Administrative Distance Flashcards

1
Q

What is the administrative distance of EIGRP

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the administrative of EBGP

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the administrative distance of OSPF

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the administrative distance of IS-IS

A

115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the administrative distance of RIPv1,v2

A

120

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the administrative distance of External EIGRP

A

170

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the administrative distance of Internal BGP

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the administrative distance of connected interfaces

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the administrative distance of static routes

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the administrative distance of EIGRP summary

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the administrative distance of IGRP:

A

100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network engineer notices that transmission rates of senders of tcp traffic sharply increase and decrease simultaneously during periods of congestion. Which condition causes this?A. Global synchronization B. Tail dropC. Random early detection D. Queue management algorithm

A

Correct answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which three problems results from application mixing of UDP and TCP streams within a network with no QoS (choose three)A. Starvation B. JitterC. LatencyD. windowing E. Lower throughput

A

Correct answer:ACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process? A. Dual stack methodB. 6to4 tunneling C. GRE tunneling D. NAT-PT

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement about the use of tunneling to migrate to IPv6 is true?A. Tunneling is less secure than dual stack or translation.B. Tunneling is more difficult to configure than dual stack or translation C. Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts. D. Tunneling destination are manually determined by the IPv4 address in the low-order 32 bits of IPv4-compatible IPv6 address

A

Correct Answer:C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two) A. IP routing B. FIBC. ARP cacheD. MAC address tableE. Cisco Express Forwarding tableF. Topology table

A

Correct Answer:AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which switching method is used when entries are present in the output of the command show ip cache?A. Fast switching B. Process switching C. Cisco Express Forwarding Switching D. Cut-through packet switching

A

Correct answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which two actions must you perform to enable and use window scaling on a router? (Choose two) A. Execute the command ip tcp windows-size 65536B. Set window scaling to be used on the remote host.C. Execute the command ip tcp queuemax.D. Set TCP options to “enabled” on the remote host. E. Execute the command ip tcp adjust-mss

A

Correct Answer:AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which three TCP enhancements can be used with TCP selective acknowledgments? A. Header compression B. Explicit congestion notification C. Keepalive D. Time stampsE. TCP path recovery F. MTU window

A

Correct Answer: BCD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this scenario describe? A. LatencyB. Starvation C. Connectionless communicationD. Nonsequencing unordered packetsE. Jitter

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Under which condition does UDP dominance occur?A. When TCP traffic is in the same class as UDP B. When UDP flows are assigned a lower priority queueC. When WRED is enabled D. When ACLs are in place to block TCP traffic.

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed? A. Disable CDP on the interface.B. Execute the vpdn enable commandC. Execute the no switchport command D. Enable QoS FiFo for PPPoE support

A

Correct Answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used for authentication in this manner? A. PAPB. Dot1xC. IpsecD. CHAPE. ESP

A

Correct Answer:D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if not interested traffic exists. which feature can be found to accomplish this task?A. TCT Adjust B. Dialer persistentC. PPPoE groupsD. Half-bridging E. Peer Neighbor Route

A

Correct answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which PPP authentication method sent authentication information in clear text?A. MS CHAPB. CDPCPC. CHAPD. PAP

A

Correct answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which protocol uses dynamic address mapping to request the next-hope protocol address for specific connection?A. Frame Relay inverse ARPB. Static DLCI mapping C. Frame Relay broadcast queue D. Dynamic DLCI mapping

A

Correct answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which statement is true about PPP session phase of PPPoE?A. PPP options are negotiated and authentication is not performed. Once the link set up is completed, PPPOE functions as layer 3 encapsulation method that allows data to be transferred over PPP link within the PPPoE headers.B. PPP options are not negotiated and authentication is performed. Once the link setup is complete, PPPoE functions as a layer 4 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.C. PPP options are automatically enabled and authorization is performed. Once the link setup is completed, PPPoE functions as a layer 2 encapsulation method that allows data to be encrypted over PPP link within PPPoE headers. D. PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as layer 2 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

