details of their network and assume it to be a flat network in
which they can reach any destination simply by sending an ARP request. But using ARP for
everything has disadvantages. These are some of the disadvantages:
Reference. http://www.cisco.com/c/en/us/support/docs/ip/dynamic-address-allocationresolution/13718-5.html
QUESTION NO: 29
Refer to the exhibit.
22
Routers R1 and R2 are configured as shown, and traffic from R1 fails to reach host
209.165.201.254.
Which action can you take to correct the problem?
A. Ensure that R2 has a default route in its routing table.
B. Change the OSPF area type on R1 and R2.
C. Edit the router configurations so that address 209.165.201.254 is a routable address.
D. Remove the default-information originate command from the OSPF configuration of R2.
Answer: A
Explanation:
Not sure that any of these answers are correct, it appears that this configuration is valid for
reaching that one specific host IP. Answer A does have a route to that host so it would not need a
default route to get to it. Choice B is incorrect as the area types have nothing to do with this. C is
incorrect as that IP address is routable, and D is needed so that R1 will have a default route
advertised to it from R2 so that it can reach this destination.
23
QUESTION NO: 30
Which service is disabled by the no service tcp-small-servers command?
A. the finger service
B. the Telnet service
C. the Maintenance Operation Protocol service
D. the chargen service
Answer: D
Explanation:
The TCP small servers are:
Reference. http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases110/12815-23.html
Answer:
Explanation:
24
Answer:
Explanation:
25
QUESTION NO: 33
Which two Cisco Express Forwarding tables are located in the data plane? (Choose two.)
A. the forwarding information base
B. the label forwarding information base
C. the IP routing table
D. the label information table
E. the adjacency table
Answer: A,B
Explanation:
The control plane runs protocols such as OSPF, BGP, STP, LDP. These protocols are needed so
that routers and switches know how to forward packets and frames.
The data plane is where the actual forwarding takes place. The data plane is populated based on
the protocols running in the control plane. The Forwarding Information Base (FIB) is used for IP
traffic and the Label FIB is used for MPLS.
QUESTION NO: 34
Which option is the most effective action to avoid packet loss due to microbursts?
A. Implement larger buffers.
B. Install a faster CPU.
C. Install a faster network interface.
D. Configure a larger tx-ring size.
Answer: A
Explanation:
You can't avoid or prevent them as such without modifying the sending host's application/network
stack so it smoothes out the bursts. However, you can manage microbursts by tuning the size of
receive buffers / rings to absorb occasional microbursts.
QUESTION NO: 35
"Pass Any Exam. Any Time." - www.actualtests.com
26
Reference. http://www.openwall.com/presentations/IPv6/img24.html
QUESTION NO: 36
You are backing up a server with a 1 Gbps link and a latency of 2 ms. Which two statements
about the backup are true? (Choose two.)
A. The bandwidth delay product is 2 Mb.
B. The default TCP send window size is the limiting factor.
27
QUESTION NO: 37
Which two pieces of information does RTCP use to inform endpoint devices about the RTP flow?
(Choose two.)
A. the transmitted octet
B. the lost packet count
C. session control function provisioning information
D. the CNAME for session participants
E. the authentication method
F. MTU size changes in the path of the flow
Answer: A,B
Explanation:
RTCP transports statistics for a media connection and information such as transmitted octet and
packet counts, packet loss, packet delay variation, and round-trip delay time. An application may
use this information to control quality of service parameters, perhaps by limiting flow, or using a
different codec.
Reference. http://en.wikipedia.org/wiki/RTP_Control_Protocol
28
Explanation:
Answer:
29
Answer:
30
Explanation:
QUESTION NO: 41
How many hash buckets does Cisco Express Forwarding use for load balancing?
"Pass Any Exam. Any Time." - www.actualtests.com
31
QUESTION NO: 42
Which three features require Cisco Express Forwarding? (Choose three.)
A. NBAR
B. AutoQoS
C. fragmentation
D. MPLS
E. UplinkFast
F. BackboneFast
Answer: A,B,D
Explanation: QoS Features That Require CEF
These class-based QoS features are supported only on routers that run CEF.
Network Based Application Recognition (NBAR) provides intelligent network classification. For
more information, refer to Network Based Application Recognition.
The AutoQoS -VoIP feature simplifies and speeds up the implementation and provisioning of
QoS for VoIP traffic. This feature is enabled with the help of the auto qos voip command. CEF
must be enabled at the interface or ATM PVC before the auto qos command can be used. For
more information about this feature and its prerequisites, refer to AutoQoS - VoIP.
From MPLS Fundamentals - Luc De Ghein
Why Is CEF Needed in MPLS Networks?
32
QUESTION NO: 43
Which two options are interface requirements for turbo flooding? (Choose two.)
A. The interface is Ethernet.
B. The interface is configured for ARPA encapsulation.
C. The interface is PPP.
D. The interface is configured for GRE encapsulation.
E. The interface is configured for 802.1Q encapsulation.
Answer: A,B
Explanation:
In the switch, the majority of packets are forwarded in hardware; most packets do not go through
the switch CPU. For those packets that do go to the CPU, you can speed up spanning tree-based
UDP flooding by a factor of about four to five times by using turbo-flooding. This feature is
supported over Ethernet interfaces configured for ARPA encapsulation.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/metro/me3400/software/release/122_50_se/configuration/guide/scg/swiprout.html
QUESTION NO: 44
Which three option are sub-subfields of the IPv4 Option Type subfield? (Choose three.)
A. Option Class
B. GET
C. Copied
D. PUSH
E. Option Number
"Pass Any Exam. Any Time." - www.actualtests.com
33
Reference. http://www.tcpipguide.com/free/t_IPDatagramOptionsandOptionFormat.htm
QUESTION NO: 45
Which TCP mechanism prevents the sender from sending data too quickly for the receiver to
process?
A. Congestion control
B. Error detection
C. Selective acknowledgement
D. Flow control
Answer: D
Explanation:
In data communications, flow control is the process of managing the rate of data transmission
between two nodes to prevent a fast sender from overwhelming a slow receiver. It provides a
mechanism for the receiver to control the transmission speed, so that the receiving node is not
overwhelmed with data from transmitting node.
Reference. http://en.wikipedia.org/wiki/Flow_control_(data)
34
QUESTION NO: 47
Which technology can create a filter for an embedded packet capture?
A. Control plane policing
B. Access lists
C. NBAR
D. Traffic shaping
Answer: B
Explanation:
A filter can be applied to limit the capture to desired traffic. Define an Access Control List (ACL)
within config mode and apply the filter to the buffer:
ip access-list extended BUF-FILTER
permit ip host 192.168.1.1 host 172.16.1.1
permit ip host 172.16.1.1 host 192.168.1.1
monitor capture buffer BUF filter access-list BUF-FILTER
35
QUESTION NO: 48
Which option describes a limitation of Embedded Packet Capture?
A. It can capture data only on physical interfaces and subinterfaces.
B. It can store only packet data.
C. It can capture multicast packets only on ingress.
D. It can capture multicast packets only on egress.
Answer: C
Explanation:
Restrictions for Embedded Packet Capture
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/15-mt/epc-15-mtbook/nm-packet-capture.html
QUESTION NO: 49
Refer to the exhibit.
A Cisco Catalyst 6500 Series Switch experiences high CPU utilization. What can be the cause of
this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
36
QUESTION NO: 50
Refer to the exhibit.
37
Your network is suffering excessive output drops. Which two actions can you take to resolve the
problem? (Choose two.)
A. Install a switch with larger buffers.
B. Configure a different queue set.
C. Reconfigure the switch buffers.
D. Configure the server application to use TCP.
E. Update the server operating system.
Answer: A,B
Explanation:
Installing a switch with larger buffers and correctly configuring the buffers can solve output queue
problems.
For each queue we need to configure the assigned buffers. The buffer is like the storage space
for the interface and we have to divide it among the different queues. This is how to do it:
mls qos queue-set output <queue set> buffers Q1 Q2 Q3 Q4
In this example, there is nothing hitting queue 2 or queue 3 so they are not being utilized.
38
Answer:
Explanation:
QUESTION NO: 52
Which two Cisco IOS XE commands can install a subpackage onto a router? (Choose two.)
A. request platform software package install rp rpSlotNumber file fileURL
"Pass Any Exam. Any Time." - www.actualtests.com
39
40
QUESTION NO: 53
Which two statements about Cisco Express Forwarding are true? (Choose two.)
A. Cisco Express Forwarding tables contain reachability information and adjacency tables contain
forwarding information.
B. Cisco Express Forwarding tables contain forwarding information and adjacency tables contain
reachability information.
C. Changing MAC header rewrite strings requires cache validation.
D. Adjacency tables and Cisco Express Forwarding tables can be built separately.
E. Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
Answer: A,D
Explanation:
Main Components of CEF
Information conventionally stored in a route cache is stored in several data structures for Cisco
Express Forwarding switching. The data structures provide optimized lookup for efficient packet
forwarding. The two main components of Cisco Express Forwarding operation are the forwarding
information base (FIB) and the adjacency tables.
The FIB is conceptually similar to a routing table or information base. A router uses this lookup
table to make destination-based switching decisions during Cisco Express Forwarding operation.
The FIB is updated when changes occur in the network and contains all routes known at the time.
Adjacency tables maintain Layer 2 next-hop addresses for all FIB entries.
This separation of the reachability information (in the Cisco Express Forwarding table) and the
forwarding information (in the adjacency table), provides a number of benefits:
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/iswcef-15-mt-book/isw-cef-overview.html
QUESTION NO: 54
Which TCP feature allows a client to request a specific packet that was lost?
A. flow control
B. sliding window
C. fast recovery
D. selective acknowledgment
Answer: D
41
QUESTION NO: 55
Which two solutions can reduce UDP latency? (Choose two.)
A. fast retransmission
B. fast recovery
C. fast start
D. low-latency queuing
E. IP service level agreements
F. congestion-avoidance algorithm
Answer: D,E
Explanation:
IP SLA uses active traffic monitoring, which generates traffic in a continuous, reliable, and
predictable manner to measure network performance. IP SLA sends data across the network to
measure performance between multiple network locations or across multiple network paths. It
simulates network data and IP services, and collects network performance information in real time.
This information is collected:
42
Answer:
Explanation:
43
Answer:
44
Explanation:
45
Answer:
Explanation:
46
QUESTION NO: 59
Refer to the exhibit.
47
If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the
interface Fa0/1 port state?
A. It transitions to the listening state, and then the forwarding state.
B. It transitions to the learning state and then the forwarding state.
C. It transitions to the blocking state, then the learning state, and then the forwarding state.
D. It transitions to the blocking state and then the forwarding state.
Answer: C
Explanation:
First, the port will transition to the blocking state, immediately upon the change, then it will
transition to the new RSTP states of learning and forwarding.
Port States
There are only three port states left in RSTP that correspond to the three possible operational
states. The 802.1D disabled, blocking, and listening states are merged into a unique 802.1w
discarding state.
STP (802.1D) Port State
RSTP (802.1w) Port State
Is Port Included in Active Topology?
Is Port Learning MAC Addresses?
Disabled
Discarding
No
No
Blocking
48
QUESTION NO: 60
Which type of port would have root guard enabled on it?
A. A root port
B. An alternate port
C. A blocked port
D. A designated port
Answer: D
Explanation:
The root guard feature provides a way to enforce the root bridge placement in the network.
The root guard ensures that the port on which root guard is enabled is the designated port.
Normally, root bridge ports are all designated ports, unless two or more ports of the root bridge are
connected together. If the bridge receives superior STP Bridge Protocol Data Units (BPDUs) on a
root guard-enabled port, root guard moves this port to a root-inconsistent STP state. This rootinconsistent state is effectively equal to a listening state. No traffic is forwarded across this port. In
this way, the root guard enforces the position of the root bridge.
Reference. http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/10588-74.html
49
While troubleshooting high CPU utilization on one of your Cisco Catalyst switches, you find that
the issue is due to excessive flooding that is caused by STP. What can you do to prevent this
issue from happening again?
A. Disable STP completely on the switch.
B. Change the STP version to RSTP.
C. Configure PortFast on port-channel 1.
D. Configure UplinkFast on the switch.
E. Configure PortFast on interface Gi0/15.
Answer: E
Explanation:
Topology Changes (TC) should be a rare event in a well-configured network. When a link on a
switch port goes up or down, there is eventually a TC, once the STP state of the port is changing
to or from forwarding. When the port is flapping, this would cause repetitive TCs and flooding.
Ports with the STP portfast feature enabled will not cause TCs when going to or from the
forwarding state. The configuration of portfast on all end-device ports (such as printers, PCs, and
servers) should limit TCs to a low amount and is highly recommended.
Reference. http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-treeprotocol/28943-170.html
QUESTION NO: 62
Refer to the exhibit.
50
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated.
