CCIEcrackquestions Flashcards
- Which two options are two characteristics of the HSRPv6 protocol? (Choose two.)
A. It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.0fff.
B. It uses UDP port number 2029.
C. It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.ffff.
D. It uses UDP port number 2920.
E. If a link local IPv6 address is used, it must have a prefix.
It uses virtual MAC addresses 0005.73a0.0000 through 0005.73a0.0fff.
It uses UDP port number 2029.
- Like OSPFv2, OSPFv3 supports virtual links. Which two statements are true about the IPv6 address of a virtual neighbor? (Choose two.)
A. It is the link-local address, and it is discovered by examining the hello packets received from the virtual neighbor.
B. It is the link-local address, and it is discovered by examining link LSA received by the virtual neighbor.
C. It is the global scope address, and it is discovered by examining the router LSAs received by the virtual neighbor.
D. Only prefixes with the LA-bit not set can be used as a virtual neighbor address.
E. It is the global scope address, and it is discovered by examining the intra-area-prefix-LSAs received by the virtual neighbor.
F. Only prefixes with the LA-bit set can be used as a virtual neighbor address.
It is the global scope address, and it is discovered by examining the intra-area-prefix-LSAs received by the virtual neighbor.
Only prefixes with the LA-bit set can be used as a virtual neighbor address.
- Which two statements are true about an EVPL? (Choose two.)
A. It has a high degree of transparency.
B. It does not allow for service multiplexing.
C. The EVPL service is also referred to as E-line.
D. It is a point-to-point Ethernet connection between a pair of UNIs.
Answer: CD
The EVPL service is also referred to as E-line.
It is a point-to-point Ethernet connection between a pair of UNIs.
- Which three statements describe the characteristics of a VPLS architecture? (Choose three.)
A. It forwards Ethernet frames.
B. It maps MAC address destinations to IP next hops.
C. It supports MAC address aging.
D. It replicates broadcast and multicast frames to multiple ports.
E. It conveys MAC address reachability information in a separate control protocol.
F. It can suppress the flooding of traffic.
It forwards Ethernet frames.
It supports MAC address aging.
It replicates broadcast and multicast frames to multiple ports.
Which three statements about EVCs are true? (Choose three.)
A. Spanning Tree must use MST mode on EVC ports.
B. PAGP is supported on EVC ports.
C. Spanning Tree must use RSTP mode on EVC ports.
D. LACP is supported on EVC ports.
E. Layer 2 multicast framing is supported.
F. Bridge domain routing is required.
Spanning Tree must use MST mode on EVC ports.
PAGP is supported on EVC ports
LACP is supported on EVC ports.
ip route vrf red 0.0.0.0 0.0.0.0 192.168.1.1 global
Refer to the exhibit. Which three statements about this configuration are true? (Choose three.)
A. The default route appears in the global routing table.
B. The static route appears in the VRF red routing table.
C. The subnet 192.168.1.0 is unique to the VRF red routing table.
D. The static route is added to the global routing table and leaked from the VRF red.
E. The subnet 192.168.1.0 is unique to the global routing table.
F. 192.168.1.1 is reachable using any of the addresses on the router where the static route is configured.
The default route appears in the global routing table.
The static route appears in the VRF red routing table
The subnet 192.168.1.0 is unique to the global routing table.
Which statement about BGP and diverse path advertisement is true?
A. The BGP best-path selection must be disabled.
B. The BGP best-path selection algorithm has been changed to always ignore the IGP metric.
C. The BGP best-path selection algorithm has been changed so that two BGP paths can be flagged as best in the BGP table.
D. The BGP best-path selection algorithm has not been changed.
E. The BGP best-path selection is disabled for BGP routes for which the feature is enabled.
The BGP best-path selection algorithm has not been changed.
How does having an EIGRP feasible successor speed up convergence?
A. EIGRP sends queries only if there is a feasible successor, which decreases the number of routers that are involved in convergence.
B. EIGRP sends queries only if there is not a feasible successor, which causes less control traffic to compete with data.
C. EIGRP immediately installs the loop-free alternative path in the RIB.
D. EIGRP preinstalls the feasible successor in the RIB in all cases, which causes traffic to switch more quickly.
EIGRP immediately installs the loop-free alternative path in the RIB.
Switch# show ip igmp snooping mrouter
VLAN port
———————–
10 Gi2/0/1(dynamic) , Router
20 Gi2/0/1(dynamic), Router
Refer to the exhibit. Which three statements about the output are true? (Choose three.)
A. An mrouter port can be learned by receiving a PIM hello packet from a multicast router.
B. This switch is configured as a multicast router.
C. Gi2/0/1 is a trunk link that connects to a multicast router.
D. An mrouter port is learned when a multicast data stream is received on that port from a multicast router.
E. This switch is not configured as a multicast router. It is configured only for IGMP snooping.
F. IGMP reports are received only on Gi2/0/1 and are never transmitted out Gi2/0/1 for VLANs 10 and 20.
An mrouter port can be learned by receiving a PIM hello packet from a multicast router.
This switch is configured as a multicast router.
Gi2/0/1 is a trunk link that connects to a multicast router.
Which action does route poisoning take that serves as a loop-prevention method?