PPPoE is composed of which two phases?A. Active Authentication phase and PPP Session PhaseB. Passive Discovery Phase and PPP session phaseC. Active authorization phase and PPP Session pahseD. Active Discovery phase and PPP Session phase

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A router with an interface that is configured with iPv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a global unicast address when a router is present? A. DHCPv6 requestB. Router-advertisementC. Neighbor-solicitation D. Redirect

A

Correct Answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A router with an interface that is configured with IPv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a global unicast address when a router is present? A. DHCPv6 requestB. Router-advertisement C. Neighbor-solicitation D. Redirect

A

Correct Answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters: MAC address C601.420F.0007Subnet 2001:DB8:0:1::/64Which IPv6 addresses should the engineer add to the documentation? A. 2001:DB8:0:1:C601:42FF:FE0F:7B. 2001:DB8:0:1:FFFF:C601:420F:7C. 2001:DB8:0:1:FE80:C601:420F:7D. 2001:DB8:0:1:C601:42FE:800F:7

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused this issue? A. The traffic filter is blocking all ICMPv6 traffic B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly.C. The link-local addresses that were used by OSPFV3 were explicit denied, which caused the neighbor relationships to fail. D. IPv6 traffic filtering can be implemented only on SVIs.

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the purpose of the autonomous-system {autonomous-system-number} command?A. It sets the EIGRP autonomous system number in a VRFB. It sets the BGP autonomous system number in a VRFC. Its sets the global EIGRP autonomous system numberD. It sets the global BGP autonomous system number

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the default OSPF hello interval on a Frame Relay point-to-point network? A. 10B. 20C. 30D. 40

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24? A. 10.9.1.0/24B. 10.8.0.0/24C. 10.8.0.0/16D. 10.8.0.0/23

A

Correct Answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFV3. The Network that are advertised from Router A do not show up in Router B routing table. After debugging IPv6 packets, the message “not a router” is found in the output. Why is the routing information not being learned by router B?A. OSPFV3 timers were not adjusted for fast convergence.B. The networks were not advertised properly under the OSPFV3 process.C. An IPv6 traffic filter is blocking the networks from being learned via the Router B interface that is connected to Router AD. IPv6 unicast routing is not enabled on router A or router B.

A

Correct Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

After you review the output of the command show IPv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of fFFE inserted into the address. Based on this information, what do you conclude about these IPV6 addresses?A. IEEE EUI-64 was implemented when assigning IPV6 addresses on the device. B. The addresses were misconfigured and will not function as intended. C. IPv6 addresses containing “FFFE” indicate that the address is reversed for multicast.D. The IPv6 universal/local flag (bit 7) was flipped E. IPv6 unicast Forwarding was enable, but IPv6 Cisco Express Forwarding was disabled.

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage? A. Router acknowledgement message will be forwarded upstream, where the DHCP server will allocate addresses to the local host.B. Routers on the IPv6 segment will respond with an advertisement that provides an external path from the local subnet, as well as certain data, such as prefix discovery.C. Duplicate Address detection will determine if any other local host is using the same IPv6 address for communication with the IPv6 routers on the segment.

A

Correct Answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A company has just opened two remote branch office that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites? A. Interface Tunnel0 Bandwidth 1536 Ip address 209.165.200.230 255.255.255.224 Tunnel source serial0/0 Tunnel mode gre multipoint B. Interface fa0/0 Bandwidth 1536 IP address 209.165.200.230 255.255.255.224 Tunnel mode gre multipoint C. Interface tunnel0 Bandwidth 1536 IP address 209.165.200.231 255.255.255.224 Tunnel source 209.165.201.1 Tunnel-mode dynamicD. Interface fa 0/0 Bandwidth 1536 IP address 209.165.200.231 255.255.255.224 Tunnel source 192.168.161.2 Tunnel destination 209.165.201.1 Tunnel-mode dynamic

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output.A. Inbound crypto map B. Remaining key lifetimeC. Path MTUD. Tagged packets E. Untagged packets F. Invalid identity packets

A

Correct Answer:ABC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Refer to the following output:Router#show ip nhrp detail 10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12 expire 01:59:47 typE. Dynamic, Flags: authoritative unique nat registered used NBMA address: 10.12.1.2What does the authoritative flag mean in regards to the NHRP information? A. It was obtained directly from the next-hop server.B. Data packets are process switches for this mapping entry. C. NHRP mapping is for network that are local to this router. D. The mapping entry was created in response to an NHRP registration request.E. The NHRP mapping entry cannot be overwritten.