The numbers shown are STP link metrics. Which two ports are forwarding traffic after STP
converges? (Choose two.)
A. The port connecting switch SWD with switch SWE
B. The port connecting switch SWG with switch SWF
C. The port connecting switch SWC with switch SWE
D. The port connecting switch SWB with switch SWC
Answer: C,D
Explanation:
Here, we know SWB to SWC are forwarding because we already identified the blocking port. So
for the last correct answer lets consider what must be done to prevent a switch loop between
SWC/SWD/SWE. SWE to SWD will be blocked because SWC has a lower MAC address so it
wins the forwarding port. And to look at it further, you could try to further understand what would
happen with ports on SWG. Would the ports on SWG try to go through SWE or SWF? SWE has
the lower MAC address so the port from SWG to SWE would win the forwarding election.
"Pass Any Exam. Any Time." - www.actualtests.com
51
QUESTION NO: 63
Refer to the exhibit.
Which three statements about the output are true? (Choose three.)
A. An mrouter port can be learned by receiving a PIM hello packet from a multicast router.
B. This switch is configured as a multicast router.
C. Gi2/0/1 is a trunk link that connects to a multicast router.
D. An mrouter port is learned when a multicast data stream is received on that port from a
multicast router.
E. This switch is not configured as a multicast router. It is configured only for IGMP snooping.
F. IGMP reports are received only on Gi2/0/1 and are never transmitted out Gi2/0/1 for VLANs 10
and 20.
Answer: A,B,C
Explanation:
In this example, the switch has been configured as a multicast router since IGMP snooping has
been enabled. All mrouters can learn about other mrouters by receiving a PIM hello packet from
another multicast router. Also, since two different VLANs are being used by the same port of gi
2/0/1, it must be a trunk link that connects to another multicast router.
QUESTION NO: 64
Refer to the exhibit.
52
If a port is configured as shown and receives an untagged frame, of which VLAN will the untagged
frame be a member?
A. VLAN 1
B. VLAN 2
C. VLAN 3
D. VLAN 4
Answer: B
Explanation:
When typing:
Switch(config-if)#switchport mode ?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
and
Switch(config-if)#switchport mode dynamic ?
auto Set trunking mode dynamic negotiation parameter to AUTO
53
QUESTION NO: 65
Refer to the exhibit.
Which statement describes the effect on the network if FastEthernet0/1 goes down temporarily?
A. FastEthernet0/2 forwards traffic only until FastEthernet0/1 comes back up.
B. FastEthernet0/2 stops forwarding traffic until FastEthernet0/1 comes back up.
C. FastEthernet0/2 forwards traffic indefinitely.
D. FastEthernet0/1 goes into standby.
Answer: C
Explanation:
Use the switchport backup interface interface configuration command on a Layer 2 interface to
configure Flex Links, a pair of interfaces that provide backup to each other. Use the no form of this
command to remove the Flex Links configuration.
With Flex Links configured, one link acts as the primary interface and forwards traffic, while the
54
QUESTION NO: 66
Refer to the exhibit.
Which technology does the use of bi-directional BPDUs on all ports in the topology support?
A. RSTP
B. MST
C. Bridge Assurance
D. Loop Guard
E. Root Guard
F. UDLD
Answer: C
Explanation:
Spanning Tree Bridge Assurance
55
Bridge Assurance (BA) can help protect against bridging loops where a port becomesdesignated
because it has stopped receiving BPDUs. This is similar to the functionof loop guard.
Reference. http://lostintransit.se/tag/convergence/
QUESTION NO: 67
Which three statements are true about PPP CHAP authentication? (Choose three.)
A. PPP encapsulation must be enabled globally.
B. The LCP phase must be complete and in closed state.
C. The hostname used by a router for CHAP authentication cannot be changed.
D. PPP encapsulation must be enabled on the interface.
E. The LCP phase must be complete and in open state.
F. By default, the router uses its hostname to identify itself to the peer.
Answer: D,E,F
Explanation:
Point-to-Point Protocol (PPP) authentication issues are one of the most common causes for dialup
link failures. This document provides some troubleshooting procedures for PPP authentication
issues.
Prerequisites
NotE. By default, the router uses its hostname to identify itself to the peer. However, this CHAP
username can be changed through the ppp chap hostname command.
Reference. http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/25647understanding-ppp-chap.html
QUESTION NO: 68
56
QUESTION NO: 69
Which two statements describe characteristics of HDLC on Cisco routers? (Choose two.)
A. It supports multiple Layer 3 protocols.
B. It supports multiplexing.
C. It supports only synchronous interfaces.
D. It supports authentication.
Answer: A,C
Explanation:
Cisco High-Level Data Link Controller (HDLC) is the Cisco proprietary protocol for sending data
over synchronous serial links using HDLC. Cisco HDLC also provides a simple control protocol
called Serial Line Address Resolution Protocol (SLARP) to maintain serial link keepalives. Cisco
HDLC is the default for data encapsulation at Layer 2 (data link) of the Open System
Interconnection (OSI) stack for efficient packet delineation and error control.
The absence of a protocol type field in the HDLC header posed a problem for links that carried
traffic from more than one Layer 3 protocol. Cisco, therefore, added an extra Type field to the
HDLC header, creating a Cisco-specific version of HDLC. Cisco routers can support multiple
network layer protocols on the same HDLC link. For example an HDLC link between two Cisco
"Pass Any Exam. Any Time." - www.actualtests.com
57
QUESTION NO: 70
Which mechanism can be used on Layer 2 switches so that only multicast packets with
downstream receivers are sent on the multicast router-connected ports?
A. IGMP snooping
B. Router Guard
C. PIM snooping
D. multicast filtering
Answer: C
Explanation:
Ideally, the Layer 2 device should forward the multicast transmission only out ports to which
receivers are connected and also out any ports that are connected to downstream multicast
routers. This configuration requires a Layer 2 device to be able to determine the ports on which
multicast routers and receivers for each separate (S,G) or (*,G) multicast group are located. To
facilitate intelligent forwarding of multicast traffic on the LAN, Cisco Catalyst switches support two
mechanisms:
Reference.
https://www.informit.com/library/content.aspx?b=CCNP_Studies_Switching&seqNum=59
QUESTION NO: 71
Which technology can be used to prevent flooding of IPv6 multicast traffic on a switch?
A. IGMP snooping
B. IGMP filtering
C. MLD snooping
D. MLD filtering
Answer: C
"Pass Any Exam. Any Time." - www.actualtests.com
58
QUESTION NO: 72
Refer to the exhibit.
59
QUESTION NO: 73
Which option is the default maximum age of the MAC address table?
A. 300 seconds
B. 500 seconds
C. 1200 seconds
D. 3600 seconds
Answer: A
Explanation:
To configure the maximum aging time for entries in the Layer 2 table, use the mac-address-table
aging-time command in global configuration mode.
Syntax Description
seconds
MAC address table entry maximum age. Valid values are 0, and from 5 to 1000000 seconds.
Aging time is counted from the last time that the switch detected the MAC address. The default
value is 300 seconds.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/lanswitch/command/reference/lsw_book/lsw_m1.html
QUESTION NO: 74
Refer to the exhibit.
60
Which two statements about the output are true? (Choose two.)
A. 802.1D spanning tree is being used.
B. Setting the priority of this switch to 0 for VLAN 1 would cause it to become the new root.
C. The hello, max-age, and forward delay timers are not set to their default values.
D. Spanning-tree PortFast is enabled on GigabitEthernet1/1.
Answer: A,B
Explanation:
802.1D is the standard for Spanning tree, which is being used here. For priority, The priority order
starts from 0 (yes, 0 is valid) and then increases in 4096.
0, 4096, 8192, 12288, . Etc.
The lower the number, the higher the priority. Here we see that the current root has a priority of
8192, so configuring this with a priority of 0 will make it the new root.
QUESTION NO: 75
Which statement is true about Fast Link Pulses in Ethernet?
A. They are used during collision detection.
B. They are used only if the media type is optical.
C. They are part of UniDirectional Link Detection.
D. They are used during autonegotiation.
Answer: D
Explanation:
To make sure that your connection is operating properly, IEEE 802.3 Ethernet employs normal link
pulses (NLPs), which are used for verifying link integrity in a 10BaseT system. This signaling gives
you the link indication when you attach to the hub and is performed between two directly
connected link interfaces (hub-to-station or station-to-station). NLPs are helpful in determining that
61
QUESTION NO: 76
Which statement is true regarding UDLD and STP timers?
A. The UDLD message timer should be two times the STP forward delay to prevent loops.
B. UDLD and STP are unrelated features, and there is no relation between the timers.
C. The timers need to be synced by using the spanning-tree udld-sync command.
D. The timers should be set in such a way that UDLD is detected before the STP forward delay
expires.
Answer: D
Explanation:
UDLD is designed to be a helper for STP. Therefore, UDLD should be able to detect an
unidirectional link before STP would unblock the port due to missed BPDUs. Thus, when you
configure UDLD timers, make sure your values are set so that unidirectional link is detected before
STP MaxAge + 2xForwardDelay expires.
Reference. http://blog.ine.com/tag/stp/
QUESTION NO: 77
Which switching technology can be used to solve reliability problems in a switched network?
A. fragment-free mode
B. cut-through mode
C. check mode
D. store-and-forward mode
Answer: D
Explanation:
Characteristics of Store-and-Forward Ethernet Switching
"Pass Any Exam. Any Time." - www.actualtests.com
62
Reference. http://www.cisco.com/c/en/us/products/collateral/switches/nexus-5020switch/white_paper_c11-465436.html
QUESTION NO: 78
Refer to the exhibit.
63
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated.
The numbers shown are STP link metrics. Which two ports are in blocking state after STP
converges? (Choose two.)
A. the port on switch SWD that connects to switch SWE
B. the port on switch SWF that connects to switch SWG
C. the port on switch SWD that connects to switch SWC
D. the port on switch SWB that connects to switch SWD
Answer: C,D
Explanation:
This is a scenario that wants you to demonstrate understanding of the Root switch and Root port
election process. So, its best to start with where the root switch will be and work down from there.
Its setup nicely because the lowest MAC address switch starts at the top and then the lower
priority/higher mac addresses move down the architecture. SWA wins the root election and of
course all ports in SWA are forwarding. SWB introduces the possibility for a switching loop so its
important to understand which ports will be put into the blocking state. Since SWD is a higher
"Pass Any Exam. Any Time." - www.actualtests.com
64
QUESTION NO: 79
Which statement is true about IGMP?
A. Multicast sources send IGMP messages to their first-hop router, which then generates a PIM
join message that is then sent to the RP.
B. Multicast receivers send IGMP messages to their first-hop router, which then forwards the
IGMP messages to the RP.
C. IGMP messages are encapsulated in PIM register messages and sent to the RP.
D. Multicast receivers send IGMP messages to signal their interest to receive traffic for specific
multicast groups.
Answer: D
Explanation:
In the example shown above, the receivers (the designated multicast group) are interested in
receiving the video data stream from the source. The receivers indicate their interest by sending
an Internet Group Management Protocol (IGMP) host report to the routers in the network. The
routers are then responsible for delivering the data from the source to the receivers.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_ovr.html
65
QUESTION NO: 80
Which two statements are true about RSTP? (Choose two.)
A. By default, RTSP uses a separate TCN BPDU when interoperating with 802.1D switches.
B. By default, RTSP does not use a separate TCN BPDU when interoperating with 802.1D
switches.
C. If a designated port receives an inferior BPDU, it immediately triggers a reconfiguration.
D. By default, RTSP uses the topology change TC flag.
E. If a port receives a superior BPDU, it immediately replies with its own information, and no
reconfiguration is triggered.
Answer: B,D
Explanation:
The RSTP does not have a separate topology change notification (TCN) BPDU. It uses the
topology change (TC) flag to show the topology changes.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/121_9_ea1/configuration/guide/scg/swmstp.html
QUESTION NO: 81
Refer to the exhibit.
Which two statements are true about the displayed STP state? (Choose two.)
A. The STP version configured on the switch is IEEE 802.1w.
B. Port-channel 1 is flapping and the last flap occurred 1 minute and 17 seconds ago.
C. The switch does not have PortFast configured on Gi0/15.
D. BPDUs with the TCN bit set are transmitted over port channel 1.
"Pass Any Exam. Any Time." - www.actualtests.com
66
Answer:
Explanation:
67
QUESTION NO: 83
When you migrate a network from PVST+ to rapid-PVST+, which two features become inactive?
(Choose two.)
A. Root guard
B. Loop guard
C. UplinkFast
D. UDLD
E. BackboneFast
F. Bridge Assurance
Answer: C,E
Explanation:
It is good to know the UplinkFast and BackboneFast behavior before you start the migration
process.
