300-410 VOL2 Flashcards
In a typical MPLS VPN, routers act as the MPLS label imposition and disposition points in
the network?
C. PE Router
In an MPLS network, which of the following describes the role of the Provider (P) router?
B. To connect to PE routers and act as transit routers
The MPLS LDP autoconfiguration feature allows you to enable LDP on every interface that is
associated with an IGP instance. Which of the following Interior Gateway Protocols support this?
(Choose two)
A. OSPF
B. IS-IS
In an MPLS VPN network, how are customer routes controlled and distributed?
D. It is distributed through the use of route targets
At which layer of the OSI model is an MPLS label imposed?
C. Between layers 2 and 3
Which of the following are valid IPv6 Router Advertisement (RA) Guard modes? (Select two)
B. Host mode
C. Router mode
Which of the following statements are true regarding the e IPv6 RA Guard feature?
B. This feature is supported on private VLANs
Unicast Reverse Path Forwarding (uRPF) has been configured on a service provider network to
protect itself from spoofed-based attacks. Which of the following are valid uRPF modes? (Select
two)
A. Strict mode
E. Loose mode
Which of the following are commonly used ports when implementing RADIUS-based
authentication and accounting? Select two)
B. UDP port 1812 for authentication
D. UDP port 1813 for accounting
Which of the following are valid restrictions when configuring Control Plane Policing (CoPP) on
Cisco devices? (Choose two)
A. You can not use the “log” keyword with CoPP on the access list entries
C. The only match types supported with CoPP is ip precedence, ip dscp, and access-group
Which of the following are used to validate the source of IPv6 traffic and are considered IPv6
layer 2 snooping features?
C. IPv6 Source Guard
D. IPv6 Prefix Guard
Which of the following are used to validate the source of IPv6 traffic and are considered IPv6
layer 2 snooping features?
C. IPv6 Source Guard
D. IPv6 Prefix Guard
You want to implement AAA on router R1 for a more robust authentication and authorization
system. What is typically the first global command used to do this?
A. aaa new-model
A time-based access list has been configured on R1 to allow SSH access to the device only on
weekdays. Which of the following are valid options when using the time range command?
(Select two)
C. absolute
D. periodic
First-Hop Security (FHS) is a set of features to optimize IPv6 link operation and help with scale in
large L2 domains. Which of the following are valid First-Hop Security features supported by
Cisco? (Select three)
A. IPv6 RA Guard
C. DHCPv6 Guard
D. IPv6 Snooping