A

Correct Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which common issue causes intermittent DMVPN tunnel flaps? A. A routing neighbor reachability issueB. A suboptimal routing tableC. Interface bandwidth congestion D. That the GRE tunnel to hub router is not encrypted

A

Correct Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which encapsulation supports an interface that is configured for an EVN trunk? A. 802.1QB. ISLC. PPPD. Frame Relay E. MPLSF. HDLC

A

Correct answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which three characteristics are shared by subinterfaces and associated EVNs?A. IP address B. Routing tableC. Forwarding control listsE. NetFlow configuration

A

Correct Answer:ABC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address, and follow the instructions. After doing this, the user is able to access company shares. Which type of remote access did the engineer enable? A. EZVPNB. Ipsec VPN client accessC. VPDN client accessD. SSL VPN client access

A

Correct Answer:D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco Express Forwarding?A. Flex VPNB. DMVPNC. GetVPND. Cisco Easy VPN

A

Correct answer:B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which traffic does the following configuration allow?IPv6 access-list ciscoPermit ipv6 host 2001:DB8:0:4::32 any eq sshLine vty 0 4IPv6 access-class cisco inA. All traffic to vty 0 4 from source 2001:DB8:0:4:32B. Only ssh traffic to vty 0 4 from source allC. Only ssh traffic to vty 0 4 from source 2001:DB:8:0:4::32D. All traffic to vty 0 4 from source all

A

Correct Answer:C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

For troubleshooting purposes, which method can you use in combination with the “debug ip packet” command to limit the amount of output data? A. You can disable the IP route cache globally B. You can use the KRON scheduler.C. You can use an extended access list.D. You can use an IOS parser.E. You can use the RITE traffic exporter.

A

Correct Answer:C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Refer to the following access list. Access-list 100 permit ip any any logAfter applying the access list on a cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this? A. A packet that matches access-list with the “log” keyword is cisco express Forwarding switched.B. A packet that matches access-list with the “log” keyword is fast switched. C. A packet that matches access-list with the “log” keyword is process switchedD. A large amount of IP traffic is being permitted on the router

A

Correct Answer:C

50
Q

Which address is used by Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? A. Source address B. Destination address C. Router interfaceD. Default gateway

A

Correct Answer:A

51
Q

What are three modes of Unicast Reverse Path Forwarding? A. Strict mode, loose mode, and VRF modeB. Strict mode, loose mode, and broadcast modeC. Strict mode, broadcast mode, and VRF modeD. Broadcast mode, loose mode, and VRF mode

A

Correct Answer: A

52
Q

What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish? Router(config)#access-list 101 deny ip 10.0.0.0 255.255.255.255 any logRouter(config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any logRouter(config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any logRouter(config)#interface fastEthernet 1/0Router(config-ip)#ip access-group 101 inA. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attemptsB. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the internet. C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.D. It prevents private internal addresses to be accessed directly from outside.

A

Correct Answer:C

53
Q

Refer to the following command:Router(config)# ip http secure-port 4433Which statement is true?A. The router will listen on port 4433 for HTTPS trafficB. The router will listen on port 4433 for HTTP trafficC. The router will never accept any HTTP and HTTPS traffic. D. The router will listen listen to HTTP and HTTP traffic on port 4433

A

Correct Answer: A

54
Q

A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to the configuration to allow this? A. Router(config-if)# ip helper-address 172.20.14.225B. Router(config-if)# udp helper-address 172.20.14.225C. Router(config-if)# ip udp helper-address 172.20.14.225