Here, the Access1 switch runs Cisco IOS. This output is taken before migration to the rapidPVST+ mode:
Access1#show spanning-tree vlan 10
VLAN0010
Spanning tree enabled protocol ieee
Root ID Priority 24586
"Pass Any Exam. Any Time." - www.actualtests.com
68
69
70
QUESTION NO: 84
Which statement is true about MLD?
A. MLD v1 gives hosts the ability to receive multicast packets from specific source addresses.
B. All MLD messages are sent with a link-local IPv6 source address of FF02::D.
C. The multicast address field is cleared to zero when sending an MLD report message.
D. MLD is used by IPv6 routers to discover multicast listeners on a directly attached link.
Answer: D
Explanation:
IPv6 Multicast Listener Discovery (MLD) is used by IPv6 devices to discover multicast listeners
(nodes that want to receive multicast packets destined for specific multicast addresses) on directly
attached links. There are two versions of MLD. MLD version 1 is based on version 2 of the IGMP
for IPv4, and MLD version 2 is based on version 3 of the IGMP for IPv4. IPv6 multicast for Cisco
software uses both MLD version 2 and MLD version 1.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_lsm/configuration/xe-3s/imclsm-xe-3s-book/ipv6-mcast-mld-xe.html
QUESTION NO: 85
Which statement is true about LLDP?
A. LLDP provides VTP support.
B. LLDP does not use a multicast address to communicate.
C. LLDP can indicate only the duplex setting of a link, and not the speed capabilities.
D. LLDP does not support native VLAN indication.
Answer: D
Explanation:
Cisco Discovery Protocol Versus LLDP-MED TLV Comparison
TLV Function
LLDP TLV
Cisco Discovery Protocol TLV
"Pass Any Exam. Any Time." - www.actualtests.com
71
QUESTION NO: 86
Which statement is true when using a VLAN ID from the extended VLAN range (10064094)?
A. VLANs in the extended VLAN range can be used with VTPv2 in either client or server mode.
B. VLANs in the extended VLAN range can only be used as private VLANs.
C. STP is disabled by default on extended-range VLANs.
D. VLANs in the extended VLAN range cannot be pruned.
Answer: D
Explanation:
Enabling VTP pruning on a VTP server enables pruning for the entire management domain.
Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on
that device only (not on all switches in the VTP domain). VTP pruning takes effect several seconds
after you enable it. VTP pruning does not prune traffic from VLANs that are pruning-ineligible.
VLAN 1 and VLANs 1002 to 1005 are always pruning-ineligible; traffic from these VLANs cannot
be pruned. Extended-range VLANs (VLAN IDs higher than 1005) are also pruning-ineligible.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/121_13_ea1/configuration/guide/3550scg/swvtp.html#wpxref48156
QUESTION NO: 87
Which statement is true about trunking?
A. Cisco switches that run PVST+ do not transmit BPDUs on nonnative VLANs when using a
dot1q trunk.
B. When removing VLAN 1 from a trunk, management traffic such as CDP is no longer passed in
that VLAN.
C. DTP only supports autonegotiation on 802.1q and does not support autonegotiation for ISL.
"Pass Any Exam. Any Time." - www.actualtests.com
72
QUESTION NO: 88
Which three statements are true about an EtherChannel? (Choose three.)
A. PAGP and LACP can be configured on the same switch if the switch is not in the same
EtherChannel.
B. EtherChannel ports in suspended state can receive BPDUs but cannot send them.
C. An EtherChannel forms between trunks that are using different native VLANs.
D. LACP can operate in both half duplex and full duplex, if the duplex setting is the same on both
ends.
E. Ports with different spanning-tree path costs can form an EtherChannel.
Answer: A,B,E
Explanation:
Answer A. EtherChannel groups running PAgP and LACP can coexist on the same switch or on
different switches in the stack. Individual EtherChannel groups can run either PAgP or LACP, but
they cannot interoperate.
Answer B:
EtherChannel Member Port States
Port States
Description
bundled
The port is part of an EtherChannel and can send and receive BPDUs and data traffic.
suspended
The port is not part of an EtherChannel. The port can receive BPDUs but cannot send them. Data
traffic is blocked.
"Pass Any Exam. Any Time." - www.actualtests.com
73
QUESTION NO: 89
Which technology can be affected when switches are used that do not support jumbo frames?
A. 802.1x
B. BFD
C. OSPFv3
D. 802.1q
Answer: D
Explanation:
The 802.1Q tag is 4 bytes. Therefore, the resulting Ethernet frame can be as large as 1522 bytes.
If jumbo frames are not supported, then typically the MTU on an Ethernet link needs to be lowered
to 1496 to support this extra 802.1Q tag.
QUESTION NO: 90
Which statement describes the native VLAN concept in an ISL trunk?
A. It is the VLAN ID that is assigned to untagged packets.
B. It is the VLAN with highest priority.
C. It is the default VLAN for a trunk.
D. There is no native VLAN concept in an ISL trunk.
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com
74
QUESTION NO: 91
Which protocol is the encapsulating protocol for mtrace packets?
A. ICMP
B. IGMP
C. PIM
D. GRE
Answer: B
Explanation:
mtrace is a diagnostic tool to trace the multicast path from a specified source to a destination for
a multicast group. It runs over IGMP protocol. Mtrace uses any information available to it to
determine a previous hop to forward the trace towards the source.
Reference.
http://www.brocade.com/downloads/documents/html_product_manuals/NI_05500c_MULTICAST/
wwhelp/wwhimpl/common/html/wwhelp.htm#context=NI_MCAST&file=IP_Multicast.3.04.html
QUESTION NO: 92
Assume that the following MAC addresses are used for the bridge ID MAC address by four
different switches in a network. Which switch will be elected as the spanning-tree root bridge?
A. SwitchA uses MAC 1000.AA-AA-AA-AA-AA-AA.
B. SwitchB uses MAC 2000.BB-BB-BB-BB-BB-BB.
C. SwitchC uses MAC 3000.CC-CC-CC-CC-CC-CC.
D. SwitchD uses MAC 4000.DD-DD-DD-DD-DD-DD.
Answer: A
Explanation:
The switch with the highest switch priority (the lowest numerical priority value) is elected as the
root switch. If all switches are configured with the default priority (32768), the switch with the
lowest MAC address in the VLAN becomes the root switch.
"Pass Any Exam. Any Time." - www.actualtests.com
75
QUESTION NO: 93
What is the destination MAC address of a BPDU frame?
A. 01-80-C2-00-00-00
B. 01-00-5E-00-00-00
C. FF-FF-FF-FF-FF-FF
D. 01-80-C6-00-00-01
Answer: A
Explanation:
The root-bridge election process begins by having every switch in the domain believe it is the root
and claiming it throughout the network by means of Bridge Protocol Data Units (BPDU). BPDUs
are Layer 2 frames multicast to a well-known MAC address in case of IEEE STP (01-80-C2-00-0000) or vendor-assigned addresses, in other cases.
Reference. http://www.ciscopress.com/articles/article.asp?p=1016582
QUESTION NO: 94
Refer to the exhibit.
All switches are Cisco switches. Assume that Cisco Discovery Protocol is enabled only on
switches A and C.
Which information is returned when you issue the command show cdp neighbors on switch C?
76
QUESTION NO: 95
Which two features are supported when Cisco HDLC is implemented? (Choose two.)
A. error recovery
B. error detection
C. asynchronous links
D. multiple protocols
Answer: B,D
Explanation:
HDLCs frame check sequence (FCS) is a 16-bit CRC-CCITT or a 32-bit CRC-32 computed over
the Address, Control, and Information fields. It provides a means by which the receiver can detect
errors that may have been induced during the transmission of the frame, such as lost bits, flipped
bits, and extraneous bits.
Ciscos HDLC contains a proprietary field that is used to support multiple protocols.
Reference. http://en.wikipedia.org/wiki/High-Level_Data_Link_Control
QUESTION NO: 96
Refer to the exhibit.
77
With these configurations for R1 and R2, which statement about PPP authentication is true?
A. Authentication fails because R1 is missing a username and password.
B. R2 responds with the correct authentication credentials.
C. R2 requires authentication from R1.
D. R1 requires authentication from R2.
Answer: C
Explanation:
Only R2 is configured with the PPP authentication PAP command so it requires authentication
from R1, but R1 does not require authentication from R2.
QUESTION NO: 97
Refer to the exhibit.
78
You must complete the configuration on R1 so that a maximum of three links can be used and
fragmentation is supported.
Which additional configuration accomplishes this task?
A. interface Multilink19
ip address 192.168.1.1 255.255.255.0
ppp multilink
ppp multilink group 19
ppp multilink links minimum 1
ppp multilink links maximum 3
ppp multilink interleave
B. interface Multilink19
ip address 192.168.1.1 255.255.255.0
ppp multilink
ppp multilink group 19
ppp multilink links maximum 3
ppp multilink fragment delay 20
C. interface Multilink19
ip address 192.168.1.1 255.255.255.0
ppp multilink
ppp multilink group 19
ppp multilink links maximum 3
ppp multilink fragment delay 20
ppp multilink interleave
D. interface Multilink19
ip address 192.168.1.1 255.255.255.252
ppp multilink
ppp multilink group 19
79
QUESTION NO: 98
Refer to the exhibit.
80
Answer:
Explanation:
81
82
All switches have default bridge priorities, and originate BPDUs with MAC addresses as indicated.
The numbers shown are STP link metrics.
After STP converges, you discover that traffic from switch SWG toward switch SWD takes a less
optimal path. What can you do to optimize the STP tree in this switched network?
83
84
85
Which technology can be used on the switch to enable host A to receive multicast packets for
239.2.2.2 but prevent host B from receiving them?
A. IGMP filtering
B. MLD snooping
C. IGMP snooping
D. MLD filtering
Answer: C
Explanation:
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network
traffic. The feature allows a network switch to listen in on the IGMP conversation between hosts
and routers. By listening to these conversations the switch maintains a map of which links need
which IP multicast streams. Multicasts may be filtered from the links which do not need them and
thus controls which ports receive specific multicast traffic.
86
87
88
89
Which action must you take to enable the WAN link to function properly?
A. Enter a clock rate on the DCE interface.
B. Enter a clock rate on the DTE interface.
C. Enter a compression algorithm on both interfaces.
D. Configure both interfaces for HDLC encapsulation.
Answer: A
Explanation:
When connecting a serial cable to the serial interface of the router, clocking is provided by an
external device, such as a CSU/DSU device. A CSU/DSU (Channel Service Unit/Data Service
Unit) is a digital-interface device used to connect a router to a digital circuit. The router is the DTE
(Data Terminal Equipment) and the external device is the DCE (Data Communications
Equipment), where the DCE provides the clocking. However, in some cases we might connect two
routers back-to-back using the routers serial interfaces (ExamplE. Inside the router labs). Each
router is a DTE by default.
Since clocking is required to enable the interface, one of the two routers should function as DCE
and should provide clocking. This can be done by using the "clock rate" command, from the
interface configuration mode.
Reference. http://www.omnisecu.com/cisco-certified-network-associate-ccna/how-to-configurerouter-serial-interfaces.php
90
91
Answer:
Explanation:
92
93
Reference. http://packetlife.net/blog/2010/jan/18/etherchannel-considerations/
94
95
96
Answer:
97
Explanation:
98
Explanation:
99
Answer:
Explanation:
100
101
Explanation:
102
Answer:
Explanation:
103
104
105
106
Ethernet ports
Port channels
The inband interface to the control plane CPUYou can monitor the inband interface only from
the default VDC. Inband traffic from all VDCs is monitored.
VLANsWhen a VLAN is specified as a SPAN source, all supported interfaces in the VLAN are
SPAN sources.
Fabric port channels connected to the Cisco Nexus 2000 Series Fabric Extender
Satellite ports and host interface port channels on the Cisco Nexus 2000 Series Fabric
"Pass Any Exam. Any Time." - www.actualtests.com
107
ExtenderThese interfaces are supported in Layer 2 access mode, Layer 2 trunk mode, and
Which two statements about the implementation are true? (Choose two.)
108
109
110
111
112
Which option explains why the forwarding address is set to 0.0.0.0 instead of 110.100.1.1?
A. The interface Ethernet0/1 is in down state.
B. The next-hop ip address 110.100.1.1 is not directly attached to the redistributing router.
C. The next-hop interface (Ethernet0/1) is specified as part of the static route command; therefore,
the forwarding address is always set to 0.0.0.0.
D. OSPF is not enabled on the interface Ethernet0/1.
Answer: D
Explanation:
From the output of the show ip ospf database command (although this command is not shown)
"Pass Any Exam. Any Time." - www.actualtests.com
113
You have configured two routing protocols across this point-to-point link. How many BFD sessions
will be established across this link?
A. three per interface
B. one per multicast address
C. one per routing protocol
D. one per interface
Answer: D
114
115
Routers R1, R2, and R3 are configured as shown, and traffic from R2 fails to reach 172.29.168.3.
Which action can you take to correct the problem?
