CCIE Router Switch version 5.1 Flashcards

1
Q

QUESTION NO: 1
Which two options are causes of out-of-order packets? (Choose two.)

A.
a routing loop
B.
a router in the packet flow path that is intermittently dropping packets
C.
high latency
D.
packets in a flow traversing multiple paths through the network
E.
some packets in a flow being process-switched and others being interrupt-switched on a transit
router

A

packets in a flow traversing multiple paths through the network

some packets in a flow being process-switched and others being interrupt-switched on a transit
router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION NO: 2
A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but
attempts to transmit larger amounts of data hang and then time out. What is the cause of this
problem?
A.
A link is flapping between two intermediate devices.

B.
The processor of an intermediate router is averaging 90 percent utilization.
C.
A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a
port that has a sniffer attached.
D.
There is a PMTUD failure in the network path.

A

There is a PMTUD failure in the network path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 3
Refer to the exhibit.

ICMP Echo requests from host A are not reaching the intended destination on host B. What is the
problem?
A.
The ICMP payload is malformed.
B.
The ICMP Identifier (BE) is invalid.
C.
The negotiation of the connection failed.
D.
The packet is dropped at the next hop.
E.
The link is congested.
Answer: D
A

The packet is dropped at the next hop.

Here we see that the Time to Live (TTL) value of the packet is one, so it will be forwarded to the
next hop router, but then dropped because the TTL value will be 0 at the next hop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 4
Refer to the exhibit.

sh ip cache flow

A.
It is impossible for the destination interface to equal the source interface
B. NAT on a stick is performed on interface Et0/0
C.
There is a potential routing loop.
D.
This output represents a UDP flow or a TCP flow.

A

There is a potential routing loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION NO: 5
Which three conditions can cause excessive unicast flooding? (Choose three.)

A.
Asymmetric routing
B.
Repeated TCNs
C.
The use of HSRP
D.
Frames sent to FFFF.FFFF.FFFF
E.
MAC forwarding table overflow
F.
The use of Unicast Reverse Path Forwarding
A

Asymmetric routing

Repeated TCNs

MAC forwarding table overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION NO: 6
Which congestion-avoidance or congestion-management technique can cause global
synchronization?

A.
Tail drop
B.
Random early detection
C.
Weighted random early detection
D.
Weighted fair queuing
A

Tail Drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two options are reasons for TCP starvation? (Choose two.)

A.
The use of tail drop
B.
The use of WRED
C.
Mixing TCP and UDP traffic in the same traffic class
D.
The use of TCP congestion control
A

C.
Mixing TCP and UDP traffic in the same traffic class
D.
The use of TCP congestion control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Routing table is full switching to software forwarding”

While troubleshooting high CPU utilization of a Cisco Catalyst 4500 Series Switch, you notice the
error message that is shown in the exhibit in the log file.

What can be the cause of this issue, and how can it be prevented?
A.
The hardware routing table is full. Redistribute from BGP into IGP.
B.
The software routing table is full. Redistribute from BGP into IGP.
C.
The hardware routing table is full. Reduce the number of routes in the routing table.
D.
The software routing table is full. Reduce the number of routes in the routing table

A

The hardware routing table is full. Reduce the number of routes in the routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two are causes of output queue drops on FastEthernet0/0? (Choose two.)
A.
an oversubscribed input service policy on FastEthernet0/0
B.
a duplex mismatch on FastEthernet0/0
C.
a bad cable connected to FastEthernet0/0
D.
an oversubscribed output service policy on FastEthernet0/0
E.
The router trying to send more than 100 Mb/s out of FastEthernet0/0

A

D.
an oversubscribed output service policy on FastEthernet0/0
E.
The router trying to send more than 100 Mb/s out of FastEthernet0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

sh ip cache flow

Which statement about the output is true?
A.
The flow is an HTTPS connection to the router, which is initiated by 144.254.10.206.
B.
The flow is an HTTP connection to the router, which is initiated by 144.254.10.206.
C.
The flow is an HTTPS connection that is initiated by the router and that goes to 144.254.10.206.
D.
The flow is an HTTP connection that is initiated by the router and that goes to 144.254.10.206.

A

The flow is an HTTPS connection to the router, which is initiated by 144.254.10.206.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What is the cause of ignores and overruns on an interface, when the overall traffic rate of the
interface is low?
A.
a hardware failure of the interface
B.
a software bug
C.
a bad cable
D.
microbursts of traffic
A

microbursts of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

show debug
condition 1: ip 172.16.129.4

Which statement about the debug behavior of the device is true?
A.
The device debugs all IP events for 172.16.129.4.
B.
The device sends all debugging information for 172.16.129.4.
C.
The device sends only NTP debugging information to 172.16.129.4.
D.
The device sends debugging information every five seconds.