A

Correct Answer: A

55
Q

A network engineer is configuring SNMP on the network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with authentication or encryption. Which command satisfies the requirement of this scenario? A. Router(config)#snmp-server host 172.16.201.28 traps version 2c CiSCOROB. Router(config)#snmp-server host 172.16.201.28 informs version 2c CISCOROC. Router(config)# snmp-server host 172.16.201.28 traps version 3 auth CISCORO

A

Correct Answer: A

56
Q

When using SNMPv3 with NoauthNopriv, which string is math ed for sithentication? A. UsernameB. PasswordC. Community-stringD. Encryption-key

A

Correct answer:A

57
Q

After a recent DoS attack on a network, senior management ask you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging results? Choose twoA. Use the msec option to enable service time stamps B. Increase the logging history C. Set the logging severity level to 1D. Specify a logging rate limitE. Disable event logging on all noncritical items

A

Correct Answer: AB

58
Q

A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection? A. Secure copy protocol B. Core dumps C. Warm reloads D. SNMPE. Netflow

A

Correct Answer: B

59
Q

A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Assuming that an NTP server is already set up, what is the result of the command? A. It enables receiving NTP broadcast on the interface where the command was executedB. It enables receiving NTP broadcast on all interfaces globally. C. It enables a device to be an NTP peer to another device. D. It enables a devices to receive NTP broadcast and unicast packets

A

Correct Answer: A

60
Q

What is a function of NPTv6? A. It interferes with encryption of the full IP payload B. It maintains a per-node stateC. It is checksum-neutralD. It rewrites transport layer headers.

A

Correct Answer: C

61
Q

IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which features allows ipv6 devices to communicate with ipv4 servers? A. NATB. NATngC. NAT64D. Dual-stack NATE. DNS64

A

Correct Answer: C

62
Q

A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does the engineer see? A. Connectionless-oriented B. Service-oriented C. Connection-oriented D. Application-oriented

A

Correct Answer:C

63
Q

A network engineer executes the “ipv6 flowset” command. What is the result? A. Flow-label marking in 1280-byte or larger packets is enabled. B. Flow-set marking in 1280-byte or larger packets is enabled. C. Ipv6 PMTU is enabled on the router D. IPv6 flow control is enabled on the router.

A

Correct Answer: A

64
Q

A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and report packets are not being sent? A. Output dropsB. Enqueuing for the RP C. Fragmentation failuresD. Adjacency issues

A

Correct Answer:A

65
Q

A network engineer is asked to configure a site-to-site IPsec VPN tunnel. One of the last things that the engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside source lost 1 int s0/0 overload. Which functions do the two commands serve in this scenario? A. The command access-list 1 defines interesting traffic that is allowed through the tunnel. B. The command ip nat inside source list 1 int s0/0 overload disables “many-to-one” access for all devices on a defined segment to share a single IP address upon existing the external interface. C. The command access-list 1 permit any defines only one machine that is allowed through the tunnel. D. The command ip nat inside source list 1 int s0/0 overload provides “many-to-one” access for all devices on a defined segment to share a single IP address upon existing the external interface.

A

Correct Answer: D

66
Q

A network engineer is configuring a solution to allow failover of HSRP nodes during maintenance windows, as an alternative to powering down the active router and letting the network respond accordingly. Which action will allow for manual switching of HSRP nodes? A. Track the up/down state of a loopback interface and shutdown this interface during maintenance. B. Adjust the HSRP priority without the use of preemption C. Disable and unable all active interface on the active HSRP node. D. Enable HSRPv2 under global configuration, which allows for maintenance mode.

A

Correct Answer:A

67
Q

A network engineer notices that transmission rates of senders of tcp traffic sharply increase and decrease simultaneously during periods of congestion. Which condition causes this?

A. Global

A

Correct answer: A

68
Q

Which three problems results from application mixing of UDP and TCP streams within a network with no QoS (choose three)

A. Starvation 
B. Jitter
C. Latency
D. windowing 
E. Lower throughput
A

Correct answer:ACE

69
Q

Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process?

A. Dual stack method
B. 6to4 tunneling
C. GRE tun

A

Correct Answer:A

70
Q

Which statement about the use of tunneling to migrate to IPv6 is true?