A. Correct the static route on R1.
B. Correct the default route on R2.
C. Edit the EIGRP configuration of R3 to enable auto-summary.
D. Correct the network statement for 172.29.168.3 on R3.
Answer: A
Explanation:
On R1 we see there is a wrongly configured static route : ip route 172.29.168.3 255.255.255.255
172.17.17.2. It should be ip route 172.29.168.3 255.255.255.255 10.17.12.3.
"Pass Any Exam. Any Time." - www.actualtests.com
116
117
For which reason could a BGP-speaking device in autonomous system 65534 be prevented from
installing the given route in its BGP table?
A. The AS number of the BGP is specified in the given AS_PATH.
B. The origin of the given route is unknown.
C. BGP is designed only for publicly routed addresses.
D. The AS_PATH for the specified prefix exceeds the maximum number of ASs allowed.
E. BGP does not allow the AS number 65535.
Answer: A
Explanation:
BGP is considered to be a 'Path Vector' routing protocol rather than a distance vector routing
protocol since it utilises a list of AS numbers to describe the path that a packet should take. This
list is called the AS_PATH. Loops are prevented because if a BGP speaking router sees it's own
AS in the AS_PATH of a route it rejects the route.
118
Before a router can be considered a feasible successor, it must pass the feasibility condition rule.
In short, the feasibility condition says that if we learn about a prefix from a neighbor, the advertised
distance from that neighbor to the destination must be lower than our feasible distance to that
same destination.
Therefore we see the Advertised Distance always smaller than the Feasible Distance to satisfy the
feasibility condition.
119
120
Hello interval
Dead interval
Area ID
Optional capabilities
The OSPFv3 header includes an instance ID field to identify that OSPFv3 packet for a particular
OSPFv3 instance. You can assign the OSPFv3 instance. The interface drops all OSPFv3 packets
that do not have a matching OSPFv3 instance ID in the packet header.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nxos/unicast/configuration/guide/l3_cli_nxos/l3_ospfv3.html
"Pass Any Exam. Any Time." - www.actualtests.com
121
122
123
AS #1 and AS #2 have multiple EBGP connections with each other. AS #1 wants all return traffic
that is destined to the prefix 10.10.10.1/32 to enter through the router R1 from AS #2. In order to
achieve this routing policy, the AS 1 advertises a lower MED from R1, compared to a higher MED
from R3, to their respective BGP neighbor for the prefix 10.10.10.0/24. Will this measure
guarantee that the routing policy is always in effect?
A. Yes, because MED plays a deterministic role in return traffic engineering in BGP.
B. Yes, because a lower MED forces BGP best-path route selection in AS #2 to choose R1 as the
best path for 10.10.10.0/24.
C. Yes, because a lower MED in AS #2 is the highest BGP attribute in BGP best-path route
selection.
D. No, AS #2 can choose to alter the weight attribute in R2 for BGP neighbor R1, and this weight
value is cascaded across AS #2 for BGP best-path route selection.
E. No, AS #2 can choose to alter the local preference attribute to overwrite the best-path route
selection over the lower MED advertisement from AS #1. This local preference attribute is
cascaded across AS #2 for the BGP best-path route selection.
Answer: E
Explanation:
MED and AS path prepending can both be used to influence the way incoming traffic from other
Autonomous Systems get sent to the local AS, but they provide no guarantee as the other AS
ultimately has the final word in how they send traffic. Since local preference is preferred over MED
in the BGP decision process, the other AS can configure local preference to override the MED
settings you have configured.
124
125
126
127
128
R2 learns about the 1.1.1.1/32 route through both EIGRP and BGP, but installs only the EIGRP
route in the routing table because of the lower administrative distance. Since the BGP route is not
installed in the R2 routing table, the route appears as a rib-failure in the R2 BGP table.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116146config-bgp-next-hop-00.html
129
Router A and router B are physically connected over an Ethernet interface, and ISIS is configured
as shown. Which option explains why the ISIS neighborship is not getting formed between router
A and router B?
A. same area ID
B. same N selector
C. same domain ID
D. same system ID
Answer: D
Explanation:
With IS-IS, the LSP identifier is derived from the system ID (along with the pseudonode ID and
LSP number). Each IS is usually configured with one NET and in one area; each system ID within
an area must be unique.
130
131
132
133
The interface FastEthernet0/1 of both routers R4 and R5 is connected to the same Ethernet
segment with a multicast receiver. Which two statements are true? (Choose two)
A. Multicast traffic that is destined to a receiver with IP address 192.168.2.6 will flow through
router R4.
B. Both routers R4 and R5 will send PIM join messages to the RP.
C. Only router R5 will send a multicast join message to the RP.
D. Multicast traffic that is destined to a receiver with IP address 192.168.2.6 will flow through
router R5.
Answer: C,D
Explanation:
Even though R4 is the active HSRP router, traffic will flow through R5 and only R5 will send the
join messages. The Multicast DR is elected by the higher IP address or priority. R5 has
192.168.2.2 and R4 has 192.168.2.1. R5 is the DR which send all packets to the RP.
134
This is the configuration of the ASBR of area 110.Which option explains why the remote ABR
should not translate the type 7 LSA for the prefix 192.168.0.0/16 into a type 5 LSA?
A. The remote ABR translates all type 7 LSA into type 5 LSA, regardless of any option configured
in the ASBR.
B. The ASBR sets the forwarding address to 0.0.0.0 which instructs the ABR not to translate the
LSA into a type 5 LSA.
C. The ASBR originates a type 7 LSA with age equal to MAXAGE 3600.
D. The ABR clears the P bit in the header of the type 7 LSA for 192.168.0.0/16.
Answer: D
Explanation:
When external routing information is imported into an NSSA, LSA Type 7 is generated by the
ASBR and it is flooded within that area only. To further distribute the external information, type 7
LSA is translated into type 5 LSA at the NSSA border. The P-bit in LSA Type 7 field indicates
whether the type 7 LSA should be translated. This P-bit is automatically set by the NSSA ABR
(also the Forwarding Address (FA) is copied from Type 7 LSA). The P-bit is not set only when the
NSSA ASBR and NSSA ABR are the same router for the area . If bit P = 0, then the NSSA ABR
must not translate this LSA into Type 5.
he nssa-only keyword instructs the device to instigate Type-7 LSA with cleared P-bit, thereby,
preventing LSA translation to Type 5 on NSSA ABR device.
NotE. If a router is attached to another AS and is also an NSSA ABR, it may originate a both a
type-5 and a type-7 LSA for the same network. The type-5 LSA will be flooded to the backbone
and the type-7 will be flooded into the NSSA. If this is the case, the P-bit must be reset (P=0) in
the type-7 LSA so the type-7 LSA isnt again translated into a type-5 LSA by another NSSA ABR.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-e/iro15-e-book/iro-ospfv3-nssa-cfg.html
135
136
137
138
139
140
141
142
143
Enter line-protocol to track the interface line protocol state or enter ip routing to track the
interface IP routing state.
Enter metric threshold to track the threshold metric or enter reachability to track if the route is
reachable.
The default up threshold is 254 and the default down threshold is 255.
Enter list to track objects grouped in a list. Configure the list as described on the previous pages.
Note
Repeat this step for each interface to be tracked.
Reference:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/122_52_se/configuration/guide/3560scg/sweot.html
Notice that debug ip bgp updates has been enabled. What can you conclude from the debug
output?
A. This is the result of the clear ip bgp 10.1.3.4 in command.
B. This is the result of the clear ip bgp 10.1.3.4 out command.
C. BGP neighbor 10.1.3.4 performed a graceful restart.
D. BGP neighbor 10.1.3.4 established a new BGP session.
Answer: A
Explanation:
If you enter the clear ip bgp out command for a BGP peer, that router resends its BGP prefixes to
that peer. This does not cause a change in the best path on the receiving BGP peer. Hence, there
is no change in the Table Version on that peer.
When you run the debug ip bgp updates on the receiving router, you see:
BGP(0): 10.1.3.4 rcvd UPDATE w/ attr: nexthop 10.1.3.4, origin i, metric 0, merged path 4,
AS_PATHBGP(0): 10.1.3.4 rcvd 10.100.1.1/32...duplicate ignored
The received update is recognized as a duplicate, so it is ignored and no best path change occurs.
Reference. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116511technote-tableversion-00.html
145
B)
C)
D)
146
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation:
Advertise maps are used for conditional routing to advertise specified prefixes if something which
is specified in exist map exists. In our question we need to advertise 172.16.0.0/24 if
10.10.10.10/32 exists in the routing table so we have to use commanD. neighbor x.x.x.x
advertise-map <prefix-list of 172.16.0.0/24> exist-map <prefix-list of 10.10.10.10/32>. Therefore B
is correct.
147
148
149
150
151
152
153
Why is the prefix 1.1.1.1/32 not present in the routing table of R1?
154
R4-4K
R1-7010
interface Loopback0
ip address 172.16.33.1 255.255.255.255
interface Serial2
ip address 172.16.32.1 255.255.255.0
ip ospf network broadcast
155
156
157
158
159
160
How many EIGRP routes will appear in the routing table of R2?
A. 0
B. 1
C. 2
D. 3
Answer: A
Explanation:
EIGRPv6 on R2 was shut down so there is no EIGRP routes on the routing table of R2. If we turn
on EIGRPv6 on R2 (with no shutdown command) then we would see the prefix of the loopback
interface of R1 in the routing table of R2.
NotE. EIGRPv6 requires the ipv6 unicast-routing global command to be turned on first or it will
not work.
161
162
163
164
Which part of the joined group addresses list indicates that the interface has joined the EIGRP
multicast group address?
A. FF02::1
B. FF02::1:FF00:200
C. FF02::A
D. FF02::2
Answer: C
Explanation:
FF02::A is an IPv6 link-local scope multicast addresses. This address is for all devices on a wire
that want to "talk" EIGRP with one another.
Focusing specifically on FF02::A and how routers join it, we can see and say three things:
Reference. http://www.networkcomputing.com/networking/understanding-ipv6-what-is-solicitednode-multicast/a/d-id/1315703
165
166
167
168
Which two statements about the device that generated the output are true? (Choose two.)
A. The SPT-bit is set.
B. The sparse-mode flag is set.
C. The RP-bit is set.
D. The source-specific host report was received.
Answer: A,D
Explanation: In this example we can see that the s, T, and I flags are set. Here is a list of the
flags and their meanings:
show ip mroute Field Descriptions
Field
Description
Flags:
Provides information about the entry.
D - Dense
Entry is operating in dense mode.
S - Sparse
Entry is operating in sparse mode.
B - Bidir Group
Indicates that a multicast group is operating in bidirectional mode.
s - SSM Group
Indicates that a multicast group is within the SSM range of IP addresses. This flag is reset if
the SSM range changes.
C - Connected
A member of the multicast group is present on the directly connected interface.
L - Local
The router itself is a member of the multicast group.
P - Pruned
Route has been pruned. The Cisco IOS software keeps this information so that a downstream
169
170
Which three statements about the output are true? (Choose three.)
A. This switch is currently receiving a multicast data stream that is being forwarded out VLAN 150.
B. A multicast receiver has requested to join one or more of the multicast groups.
C. Group 224.0.1.40 is a reserved address, and it should not be used for multicast user data
transfer.
D. One or more multicast groups are operating in PIM dense mode.
E. One or more of the multicast data streams will be forwarded out to neighbor 10.85.20.20.
F. Group 239.192.1.1 is a reserved address, and it should not be used for multicast user data
transfer.
Answer: A,B,C
Explanation:
A; VLAN 150 shows up in the outgoing interface list so those specific multicast streams are being
forwarded to this VLAN.
B. A receiver has requested to receive the multicast stream associated with the multicast address
of 239.192.1.1, that is why this stream appears in the mroute table.
C. The 224.0.1.40 is a reserved multicast group for cisco's Rp descovery. All cisco routers are
members of this grup by default and listen to this group for Cisco RP discovery messages
advertised by mapping agent even if it is not configured
171
172
Answer:
173
Explanation:
Answer:
174
Answer:
Explanation:
175
Answer:
Explanation:
176
Answer:
Explanation:
177
Answer:
Explanation:
178
Which two pieces of information in this Wireshark capture indicate that you are viewing EIGRP
traffic? (Choose two.)
A. the header length
179
Cluster-list is an optional, nontransitive BGP attribute. It is a sequence of cluster IDs that the route
has passed. When a route reflector reflects a route from its clients to nonclient peers, and vice
versa, it appends the local cluster ID to the cluster-list. If the cluster-list is empty, a new cluster-list
is created. Using this attribute, a route reflector can identify if routing information is looped back to
the same cluster due to misconfiguration. If the local cluster ID is found in the cluster-list, the
advertisement is ignored.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfbgp.html
"Pass Any Exam. Any Time." - www.actualtests.com
180
181
182
183
184
The hop-count argument is set to number of hops that separate the local and remote peer. If the
expected TTL value in the IP packet header is 254, then the number 1 should be configured for
the hop-count argument. The range of values is a number from 1 to 254.