A

The device debugs all IP events for 172.16.129.4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which statement about MSS is true?
A.
It is negotiated between sender and receiver.
B.
It is sent in all TCP packets.
C.
It is 20 bytes lower than MTU by default.
D. It is sent in SYN packets.
E.
It is 28 bytes lower than MTU by default
A

It is sent in SYN packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
QUESTION NO: 14
Which two methods change the IP MTU value for an interface? (Choose two.)
A.
Configure the default MTU.
B.
Configure the IP system MTU.
C.
Configure the interface MTU.
D.
Configure the interface IP MTU.
A

C.
Configure the interface MTU.
D.
Configure the interface IP MTU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
QUESTION NO: 15
Which implementation can cause packet loss when the network includes asymmetric routing
paths?
A.
the use of ECMP routing
B.
the use of penultimate hop popping
C.
the use of Unicast RPF
D.
disabling Cisco Express Forwarding
A

the use of Unicast RPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION NO: 16
Which two mechanisms can be used to eliminate Cisco Express Forwarding polarization? (Choose
two.)
A.
alternating cost links
B.
the unique-ID/universal-ID algorithm
C.
Cisco Express Forwarding antipolarization
D.
different hashing inputs at each layer of the network

A

the unique-ID/universal-ID algorithm

different hashing inputs at each layer of the network

17
Q
separation? (Choose two.)
A.
Forwarding and Feature Manager
B.
Forwarding Engine Driver
C.
Forwarding Performance Management
D.
Forwarding Information Base
A

A.
Forwarding and Feature Manager
B.
Forwarding Engine Driver

18
Q

sh ip cache verbose overflow

What is the PHB class on this flow?
A.
EF
B.
none
C.
AF21
D.
CS4
A

CS4

19
Q

sh ip cache flow

A.
per-packet load balancing

B.
per-flow load balancing
C.
per-label load balancing
D.
star round-robin load balancing
A

per-packet load balancing

20
Q

What is the most efficient way to confirm whether microbursts of traffic are occurring?
A.
Monitor the output traffic rate using the show interface command.
B.
Monitor the output traffic rate using the show controllers command.
C.
Check the CPU utilization of the router.
D.
Sniff the traffic and plot the packet rate over time.

A

Sniff the traffic and plot the packet rate over time

21
Q

What is a cause for unicast flooding?
A.
Unicast flooding occurs when multicast traffic arrives on a Layer 2 switch that has directly
connected multicast receivers.
B.
When PIM snooping is not enabled, unicast flooding occurs on the switch that interconnects the
PIM-enabled routers.
C.
A man-in-the-middle attack can cause the ARP cache of an end host to have the wrong MAC
address. Instead of having the MAC address of the default gateway, it has a MAC address of the
man-in-the-middle. This causes all traffic to be unicast flooded through the man-in-the-middle,
which can then sniff all packets.
D.
Forwarding table overflow prevents new MAC addresses from being learned, and packets
destined to those MAC addresses are flooded until space becomes available in the forwarding
table.

A

Forwarding table overflow prevents new MAC addresses from being learned, and packets
destined to those MAC addresses are flooded until space becomes available in the forwarding
table.

22
Q

Video Source S is sending interactive video traffic to Video Receiver R. Router R1 has multiple
routing table entries for destination R. Which load-balancing mechanism on R1 can cause out-oforder
video traffic to be received by destination R?
A.
per-flow load balancing on R1 for destination R
B.
per-source-destination pair load balancing on R1 for destination R
C.
CEF load balancing on R1 for destination R
D.
per-packet load balancing on R1 for destination R

A

per-packet load balancing on R1 for destination R

23
Q

What is Nagle’s algorithm used for?
A.
To increase the latency
B.
To calculate the best path in distance vector routing protocols
C.
To calculate the best path in link state routing protocols
D.
To resolve issues caused by poorly implemented TCP flow control.

A

To resolve issues caused by poorly implemented TCP flow control.

24
Q

Which statement is true regarding the UDP checksum?
A.
It is used for congestion control.
B.
It cannot be all zeros.
C.
It is used by some Internet worms to hide their propagation.
D.
It is computed based on the IP pseudo-header.

A

It is computed based on the IP pseudo-header.

25
Q
Which statement describes the purpose of the Payload Type field in the RTP header?
A.
It identifies the signaling protocol.
B.
It identifies the codec.
C.
It identifies the port numbers for RTP.
D.
It identifies the port numbers for RTCP.
A

It identifies the codec