A. Tunneling is less secure than dual stack or translation.
B. Tunneling is more difficult to configure than dual stack

A

Correct Answer:C

71
Q

A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two)

A. IP routing 
B. FIB
C. ARP cache
D. MAC address table
E. Ci
A

Correct Answer:AB

72
Q
Which switching method is used when entries are present in the output of the command show ip cache?
A. Fast switching 
B. Process switching 
C. Cisco Express Forwarding Switching 
D. Cut-thro
A

Correct answer: A

73
Q

Which two actions must you perform to enable and use window scaling on a router? (Choose two)
A. Execute the command ip tcp windows-size 65536
B. Set window scaling to be used on the remote

A

Correct Answer:AB

74
Q
Which three TCP enhancements can be used with TCP selective acknowledgments? 
A. Header compression 
B. Explicit congestion notification 
C. Keepalive 
D. Time stamps
E. TCP path recovery 
F.
A

Correct Answer: BCD

75
Q

A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic

A

Correct Answer:A

76
Q

Under which condition does UDP dominance occur?
A. When TCP traffic is in the same class as UDP
B. When UDP flows are assigned a lower priority queue
C. When WRED is enabled
D. When ACLs ar

A

Correct Answer:A

77
Q

Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed?

A

Correct Answer:B

78
Q

A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used fo

A

Correct Answer:D

79
Q

A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if not interested traffic exists. which feature can be found to accomplish this task?
A. TCT Ad

A

Correct answer: B

80
Q
Which PPP authentication method sent authentication information in clear text?
A. MS CHAP
B. CDPCP
C. CHAP
D. PAP
A

Correct answer: D

81
Q

Which protocol uses dynamic address mapping to request the next-hope protocol address for specific connection?
A. Frame Relay inverse ARP
B. Static DLCI mapping
C. Frame Relay broadcast queu

A

Correct answer:A

82
Q

Which statement is true about PPP session phase of PPPoE?

A. PPP options are negotiated and authentication is not performed. Once the link set up is completed, PPPOE functions as layer 3 enc

A

Correct Answer: D

83
Q

PPPoE is composed of which two phases?
A. Active Authentication phase and PPP Session Phase
B. Passive Discovery Phase and PPP session phase
C. Active authorization phase and PPP Session pahs

A

Correct Answer: D

84
Q

A router with an interface that is configured with iPv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a global unicast address when a router i

A

Correct Answer:B

85
Q

A router with an interface that is configured with IPv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a global unicast address when a router i

A

Correct Answer:B

86
Q

An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters:
MAC address C601.420F.0007
Sub

A

Correct Answer: A

87
Q

For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies

A

Correct Answer: C

88
Q

What is the purpose of the autonomous-system {autonomous-system-number} command?
A. It sets the EIGRP autonomous system number in a VRF
B. It sets the BGP autonomous system number in a VRF
C.

A

Correct Answer:A

89
Q
What is the default OSPF hello interval on a Frame Relay point-to-point network? 
A. 10
B. 20
C. 30
D. 40
A

Correct Answer:A

90
Q

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?

A. 10.9.1.0/24
B. 10.8.0.0/24
C. 10.8.0.0/16
D. 10.8.0.0/23

A

Correct Answer:B

91
Q

Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFV3. The Network that are advertised from Router A do not show up in Router B routing table.

A

Correct Answer: D

92
Q

After you review the output of the command show IPv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of fFFE inserted into the address. Based on this in

A

Correct Answer:A

93
Q

A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage?
A. Router acknowl

A

Correct Answer:B

94
Q

A company has just opened two remote branch office that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow com

A

Correct Answer:A

95
Q
A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output.
A. Inbound crypto map 
B. Remaining key lifetime
C. Path MTU
D. Ta
A

Correct Answer:ABC

96
Q

Refer to the following output:

Router#show ip nhrp detail
10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12 expire 01:59:47 typE. Dynamic, Flags: authoritative unique nat registered used NB

A

Correct Answer:A

97
Q

Which common issue causes intermittent DMVPN tunnel flaps?