When this feature is enabled, BGP will accept incoming IP packets with a TTL value that is equal
to or greater than the expected TTL value. Packets that are not accepted are silently discarded.
The example configuration sets the expected incoming TTL value to at least 253, which is 255
minus the TTL value of 2, and this is the minimum TTL value expected from the BGP peer. The
local router will accept the peering session from the 10.1.1.1 neighbor only if it is 1 or 2 hops
away.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fs_btsh.html
"Pass Any Exam. Any Time." - www.actualtests.com
185
A tunnel is configured between R3 to R4 sourced with their loopback interfaces. The ip pim
sparse-dense mode command is configured on the tunnel interfaces and multicast-routing is
enabled on R3 and R4. The IP backbone is not configured for multicast routing.
186
187
188
189
190
191
192
If ISIS is configured utilizing default metrics, what is the cost for Router 4 to reach the 10.2.2.0/24
network?
A. 1
B. 20
C. 30
D. 63
Answer: C
Explanation:
By default, every link is an IS-IS network has a metric of 10.
193
Which three statements about this configuration are true? (Choose three.)
A. The default route appears in the global routing table.
B. The static route appears in the VRF red routing table.
C. The subnet 192.168.1.0 is unique to the VRF red routing table.
D. The static route is added to the global routing table and leaked from the VRF red.
E. The subnet 192.168.1.0 is unique to the global routing table.
F. 192.168.1.1 is reachable using any of the addresses on the router where the static route is
configured.
Answer: A,B,E
Explanation:
This is an example of the route leaking feature. Here, this static route is created for the red VRF so
it will be installed into the red VRF routing table, but the use of the global keyword will cause this
default route to appear in the global routing table.
194
Which route type is displayed when you enter the command show ip route supernets-only on a
device with this configuration?
A. Connected
B. OSPF
C. RIP
D. EIGRP
E. An empty route set
Answer: E
Explanation:
This command shows supernets only; it does not show subnets. In this case, the routing table
would contain the 10.0.0.0/24 subnet, but not the 10.0.0.0/8 supernet.
195
Which two routes are included in the route update? (Choose two.)
A. 10.3.0.0
B. 10.3.2.0
C. 10.3.4.0
D. 10.3.6.0
Answer: C,D
Explanation:
This access list will permit the 10.3.4.0, 10.3.5.0, 10.3.6.0, and 10.3.7.0 subnets.
196
Which statement configures the summarized route and provides equal-path route redundancy?
A. area 32 range 192.168.64.0 255.255.192.0 cost 100
B. area 32 range 192.168.64.0 255.255.63.0 cost 100
C. area 32 range 192.168.64.0 255.255.64.0 cost 100
D. area 32 range 192.168.64.0 255.255.192.0 multi-path
Answer: A
Explanation:
area range
To consolidate and summarize routes at an area boundary, use the area range command in
router configuration mode. To disable this function, use the no form of this command.
Syntax Description
area-id
Identifier of the area about which routes are to be summarized. It can be specified as either a
decimal value or as an IP address.
ip-address
IP address.
mask
IP address mask.
advertise
(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state
advertisement (LSA).
not-advertise
"Pass Any Exam. Any Time." - www.actualtests.com
197
Which two additions can you make to the router configuration to enable the packets to flow
correctly? (Choose two.)
A. Enable ip proxy-arp on the exiting interface.
B. Specify the next hop as an address.
C. Specify the next hop as an interface.
D. Add a match-any permit statement to the route map.
Answer: A,B
Explanation: Here is an example:
Router(config)#route-map Engineers permit 20
Router(config-route-map)#match ip address 2
Router(config-route-map)#set interface Ethernet1
Here, instead of specifying a next-hop, it specifies that any packets matching this rule will be
forwarded directly out the interface Ethernet1. This means that either the destination device must
be on this segment, or there must be a router configured with Proxy ARP that can forward the
packet to the ultimate destination.
198
199
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6bxe-3s-book/ip6-neighb-disc-xe.html
Answer:
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
200
Answer:
Explanation:
201
Answer:
Explanation:
202
Answer:
Explanation:
203
Answer:
Explanation:
204
Answer:
Explanation:
205
Answer:
Explanation:
206
Which action must you take to enable full reachability from router C to router D?
A. Build an OSPF virtual link.
B. Build an OSPF sham link.
"Pass Any Exam. Any Time." - www.actualtests.com
207
208
209
When the link between RtrB and RtrC goes down, multicast receivers stop receiving traffic from
the source for multicast group 229.1.1.1.Which solution will resolve this?
A. adding a static mroute on RtrB and RtrF
B. adding a static unicast route on RtrB and RtrF
C. creating a GRE tunnel between RtrB and RtrD
"Pass Any Exam. Any Time." - www.actualtests.com
210
211
212
213
Router Three is injecting external routes to 192.1.2.0/26 and 192.1.2.64/26 into EIGRP using the
redistribute connected command, as shown in the configurations below.
Router Three
interface Ethernet0
ip address 192.1.2.1 255.255.255.192
!
interface Ethernet1
ip address 192.1.2.65 255.255.255.192
!
interface Ethernet2
ip address 10.1.2.1 255.255.255.0
!router eigrp 2000
redistribute connected
network 10.0.0.0
default-metric 10000 1 255 1 1500
With this configuration on Router Three, the routing table on Router One shows:
214
215
How can the EIGRP hello and hold time for Gig0/0 be changed to 5 and 15?
A. No action is required, since Gig0/0 is not listed with a nondefault hello and hold time.
B. Add the commands ip hello-interval eigrp 1 5 and ip hold-time eigrp 1 15 under interface
Gig0/0.
C. Add the commands hello-interval 5 and hold-time 15 under "af-interface Gig0/0" under the
address family.
D. Add the commands default hello-interval and default hold-time under the af-interface Gig0/0
statement under the address family.
Answer: C
Explanation:
To configure the hello interval for an interface, use the hello-interval command in interface
configuration mode
To configure the hold time for an interface, use the hold-time command in interface configuration
mode
Reference. http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r41/routing/command/reference/b_routing_cr41crs/b_routing_cr41crs_chapter_010.html#wp232306
9468
216
217
218
219
220
221
222
After receiving the neighbor solicitation message, the destination node replies by sending a
neighbor advertisement message, which has a value of 136 in the Type field of the ICMP packet
header, on the local link. The source address in the neighbor advertisement message is the IPv6
address of the node (more specifically, the IPv6 address of the node interface) sending the
neighbor advertisement message. The destination address in the neighbor advertisement
message is the IPv6 address of the node that sent the neighbor solicitation message. The data
portion of the neighbor advertisement message includes the link-layer address of the node
sending the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node
can communicate.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6bxe-3s-book/ip6-neighb-disc-xe.html
223
224
Which two statements about this route table are true? (Choose two.)
A. The BGP routes are internal.
B. The OSPF routes with the E2 flag retain the same metric as they leave the router.
C. The OSPF routes with the IA flag have their administrative distances incremented as they leave
the router.
D. The BGP routes are external.
E. The OSPF routes with the E2 flag have their metrics incremented as they leave the router.
Answer: A,B
Explanation:
IBGP routes have an Administrative distance of 200, while EBGP have an AD of 20. Here we see
that the BGP routes have an AD value of 200.
With OSPF, external routes fall under two categories, external type 1 and external type 2. The
difference between the two is in the way the cost (metric) of the route is being calculated. The cost
of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A
type 1 cost is the addition of the external cost and the internal cost used to reach that route. The
metric for E2 routes do not change when advertising to other routers.
225
Which two statements about this configuration are true? (Choose two.)
A. It allows 172.16.0.0/16 to be distributed into EIGRP.
B. It allows a default route to be distributed into EIGRP.
C. It allows 172.16.0.0/16 and larger subnets to be distributed into EIGRP.
D. It prevents 172.16.0.0/16 from being distributed into EIGRP.
E. It prevents a default route from being distributed into EIGRP.
F. It creates summary routes and injects them into EIGRP.
Answer: A,B
Explanation:
In this example, the prefix list is configured to only allow the two specific routes of 172.16.0.0/16
and the default route. Any other routes will be filtered.
226
R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration
changes can you make to ensure that R1 can reach all routes from R2? (Choose two.)
A. Add an additional permit statement to the LOOPBACKS route map.
B. Modify the LOOPBACKS access list to include all loopback subnets.
C. Add an additional statement in the LOOPBACKS route map to match both Level 1 and Level 2
circuits.
D. Add an additional statement in the LOOPBACKS route map to match the R1 CLNS address.
E. Configure the interfaces between R1 and R2 with a Level 1 IS-IS circuit.
F. Configure the interfaces between R1 and R2 with a Level 2 IS-IS circuit.
Answer: A,B
Explanation:
In this example, the access list is using a 0.0.3.255 wildcard mask, so only the loopback IPs of
172.16.0.0 172.16.3.255 will be included. We need to add another statement to allow loopback 4
to be advertised, or modify the wildcard mask to include them all.
227
R1, R2, and R3 have full network connectivity to each other, but R2 prefers the path through R3 to
reach network 172.17.1.0/24. Which two actions can you take so that R2 prefers the path through
R1 to reach 172.17.1.0/24? (Choose two.)
A. Set the reference bandwidth to 10000 on R1, R2, and R3.
B. Configure the cost on the link between R1 and R3 to be greater than 100 Mbps.
C. Set the reference bandwidth on R2 only.
D. Configure a manual bandwidth statement with a value of 1 Gbps on the link between R1 and
R3.
E. Modify the cost on the link between R1 and R2 to be greater than 10 Gbps.
F. Configure a manual bandwidth statement with a value of 100 Mbps on the link between R1 and
R2.
Answer: A,B
Explanation:
By default, the reference bandwidth used in Cisco routers is 100Mbps, so FastEthernet and above
will have a cost of 1, so a gigabit interface and 10GE interface will be equal with a fastethernet.
This is not ideal. If we change the reference bandwidth to 100000 then the faster links will be
used. Changing the reference bandwidth needs to be done on all routers in the OSPF network.
Increasing the cost on the R1-R3 link will also cause the traffic to take the more direct route.
228
229
230
231
ASN 64523 has a multihomed BGP setup to ISP A and ISP B. Which BGP attribute can you set to
allow traffic that originates in ASN 64523 to exit the ASN through ISP B?
A. origin
"Pass Any Exam. Any Time." - www.actualtests.com
232
233
234
R1 and R2 have a working VRF-Lite configuration, but R1 is receiving a route only to 10.2.2.2 from
R2. Which two changes can you make so that R1 receives all routes from R2? (Choose two.)
"Pass Any Exam. Any Time." - www.actualtests.com
235
R2 is unable to access the 172.16.1.0/30 network between R1 and R3. Which option is a possible
reason for the failure?
236
Answer:
Explanation:
237
Answer:
Explanation:
238
Answer:
Explanation:
239
Answer:
240
Explanation:
241
242
243
244
Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A. The scope of the IPv6 multicast address is link-local.
B. The outgoing interface for the IPv6 multicast group should not be a tunnel interface.
C. The R-bit is set in the IPv6 address, but this is not an embedded RP multicast IPv6 address.
D. The S flag should not be set on a first-hop PIM router.
E. A multicast IPv6 address does not start with FF.
Answer: C
Explanation:
R bit: RP bit: R = 1 indicates the address embeds the address of the Rendezvous Point (RP). The
embedded RP address needs to begin with the prefix FF70::/12, But here we see that the address
is FF7E::1234.
245
246
Although reducing the EIGRP, IS-IS, and OSPF timers can result in minimum detection timer of
one to two seconds, BFD can provide failure detection in less than one second.
Because BFD is not tied to any particular routing protocol, it can be used as a generic and
consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
Because some parts of BFD can be distributed to the data plane, it can be less CPU-intensive
than the reduced EIGRP, IS-IS, and OSPF timers, which exist wholly at the control plane.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html
247
Which two options are possible states for the interface configured with the given OSPFv3
authentication? (Choose two.)
A. GOING UP
B. DOWN
C. UNCONFIGURED
D. GOING DOWN
Answer: A,B
Explanation:
To configure IPsec, you configure a security policy, which is a combination of the security policy
index (SPI) and the key (the key is used to create and validate the hash value). IPsec for OSPFv3
can be configured on an interface or on an OSPFv3 area. For higher security, you should
configure a different policy on each interface configured with IPsec. If you configure IPsec for an
OSPFv3 area, the policy is applied to all of the interfaces in that area, except for the interfaces that
have IPsec configured directly. Once IPsec is configured for OSPFv3, IPsec is invisible to you.
The secure socket API is used by applications to secure traffic. The API needs to allow the
application to open, listen, and close secure sockets. The binding between the application and the
secure socket layer also allows the secure socket layer to inform the application of changes to the
socket, such as connection open and close events. The secure socket API is able to identify the
socket; that is, it can identify the local and remote addresses, masks, ports, and protocol that carry
the traffic requiring security.
Each interface has a secure socket state, which can be one of the following:
"Pass Any Exam. Any Time." - www.actualtests.com
248
The device with this configuration is unable to reach network 172.31.31.0/24. The next hop router
has been verified to have full connectivity to the network. Which two actions can you take to
establish connectivity to the network? (Choose two.)
A. Create a static route to 172.16.199.0 using the address of the next hop router.
B. Create a default route to the link address of the next hop router.
C. Create a static route to the loopback address of the next hop router.
D. Create a default route to 172.16.199.9.
E. Modify the existing static route so that the next hop is 0.0.0.0.
F. Replace the ip default-network command with the ip default-gateway command.
Answer: A,B
Explanation:
Unlike the ip default-gateway command, you can use ip default-network when ip routing is enabled
on the Cisco router. When you configure ip default-network the router considers routes to that
network for installation as the gateway of last resort on the router.
For every network configured with ip default-network, if a router has a route to that network, that
route is flagged as a candidate default route. However, in this case if the router does not a route to
the drfault network of 172.16.199.9, then you would need to ensure that this route exisits by
creating a static route to 172.16.199.0 using the address of the next hop router, or simply create a
default route using the address of the next hop router.
249
All of the routers on this network are running RIP. If you edit the R3 RIP process configuration to
reduce the number of hops from R3 to R1, which statement about the configuration change is
true?
A. Configuring no passive-interface for GigabitEthernet0/0 in the R3 RIP process reduces the
"Pass Any Exam. Any Time." - www.actualtests.com
250
251
252
R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach R2. Which
three options are possible reasons for this behavior? (Choose three.)
A. R1 requires a seed metric to redistribute RIP.
B. The RIP version supports only classful subnet masks.
C. R1 is filtering OSPF routes when redistributing into RIP.
D. R3 and R1 have the same router ID.
E. R1 and R3 have an MTU mismatch.
F. R2 is configured to offset OSPF routes with a metric of 16.
Answer: A,C,F
Explanation:
A; RIP requires a seed metric to be specified when redistributing routes into that protocol. A seed
metric is a "starter metric" that gives the RIP process a metric it can work with. The OSPF metric
of cost is incomprehensible to RIP, since RIP's sole metric is hop count. We've got to give RIP a
metric it understands when redistributing routes into that protocol, so let's go back to R1 and do
so.
C. Filtering routes is another explanation, if the routes to R2 are boing filtered from being
advertised to R1.
F. If the metric is offset to 16, then the routes will have reached the maximum hop count when
redistributed to RIP. The max hop count for RIP is 16.
253
If the downstream router has a summary route configured, which two actions must you take on the
local router to create the summary route that summarizes all routes from the downstream router?
(Choose two.)
A. Configure the summary address on the interface.
B. Use 10.0.0.0 255.248.0.0 as the summary route.
C. Configure the summary address in the EIGRP process.
D. Use 10.0.0.0 255.252.0.0 as the summary route.
E. Configure a route map to permit the route.
F. Configure a distribute list in.
Answer: A,B
Explanation:
Route summarization works in conjunction with the ip summary-address eigrp interface
configuration command, in which additional summarization can be performed
To correctly summarize all the networks shown, the correct route to use is 10.0.0.0 255.248.0.0
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfeigrp.html
254
255
256
257
258
If OSPF is implemented on the network, which additional configuration is needed to allow traffic
from host 10.4.1.15/24 to host 10.1.2.20/24?
A. A virtual link between router 2 and router 4
B. A virtual link between router 3 and router 4
C. A virtual link between router 2 and router 3
D. The current design allows traffic between the two hosts.
Answer: D
Explanation: This specific traffic from 10.4.1.0/24 to 10.1.2.0/24 would work because this traffic
crosses only over the single OSPF area of 0.0.0.1.
However, traffic from hosts on R4 to R1 would indeed need a virtual link, since area 0.0.0.2 is not
connected to the backbone area of 0.0.0.0.
259
260
R1 is configured as shown. R1 is able to establish a neighbor adjacency only with R2. Which
addition must you make to the R1 configuration to allow it to establish an adjacency with R3?
A. interface gigabitethernet 0/1
ip address 10.1.0.1 255.255.255.0
ip ospf network point-to-point
B. interface gigabitethernet 0/1
ip address 10.1.0.1 255.255.255.0
ip ospf 1 area 0
C. router ospf 1
network 10.1.0.0 0.0.0.255 area 1
D. router ospf 1
261
262
263
264
265
How can Router X in AS70000 peer with Router Y in AS65000, in case Router Y supports only 2byte ASNs?
A. Router X should be configured with a remove-private-as command, because this will establish
the peering session with a random private 2-byte ASN.
B. It is not possible. Router Y must be upgraded to an image that supports 4-byte ASN.
C. Router Y should be configured with a 4-byte AS using the local-as command.
D. Router X should be configured with a 2-byte AS using the local-as command.
Answer: D
Explanation:
Since router Y does not support 4-byte ASN,s it will not understand any AS numbers larger than
65535, so router X should use the local-as command on the peering statement to router Y to so
that it sends in a 2-byte ASN to router Y.
266
267
268
Attached bitSet by a Level 1/Level 2 router in its own Level 1 LSP and used to indicate to all
Level 1 routers (within the area) that this router is a potential exit point of the area. Level 1-only
routers will default to the nearest attached Level 2 router.
Default information originateCan be configured in Level 1 as well as Level 2. The default route
(0.0.0.0/0) is inserted in the router LSP (Level 1 or Level 2, according to the configuration
command) and the LSP is flooded according to the router type (Level 1 or Level 2). A Level 2
router doesn't need to have a default route to originate a default route.
Reference.
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
269
Answer:
Explanation:
270
271
Answer:
Explanation:
272
273
Answer:
Explanation:
Well Known Mandatory Attribute
AS_Path
Origin
Well Known Discretionary Attribute
Local Preference
Optional Transitive
Community
274
Reference. http://www.deepsh.it/networking/BGP/bgp-attributes.png
275
R3 is failing to join the multicast group 224.1.1.1 that is sourcing from R1. Which two actions can
you take to allow multicast traffic to flow correctly? (Choose two.)
A. Remove the static multicast route on R1.
B. Configure OSPF on R1 and R3 to include the tunnel interfaces.
C. Add an additional static multicast route on R2 for multicast group 224.1.1.1 toward R3.
D. Replace the static multicast route on R1 to send traffic toward R2.
E. Remove the static unicast route on R1.
F. Add an additional static unicast route on R2 toward the loopback interface of R3.
Answer: A,B
Explanation:
Since the tunnel interfaces are not part of OSPF, the best path to the multicast source of R1 from
R3 would be over the Gi0/0 path via OSPF. However, the static mroute is configured to use the
tunnel, so this causes an RPF failure used in Sparse Mode. Best fix is to add the tunnel interfaces
into OSPF and remove the static mroute so that that the RPF check no longer fails.
276
277
RIPv2 authentication is failing on a device with this configuration. Which two actions can you take
to enable it? (Choose two.)
A. Set the RIP authentication mode to text.
B. Set the RIP authentication mode to MD5.
"Pass Any Exam. Any Time." - www.actualtests.com
278
279
280
Route exchange is failing on a PE edge device configured with this VRF-Lite. Which action can
you take to correct the problem?
A. Configure the vrf-lite capability under the OSPF address families.
B. Correct the route descriptors.
C. Correct the OSPF router-ids.
D. Configure the control plane with a larger memory allocation to allow the device to appear in the
routing table.
Answer: A
Explanation:
281
282
283
284
Since the path through Router Three is three hops, and the path through Router One is two hops,
Router Two chooses the path through One and discards the information it learned through Three.
If the path between Router One and Network A goes down, Router Two loses all connectivity with
"Pass Any Exam. Any Time." - www.actualtests.com
285
286
R1 is connected to ISP1 and ISP2 and each router is in a different AS (Autonomous System).
Since R1 is multi-homed its possible that the ISPs will use R1 to reach each other. In order to
prevent this well have to ensure that R1 only advertises prefixes from its own autonomous
system.
As far as I know there are 4 methods how you can prevent becoming a transit AS:
Reference: http://networklessons.com/bgp/bgp-prevent-transit-as/
287
288
289
290
291
Answer:
Explanation:
292
Answer:
Explanation:
293
Answer:
294
Explanation:
295
Explanation:
296
Answer:
Explanation:
297
Answer:
Explanation:
298
Answer:
Explanation:
299
Answer:
Explanation:
300
301
302
303
304
305
What is wrong with the configuration of the tunnel interface of this DMVPN Phase II spoke router?
A. The interface MTU is too high.
"Pass Any Exam. Any Time." - www.actualtests.com
306
307
308
Which statement is true about a VPNv4 prefix that is present in the routing table of vrf one and is
advertised from this router?
309
310
A spoke site that is connected to Router-A cannot reach a spoke site that is connected to RouterB, but both spoke sites can reach the hub. What is the likely cause of this issue?
A. There is a router doing PAT at site B.
B. There is a router doing PAT at site A.
C. NHRP is learning the IP address of the remote spoke site as a /32 address rather than a /24
address.
D. There is a routing issue, as NHRP registration is working.
311
312
313
Which two options describe possible causes of the error? (Choose two.)
A. Incorrect destination IP addresses are configured on the tunnel.
B. There is link flapping on the tunnel.
C. There is instability in the network due to route flapping.
D. The tunnel mode and tunnel IP address are misconfigured.
E. The tunnel destination is being routed out of the tunnel interface.
Answer: C,E
Explanation:
The %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing error
message means that the generic routing encapsulation (GRE) tunnel router has discovered a
recursive routing problem. This condition is usually due to one of these causes:
Reference. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routingprotocol-eigrp/22327-gre-flap.html
314
315
316
317
318
VC 101 has been assigned a preferred path called Tunnel1. The default path is disabled because
the preferred path specified that the default path should not be used if the preferred path fails.
VC 150 has been assigned an IP address of a loopback address on PE2. The default path can be
used if the preferred path fails.
Router# show mpls l2transport vc detail
Local interfacE. Gi0/0/0.1 up, line protocol up, Eth VLAN 222 up
Destination address: 10.16.16.16, VC ID. 101, VC status: up
Preferred path: Tunnel1, active
Default path: disabled
Tunnel label: 3, next hop point2point
Output interfacE. Tu1, imposed label stack {17 16}
Create timE. 00:27:31, last status change timE. 00:27:31
Signaling protocol: LDP, peer 10.16.16.16:0 up
MPLS VC labels: local 25, remote 16
Group ID. local 0, remote 6
MTU: local 1500, remote 1500
Remote interface description:
Sequencing: receive disabled, send disabled
VC statistics:
packet totals: receive 10, send 10
byte totals: receive 1260, send 1300
packet drops: receive 0, send 0
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srtunsel.html#wp1057815
319
320
321
Which two corrective actions could you take if EIGRP routes from R2 fail to reach R1? (Choose
two.)
A. Configure R2 to use a VRF to send routes to R1.
B. Configure the autonomous system in the EIGRP configuration of R1.
C. Correct the network statement on R2.
D. Add the interface on R1 that is connected to R2 into a VRF.
Answer: B,D
Explanation:
322
323
324
325
326
327
328
329
Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway
Protocol (MP-BGP)
A PE router binds a label to each customer prefix learned from a CE router and includes the label
in the network reachability information for the prefix that it advertises to other PE routers. When a
PE router forwards a packet received from a CE router across the provider network, it labels the
packet with the label learned from the destination PE router. When the destination PE router
receives the labeled packet, it pops the label and uses it to direct the packet to the correct CE
router. Label forwarding across the provider backbone is based on either dynamic label switching
or traffic engineered paths. A customer data packet carries two levels of labels when traversing
the backbone
Reference. http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r42/lxvpn/configuration/guide/vcasr9kv342/vcasr9k42v3.html
330
authoritativeIndicates that the NHRP information was obtained from the Next Hop Server or
router that maintains the NBMA-to-IP address mapping for a particular destination.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html
331
332
333
334
335
If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions
must you take to enable encryption? (Choose two).
A. Configure the transform-set on R2 to match the configuration on R1.
B. Configure the crypto map on R2 to include the correct subnet.
C. Configure the ISAKMP policy names to match on R1 and R2.
D. Configure the crypto map names to match on R1 and R2.
E. Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2.
Answer: A,B
336
Answer:
Explanation:
337
Which statement is true about a valid IPv6 address that can be configured on interface tunnel0?