A. A routing neighbor reachability issue
B. A suboptimal routing table
C. Interface bandwidth congestion
D. That the GRE tunnel t

A

Correct Answer: A

98
Q
Which encapsulation supports an interface that is configured for an EVN trunk? 
A. 802.1Q
B. ISL
C. PPP
D. Frame Relay 
E. MPLS
F. HDLC
A

Correct answer:A

99
Q
Which three characteristics are shared by subinterfaces and associated EVNs?
A. IP address 
B. Routing table
C. Forwarding control lists
E. NetFlow configuration
A

Correct Answer:ABC

100
Q

A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address, and follow the instructions. After doin

A

Correct Answer:D

101
Q
Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco Express Forwarding?
A. Flex VPN
B. DMVPN
C. GetVPN
D. Cisco Easy VPN
A

Correct answer:B

102
Q

Which traffic does the following configuration allow?

IPv6 access-list cisco
Permit ipv6 host 2001:DB8:0:4::32 any eq ssh
Line vty 0 4
IPv6 access-class cisco in
A. All traffic to vty 0 4 fr
A

Correct Answer:C

103
Q

For troubleshooting purposes, which method can you use in combination with the “debug ip packet” command to limit the amount of output data?
A. You can disable the IP route cache globally
B

A

Correct Answer:C

104
Q

Refer to the following access list.
Access-list 100 permit ip any any log

After applying the access list on a cisco router, the network engineer notices that the router CPU utilization has

A

Correct Answer:C

105
Q
Which address is used by Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? 
A. Source address 
B. Destination address 
C. Router interface
D. Default ga
A

Correct Answer:A

106
Q

What are three modes of Unicast Reverse Path Forwarding?
A. Strict mode, loose mode, and VRF mode
B. Strict mode, loose mode, and broadcast mode
C. Strict mode, broadcast mode, and VRF mode

A

Correct Answer: A

107
Q

What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
Router(config)#access-list 101 deny ip 10.0.0.0 255.255.

A

Correct Answer:C

108
Q

Refer to the following command:

Router(config)# ip http secure-port 4433

Which statement is true?
A. The router will listen on port 4433 for HTTPS traffic
B. The router will listen on port

A

Correct Answer: A

109
Q

A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to the configuration to allow this?
A. Rout

A

Correct Answer: A

110
Q

A network engineer is configuring SNMP on the network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with authentication or encryption. Which command sa

A

Correct Answer: A

111
Q

When using SNMPv3 with NoauthNopriv, which string is math ed for sithentication?

A. Username
B. Password
C. Community-string
D. Encryption-key

A

Correct answer:A

112
Q

After a recent DoS attack on a network, senior management ask you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced loggin

A

Correct Answer: AB

113
Q

A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection?

A. Secure copy protocol
B. Core

A

Correct Answer: B

114
Q

A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Assuming that an NTP server is already set up, what is the result of

A

Correct Answer: A

115
Q

What is a function of NPTv6?

A. It interferes with encryption of the full IP payload
B. It maintains a per-node state
C. It is checksum-neutral
D. It rewrites transport layer headers.

A

Correct Answer: C

116
Q

IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which features allows ipv6 devices to communicate with ipv4 servers?

A. NAT
B. NATng
C. NAT64
D. Du

A

Correct Answer: C

117
Q

A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does the engineer see?

A. Connectionles

A

Correct Answer:C

118
Q

A network engineer executes the ipv6 flowset command. What is the result?

A. Flow-label marking in 1280-byte or larger packets is enabled.
B. Flow-set marking in 1280-byte or larger packet

A

Correct Answer: A

119
Q

A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and report packets are not being sent?

A. Output drops
B. Enqueui

A

Correct Answer:A

120
Q

A network engineer is asked to configure a site-to-site IPsec VPN tunnel. One of the last things that the engineer does is to configure an access list (access-list 1 permit any) along with th

A

Correct Answer: D

121
Q

A network engineer is configuring a solution to allow failover of HSRP nodes during maintenance windows, as an alternative to powering down the active router and letting the network respond a

A

Correct Answer:A