A. There is not enough information to calculate the IPv6 address.
B. 6to4 tunneling allows you to use any IPv6 address.
C. 2001.:7DCB.:5901.::/128 is a valid IPv6 address.
D. 2002: 7DCB. 5901. ::/128 is a valid IPv6 address.
Answer: D
Explanation:
Most IPv6 networks use autoconfiguration, which requires the last 64 bits for the host. The first 64
bits are the IPv6 prefix. The first 16 bits of the prefix are always 2002:, the next 32 bits are the
IPv4 address, and the last 16 bits of the prefix are available for addressing multiple IPv6 subnets
behind the same 6to4 router. Since the IPv6 hosts using autoconfiguration already have
determined the unique 64 bit host portion of their address, they must simply wait for a Router
Advertisement indicating the first 64 bits of prefix to have a complete IPv6 address. A 6to4 router
will know to send an encapsulated packet directly over IPv4 if the first 16 bits are 2002, using the
next 32 as the destination, or otherwise send the packet to a well-known relay server, which has
access to native IPv6.
Reference. http://en.wikipedia.org/wiki/6to4
338
339
340
341
Which LISP component do routers in the public IP network use to forward traffic between the two
networks?
A. EID
B. RLOC
C. map server
D. map resolver
Answer: B
Explanation:
Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the
use of two namespaces instead of a single IP address:
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/15-mt/irl15-mt-book/irl-overview.html
342
343
344
fvrf-name(Optional) Front door virtual routing and forwarding (FVRF) name to which the keyring
will be referenced. fvrf-name must match the FVRF name that was defined during virtual routing
and forwarding (VRF) configuration
ICMP unreachable messages sent back to the L2TPv3 router are deciphered and the tunnel MTU
is updated accordingly. In order to receive ICMP unreachable messages for fragmentation errors,
the DF bit in the tunnel header is set according to the DF bit value received from the CE, or
statically if the ip dfbit set option is enabled. The tunnel MTU is periodically reset to the default
value based on a periodic timer.
ICMP unreachable messages are sent back to the clients on the CE side. ICMP unreachable
messages are sent to the CE whenever IP packets arrive on the CE-PE interface and have a
packet size greater than the tunnel MTU. A Layer 2 header calculation is performed before the
ICMP unreachable message is sent to the CE.
Reference. http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/l2tpv325.html
347
Explanation:
348
349
350
351
Configure Triple DES (3DES) or AES for encryption of transported data (exports of
encryption algorithms to certain countries may be prohibited by law).
Implement Dead Peer Detection (DPD) on the spokes to detect loss of communication
between peers.
Deploy hardware-acceleration of IPsec to minimize router CPU overhead, to support traffic with
low latency and jitter requirements, and for the highest performance for cost.
Keep IPsec packet fragmentation to a minimum on the customer network by setting MTU size or
using Path MTU Discovery (PMTUD).
Use Digital Certificates/Public Key Infrastructure (PKI) for scalable tunnel authentication.
Configure a routing protocol (for example, EIGRP, BGP or OSPF) with route summarization for
dynamic routing.
Set up QoS service policies as appropriate on headend and branch router interfaces to help
alleviate interface congestion issues and to attempt to keep higher priority traffic from being
dropped during times of congestion.
Reference.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMVPN_1.h
tml
352
353
354
355
356
Answer:
Explanation:
357
358
Explanation:
359
360
The spokes of the DMVPN with the given configuration are having QoS issues.
Which two actions can you take to resolve the problem? (Choose two.)
A. Configure qos pre-classify on the tunnel interface.
B. Configure an NHRP group on the tunnel interface and associate it to a QoS policy.
C. Modify the configuration of the IPsec policy to accept QoS policies.
D. Manually configure a QoS policy on the serial interface.
E. Configure the bandwidth statement on the tunnel interface.
F. Configure the bandwidth statement on the serial interface.
Answer: A,B
Explanation:
It is possible to classify based on information that is encrypted, which is needed in this example.
You can use an access-list, configured to match the private subnet behind the remote spoke. The
qos pre-classify command is used on the tunnel interface, and is required because the traffic is
classified by a parameter that is encrypted as the traffic leaves the physical outbound interface. L4
information from the IP data packet can also classify traffic destined to the same private subnet.
The nhrp map group group-name service-policy output parent-policy-name command adds
361
Route distinguishers
Extended community
MP-BGP
362
Which three statements about the R1 configuration are true? (Choose three.)
A. The virtual circuit identifier is 1611 and the virtual circuit is down.
B. The local label for the circuit is 4006.
C. The targeted LDP session to the remote peer is up.
D. The local label for the circuit is 1611.
E. The virtual circuit identifier is 4006 and the virtual circuit is down.
F. The circuit is using MPLS VC type 4.
Answer: A,B,C
Explanation:
The number after the vc is the identifier, which is 1611 in this case. Here, the VC status is shown
as down.
As shown, the MPLS VC labels: local 4006, remote unassigned shows the local label used is
4006.
The targeted LDP session is up as verified by the Signalling protocol: LDP, peer 172.16.12.70 up
statement in the output.
363
Answer:
364
Explanation:
365
Answer:
Explanation:
366
Which action will solve the error state of this interface when connecting a host behind a Cisco IP
phone?
A. Configure dot1x-port control auto on this interface
B. Enable errdisable recovery for security violation errors
C. Enable port security on this interface
D. Configure multidomain authentication on this interface
Answer: D
Explanation:
In single-host mode, a security violation is triggered when more than one device are detected on
the data vlan. In multidomain authentication mode, a security violation is triggered when more than
one device are detected on the data or voice VLAN. Here we see that single host mode is being
used, not multidomain mode.
Reference. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/50sg/configuration/guide/Wrapper-46SG/dot1x.html#wp1309041
367
368
Why is the router not accessible via Telnet on the GigabitEthernet0 management interface?
A. The wrong port is being used in the telnet-acl access list.
B. The subnet mask is incorrect in the telnet-acl access list.
C. The log keyword needs to be removed from the telnet-acl access list..
D. The access class needs to have the vrf-also keyword added.
Answer: D
Explanation:
The correct command should be access-class telnet-acl in vrf-also. If you do not specify the vrfalso keyword, incoming Telnet connections from interfaces that are part of a VRF are rejected.
369
370
Which two statements about how the configuration processes Telnet traffic are true? (Choose
two.)
A. Telnet traffic from 10.1.1.9 to 10.10.10.1 is dropped.
B. All Telnet traffic is dropped.
C. Telnet traffic from 10.10.10.1 to 10.1.1.9 is permitted.
D. Telnet traffic from 10.1.1.9 to 10.10.10.1 is permitted.
E. Telnet traffic is permitted to all IP addresses.
Answer: A,C
Explanation:
The ACL applied to the COPP policy matches only telnet traffic from 10.1.1.9 to 10.10.10.1, all
other telnet traffic is not matched and therefore not used in the COPP policy, which means this
traffic will be handled normally (accepted). For telnet traffic from 10.1.1.9 to 10.10.10.1, the COPP
policy has defined this traffic as an exceed, and dropped.
371
372
While configuring AAA with a local database, users can log in via Telnet, but receive the message
"error in authentication" when they try to go into enable mode. Which action can solve this
problem?
A. Configure authorization to allow the enable command.
B. Use aaa authentication login default enable to allow authentication when using the enable
command.
C. Verify whether an enable password has been configured.
D. Use aaa authentication enable default enable to allow authentication when using the enable
command.
Answer: C
Explanation:
If a different enable password is configured, it will override the privilege level 15 of that user and
force the existing password to be used for enable access.
373
Answer:
Explanation:
374
Answer:
Explanation:
375
376
377
An IPv4 packet must be received at an interface with the best return path (route) to the packet
source (a process called symmetric routing). There must be a route in the Forwarding Information
Base (FIB) that matches the route to the receiving interface. Adding a route in the FIB can be done
via static route, network statement, or dynamic routing.
IPv4 source addresses at the receiving interface must match the routing entry for the interface.
References:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfrpf.html
http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/srpf_gsr.html
378
Answer:
Explanation:
379
380
381
382
383
384
Answer:
Explanation:
385
386
Answer:
387
Explanation:
388
Which two configuration changes enable the user admin to log in to the device? (Choose two.)
A. Configure the login authentication to be case-insensitive.
B. Configure the user admin with a password and appropriate privileges.
C. Configure the login authentication to be case-sensitive.
D. Modify the configuration to use a named group.
E. Configure additional login authentication under the terminal lines.
Answer: A,B
Explanation:
Usernames and passwords are case-sensitive. Users attempting to log in with an incorrectly cased
username or password will be rejected. If users are unable to log into the router with their specific
passwords, reconfigure the username and password on the router.
Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-releases110/45843-configpasswords.html
389
protectDrops packets with unknown source addresses until you remove a sufficient number of
secure MAC addresses to drop below the maximum value.
restrictDrops packets with unknown source addresses until you remove a sufficient number of
secure MAC addresses to drop below the maximum value and causes the SecurityViolation
counter to increment.
shutdownPuts the interface into the error-disabled state immediately and sends an SNMP trap
notification.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/122SX/configuration/guide/book/port_sec.html
390
Which configuration is missing that would enable SSH access on a router that is running Cisco
IOS XE Software?
A. int Gig0/0/0
management-interface
B. class-map ssh-class
match access-group protect-ssh
policy-map control-plane-in
class ssh-class
police 80000 conform transmit exceed drop
control-plane
service-policy input control-plane-in
C. control-plane host
management-interface GigabitEthernet0/0/0 allow ssh
D. interface Gig0/0/0
ip access-group protect-ssh in
Answer: C
Explanation:
The feature Management Plane Protection (MPP) allows an administrator to restrict on which
interfaces management traffic can be received by a device. This allows the administrator
additional control over a device and how the device is accessed.
391
392
393
394
395
396
397
398
399
You discover that only 1.5 Mb/s of web traffic can pass during times of congestion on the given
network.
Which two options are possible reasons for this limitation? (Choose two.)
A. The web traffic class has too little bandwidth reservation.
B. Video traffic is using too much bandwidth.
C. The service-policy is on the wrong interface.
D. The service-policy is going in the wrong direction.
"Pass Any Exam. Any Time." - www.actualtests.com
400
401
402
4. Now that weve generated the key, our next step would be to configure our vty lines for SSH
access and specify which database we are going to use to provide authentication to the device.
The local database on the router will do just fine for this example.
LabRouter(config)#line vty 0 4LabRouter(config-line)#login localLabRouter(config-line)#transport
input ssh
5. You will need to create an account on the local routers database to be used for authenticating
to the device. This can be accomplished with these commands.
LabRouter(config)#username XXXX privilege 15 secret XXXX
Reference. http://blog.pluralsight.com/configure-secure-shell-ssh-on-cisco-router
403
Which two statements about the EEM applet configuration are true? (Choose two.)
A. The EEM applet runs before the CLI command is executed.
B. The EEM applet runs after the CLI command is executed.
C. The EEM applet requires a case-insensitive response.
D. The running configuration is displayed only if the letter Y is entered at the CLI.
Answer: A,D
Explanation:
sync
Indicates whether the policy should be executed synchronously before the CLI command
executes.
nocase
(Optional) Specifies case insensitive comparison.
Here we see that the sync knob was enabled so A is correct. However, C is not correct as the
nocase argument was not used, so the applet is configured to display the config only if a capital Y
is issued.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cra2.html
404
405
Which two statements about the output are true? (Choose two.)
A. It indicates that prefix aggregation cache export is enabled on the device.
B. It was obtained with the show ip cache flow command.
C. It indicates that the device is using NetFlow version 5.
D. It indicates that the flows are being sent to a destination using an RFC1918 address.
Answer: C,D
Explanation:
C. The fourth line shows that Version 5 is being used.
D. The third line shows that the destination server is 10.5.206.250, which of course is a private,
RFC 1918 address.
406
407
408
A PE router is configured with a policy map that contains the policer shown. The policy map is
configured in the inbound direction of an interface facing a CE router. If the PE router receives
12Mb/s of traffic with the CoS value set to 7 on a 100-Mb/s interface from the CE router, what
value of MPLS EXP is set when this traffic goes through the policer shown?
A. 0
B. 6
C. 7
D. 8
Answer: B
Explanation:
Here, the policer is set where the conforming traffic is set to 10 percent of the 100 Mbps interface,
so anything more than 10 Mbps will be placed into the exceeding traffic class, the traffic EXP value
"Pass Any Exam. Any Time." - www.actualtests.com
409
Answer:
Explanation:
410
Answer:
Explanation:
411
Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
412
413
414
415
416
Response time (round-trip time) is computed by measuring the time taken between sending a
UDP echo request message from Device B to the destination device--Device A--and receiving a
UDP echo reply from Device A. UDP echo accuracy is enhanced by using the IP SLAs Responder
at Device A, the destination Cisco device. If the destination device is a Cisco device, then IP SLAs
sends a UDP datagram to any port number that you specified. Using the IP SLAs Responder is
optional for a UDP echo operation when using Cisco devices. The IP SLAs Responder cannot be
configured on non-Cisco devices.
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mtbook/sla_udp_echo.html
417
Router 1 and Router 2 use HSRP to provide first hop redundancy for hosts on the 10.1.2.0/24
network.
Which feature can provide additional failover coverage for the PC?
A. Cisco Express Forwarding
B. NetFlow
C. Accounting
D. Enhanced Object Tracking
Answer: D
Explanation:
HSRP has a mechanism for tracking the interface line-protocol state. The enhanced object
tracking feature separates the tracking mechanism from HSRP. It creates a separate, standalone
tracking process that can be used by processes other than HSRP. This feature allows tracking of
other objects in addition to the interface line-protocol state. A client process, such as HSRP, can
register an interest in tracking objects and request notification when the tracked object changes
state. Several clients can track the same object, and can take different actions when the object
changes state. This feature increases the availability and speed of recovery of a router system and
decreases outages and outage duration
Reference. http://www.cisco.com/c/en/us/td/docs/switches/blades/3040/software/release/122_44_se/configuration/guide/swhsrp.html#wp1083927
418
Which two possible network conditions can you infer from this configuration? (Choose two.)
A. The authentication parameters on R1 and R2 are mismatched.
B. R1 is using the default NTP source configuration.
C. R1 and R2 have established an NTP session.
D. R2 is configured as the NTP master with a stratum of 7.
Answer: A,B
Explanation:
Answer A. The NTP associations are not synced, it is only listed as a candidate because it was
configured. Routing is not the issue, so it must be mismatched authentication parameters.
Answer B. NTP sets the source IP address for all NTP packets based on the address of the
interface through which the NTP packets are sent. You can configure NTP to use a specific source
IP address.
419
420
421
Answer:
Explanation:
422
Reference. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-embeddedevent-managereem/config_guide_eem_configuration_for_cisco_integrated_services_router_platforms.html
423
424
425
If you set the configuration register boot field value to 0x0, you must boot the operating system
manually with the boot command.
If you set the configuration register boot field value to 0x1, the router boots using the default ROM
software.
If you set the configuration register boot field to any value from 0x2 to 0xF, the router uses the
boot field value to form a default boot filename for booting from a network server.
For more information about the configuration register bit settings and default filenames, refer to the
appropriate router hardware installation guide.
Reference.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/command/reference/ffun_r/frf010.html
426
You are configuring the S1 switch for the switchport connecting to the client computer. Which
option describes the effect of the command mls qos map cos-dscp 0 8 16 24 32 40 46 56?
A. Voice traffic is excluded from the default priority queue.
B. Voice packets are given a class selector of 5.
C. Video conferencing is marked CS3.
D. Voice packets are processed in the priority queue.
Answer: A
Explanation:
The default CoS to DSCP mappings are shown below:
Default CoS-to-DSCP Map
CoS Value
DSCP Value
0
0
1
8
2
16
3
24
4
32
5
40
6
48
7
56
In our example, we see that COS 6 is mapped to DSCP, not the default of DSCP 48 as shown
427
If the network switch is configured as shown, which two statements about network traffic are true?
(Choose two.)
"Pass Any Exam. Any Time." - www.actualtests.com
428
429
430
Which additional information must you specify in this configuration to capture NetFlow traffic?
A. ingress or egress traffic
B. the number of cache entries
C. the flow cache active timeout
D. the flow cache inactive timeout
Answer: A
Explanation:
Configuring NetFlow
Perform the following task to enable NetFlow on an interface.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
interface type number
4.
ip flow {ingress | egress}
5.
exit
6.
Repeat Steps 3 through 5 to enable NetFlow on other interfaces.
7.
end
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
"Pass Any Exam. Any Time." - www.actualtests.com
Example:
431
432
Answer:
433
Answer:
Explanation:
434
435
436
437
Error messages about software or hardware malfunctions, displayed at levels warnings through
emergencies. These types of messages mean that the functionality of the switch is affected. For
information on how to recover from these malfunctions, see the system message guide for this
release.
Output from the debug commands, displayed at the debugging level. Debug commands are
typically used only by the Technical Assistance Center.
Reload requests and low-process stack messages, displayed at the informational level. This
message is only for information; switch functionality is not affected.
References: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12"Pass Any Exam. Any Time." - www.actualtests.com
438
1_9_ea1/configuration/guide/scg/swlog.html
If the remaining configuration uses default values, what is the expected output of the show mls qos
queue-set command?
A)
B)
439
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Answer: A
Explanation:
mls qos queue-set output qset-idthreshold queue-id drop-threshold1 drop-threshold2 reservedthreshold maximum-threshold
Configure the WTD thresholds, guarantee the availability of buffers, and configure the maximum
memory allocation for the queue-set (four egress queues per port).
By default, the WTD thresholds for queues 1, 3, and 4 are set to 100 percent. The thresholds for
queue 2 are set to 200 percent. The reserved thresholds for queues 1, 2, 3, and 4 are set to 50
percent. The maximum thresholds for all queues are set to 400 percent.
Reference.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12"Pass Any Exam. Any Time." - www.actualtests.com
440
441
Reference. http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/15mt/dhcp-15-mt-book/config-dhcp-server.html
442
If router R1 is functioning as a DHCPv6 server and you enter the command show ipv6 dhcp
binding, which two options are pieces of information in the output? (Choose two.)
A. The IA PD
B. The DUID
C. The prefix pool
D. The DNS server
E. The Rapid-Commit setting
Answer: A,B
Explanation:
In the following example, the show ipv6 dhcp binding command shows information about two
clients, including their DUIDs, IAPDs, prefixes, and preferred and valid lifetimes:
Router# show ipv6 dhcp binding
Client: FE80::202:FCFF:FEA5:DC39 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5DC1C
IA PD. IA ID 0x00040001, T1 0, T2 0
Prefix: 3FFE:C00:C18:11::/68
preferred lifetime 180, valid lifetime 12345
expires at Nov 08 2002 02:24 PM (12320 seconds)
Client: FE80::202:FCFF:FEA5:C039 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5C01C
IA PD. IA ID 0x00040001, T1 0, T2 0
443
444
445
446
Answer:
Explanation:
447
448
449
450
451
If the route to 10.1.1.1 is removed from the R2 routing table, which server becomes the master
NTP server?
A. R2
B. the NTP server at 10.3.3.3
C. the NTP server at 10.4.4.4
D. the NTP server with the lowest stratum number
Answer: D
Explanation:
NTP uses a concept called stratum that defines how many NTP hops away a device is from an
authoritative time source. For example, a device with stratum 1 is a very accurate device and
might have an atomic clock attached to it. Another NTP server that is using this stratum 1 server to
sync its own time would be a stratum 2 device because its one NTP hop further away from the
source. When you configure multiple NTP servers, the client will prefer the NTP server with the
lowest stratum value.
Reference: https://networklessons.com/network-services/cisco-network-time-protocol-ntp/
452
Which feature can R1 use to fail over from R2 to R3 if the address for R2 becomes unavailable?
A. object tracking
B. HSRP
C. GLBP
D. LACP
Answer: A
Explanation: The object tracking feature allows you to create a tracked object that multiple clients
can use to modify the client behavior when a tracked object changes. Several clients register their
interest with the tracking process, track the same object, and take different actions when the
object state changes.
Clients include the following features:
Which two options are effects of the given configuration? (Choose two.)
A. It sets the data export destination to 209.165.200.227 on UDP port 49152.
B. It enables Cisco Express Forwarding on interface FastEthernet0/0.
C. It configures the export process to include the BGP peer AS of the router gathering the data.
D. It enables NetFlow switching on interface FastEthernet0/0.
E. It sets the data export destination to 209.165.200.227 on TCP port 49152.
Answer: A,D
Explanation: The ip flow-export destination 209.165.200.227 49152 command specifies that the
data export destination server is 209.165.200.227 using UDP port 49152.
The ip route-cache flow command under the fastethernet 0/0 interface enable netflow switching
on that interface.
454
455
456
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/15-mt/eem-15-mtbook/eem-overview.html
457
You are configuring the S1 switch for the switch port that connects to the client computer. Which
configuration blocks users on the port from using more than 6 Mbps of traffic and marks the traffic
for a class of service of 1?
A)
B)
C)
458
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Answer: A
Explanation:
Only option A specified that the exceed and violate actions are set to drop for traffic over the CIR
of 6 Mbps, and is also configured to set all traffic with a COS of 1 using the set cos1 command.
459
460
461
462
463
464
465
Which two statements about the R1 configuration are true? (Choose two.)
A. The IP TTL value is copied to the MPLS field during label imposition.
B. The structure of the MLPS network is hidden in a traceroute.
C. The LDP session interval and hold times are configured for directly connected neighbors.
D. R1 protects the session for 86400 seconds.
E. All locally assigned labels are discarded.
Answer: B,D
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
466
467
468
This network is configured with PIM, and the RPF check has failed toward the multicast source.
Which two configuration changes must you make to router R3 to enable the RPF check to pass?
(Choose two.)
A. Configure a static multicast route to the multicast source through the tunnel interface.
B. Configure a static multicast route to the multicast source LAN through the tunnel interface.
C. Configure a static multicast route to the multicast source LAN through the Ethernet interface.
D. Remove the command ip prim bidir-enable from the R3 configuration.
Answer: A,B
Explanation:
469
470
471
472
Which two configuration changes enable you to log in to the router? (Choose two.)
A. Configure a user name and password on the device.
B. Modify the default login authentication group to use the terminal line password.
C. Remove the terminal line password on the console line.
D. Modify the terminal lines to include transport input none.
E. Configure the terminal lines to use the local user database.
Answer: A,B
Explanation:
473
474
475
476
Which BGP feature allows R1 to send R2 a list of prefixes that R2 is prevented from advertising to
R1?
A. route refresh
B. Prefix-Based Outbound Route Filtering
C. distribute lists
D. prefix lists
Answer: B
Explanation:
477
478
Which two issues can cause the interface VLAN10 to be down/down? (Choose two.)
A. The VLAN is inactive or has been removed from the VLAN database.
B. STP is in a forwarding state on the port.
C. A Layer 2 access port is configured with VLAN10, but is in a down/down state.
D. The autostate exclude feature was used on interface VLAN10.
Answer: A,C
Explanation:
479
Which two statements about this configuration are true? (Choose two.)
A. Pings from SW2 to SW1 fail because SW1 is pruning VLAN 10.
B. VLANs 10 and 200 are added to the SW2 allowed list on interface fa0/22.
C. Pings from SW2 to SW1 are successful.
D. Only VLAN 200 is added to the SW1 allowed list on interface fa0/22.
Answer: B,C
Explanation:
Which two conditions can cause this error message to be displayed on the console? (Choose
two.)
A. The EtherChannel is configured as desirable on both ends.
"Pass Any Exam. Any Time." - www.actualtests.com
480
481
482
483
484
Which command can you enter to resolve this error message on a peer router?
A. username <username> password <password>
"Pass Any Exam. Any Time." - www.actualtests.com
485
R2 is configured as the R1 neighbor in area 51, but R2 fails to receive the configured summary
route. Which action can you take to correct the problem?
A. Replace the summary-address command with the area-range command.
B. Configure a summary address under R1interface GigabitEthernet0/0.
C. Configure a summary address under R1 interface GigabitEthernet1/0.
D. Configure the no discard-route command in the OSPF process of R1.
E. Configure ip ospf network broadcast under the Loopback0 interface of R1.
Answer: A
Explanation:
486
487
488
489
You are bringing a new MPLS router online and have configured only what is shown to bring LDP
up. Assume that the peer has been configured in a similar manner. You verify the LDP peer state
and see that there are no neighbors. What will the output of show mpls ldp discovery show?
A. Interfaces:
Ethernet0/0 (ldp): xmit
B. Interfaces:
"Pass Any Exam. Any Time." - www.actualtests.com
490
491
Which two commands are required on R3 in order for MPLS to function? (Choose two.)
A. mpls ip
B. ip cef
C. mpls label protocol tdp
D. mpls ip propagate-ttl
Answer: A,B
Explanation:
492
493
494
The customer wants to use IP SLA to create a failover to ISP2 when both Ethernet connections to
ISP1 are down. The customer also requires that both connections to ISP1 are utilized during
normal operations.
Which IP route configuration accomplishes these requirements for the customer?
A. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 3
B. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 2
ip route 0.0.0.0 0.0.0.0 192.168.2.1 track 4 100
C. ip route 0.0.0.0 0.0.0.0 192.168.0.1 track 1
"Pass Any Exam. Any Time." - www.actualtests.com
495
496
Answer:
Explanation:
497
Answer:
498
Explanation:
499
Answer:
Explanation:
500
Answer:
Explanation:
501
Answer:
Explanation:
502
Answer:
503
Explanation:
504
Answer:
Explanation:
505
Answer:
Explanation:
506
Answer:
Explanation:
507
508