A. It immediately sends routing updates with an unreachable metric to all devices.
B. It immediately sends routing updates with a metric of 255 to all devices.
C. It prohibits a router from advertising back onto the interface from which it was learned.
D. It advertises a route with an unreachable metric back onto the interface from which it was learned.
E. It poisons the route by tagging it uniquely within the network.
It immediately sends routing updates with an unreachable metric to all devices.
Which two statements are true about VPLS? (Choose two.)
A. It can work over any transport that can forward IP packets.
B. It provides integrated mechanisms to maintain First Hop Resiliency Protocols such as HSRP, VRRP, or GLBP.
C. It includes automatic detection of multihoming.
D. It relies on flooding to propagate MAC address reachability information.
E. It can carry a single VLAN per VPLS instance.
It relies on flooding to propagate MAC address reachability information.
It can carry a single VLAN per VPLS instance.
On which three options can Cisco PfR base its traffic routing? (Choose three.)
A. Time of day B. An access list with permit or deny statements C. Load-balancing requirements D. Network performance E. User-defined link capacity thresholds F. Router IOS version
Load-balancing requirements
Network performance
User-defined link capacity thresholds
What are two advantages to using Asynchronous mode instead of Demand mode for BFD? (Choose two.)
A. Asynchronous mode requires half as many packets as Demand mode for failure detection.
B. Asynchronous mode can be used in place of the echo function.
C. Asynchronous mode supports a larger number of BFD sessions.
D. Asynchronous mode requires one fourth as many packets as Demand mode for failure detection.
E. Asynchronous mode’s round-trip jitter is less than that of Demand mode.
Asynchronous mode requires half as many packets as Demand mode for failure detection.
Asynchronous mode can be used in place of the echo function.
Which three features are common to OSPF and IS-IS? (Choose three.)
A.They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree.
B. They both use DR and BDR in the broadcast network.
C. They both use hello packets to form and maintain adjacencies.
D. They both use NSSA and stub type areas to scale the network design.
E. They both have areas to form a two-level hierarchical topology.
They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes
They both use hello packets to form and maintain adjacencies.
They both have areas to form a two-level hierarchical topology.
A service provider is deploying L2VPN LAN services in its MPLS cloud. Which statement is true regarding LDP signaling and autodiscovery?
A. LDP signaling requires that each PE is identified, and that an LDP session is active with its P neighbor for autodiscovery to take place.
B. LDP signaling requires that each P is identified, and that a targeted LDP session is active for auto discovery to take place.
C. LDP signaling requires that each PE is identified, and that a targeted LDP session with a BGP route reflector is active for autodiscovery to take place.
D. LDP signaling requires that each PE is identified, and that a targeted LDP session is active for auto discovery to take place.
LDP signaling requires that each PE is identified, and that a targeted LDP session is active for auto discovery to take place.
Event manager applet LARGECONFIG exhibit
Refer to the exhibit. Which two statements about the EEM applet configuration are true? (Choose two.)
A. The EEM applet runs before the CLI command is executed.
B. The EEM applet runs after the CLI command is executed.
C. The EEM applet requires a case-insensitive response.
D. The running configuration is displayed only if the letter Y is entered at the CLI.
The EEM applet runs before the CLI command is executed.
The EEM applet requires a case-insensitive response
What are two advantages to using Asynchronous mode instead of Demand mode for BFD? (Choose two.)
A. Asynchronous mode requires half as many packets as Demand mode for failure detection.
B. Asynchronous mode can be used in place of the echo function.
C. Asynchronous mode supports a larger number of BFD sessions.
D. Asynchronous mode requires one fourth as many packets as Demand mode for failure detection.
E. Asynchronous mode’s round-trip jitter is less than that of Demand mode.
Asynchronous mode requires half as many packets as Demand mode for failure detection.
Asynchronous mode can be used in place of the echo function
Which BGP feature allows a router to maintain its current BGP configuration while it advertises a different AS number to new connections?
A. local-AS
B. next-hop-self
C. allow-AS in
D. soft reset
local-AS
Packets from a router with policy-based routing configured are failing to reach the next hop.
Which two additions can you make to the router configuration to enable the packets to flow correctly? (Choose two.)
A. Enable ip proxy-arp on the exiting interface.
B. Specify the next hop as an address.
C. Specify the next hop as an interface.
D. Add a match-any permit statement to the route map.
Enable ip proxy-arp on the exiting interface.
Specify the next hop as an address.
sh pfr master traffic-class Refer to the exhibit. Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A. The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
B. Cisco PfR is monitoring the prefix via passive NetFlow mode only.
C. Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
D. The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA measurements.
The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was previously in policy.
Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA
In the DiffServ model, which class represents the lowest priority with the highest drop probability? (There are 4 questions of this type, Do not confuse yourself in the exam.)
A. AF11
B. AF13
C. AF41
D. AF43
AF13
In the DiffServ model, which class represents the highest priority with the highest drop probability? (*)
A. AF11
B. AF13
C. AF41
D. AF43
AF43
- In the DiffServ model, which class represents the lowest priority with the lowest drop probability? (*)
A. AF11
B. AF13
C. AF41
D. AF43
AF11
What is the most common use for route tagging in EIGRP?
A. to determine the route source for management purposes
B. to change the metric of a prefix
C. to filter routes in order to prevent routing loops
D. to modify path selection for certain classes of traffic
to filter routes in order to prevent routing loops
Which two values comprise the VPN ID for an MPLS VPN? (Choose two.)
A. an OUI B. a VPN index C. a route distinguisher D. a 16-bit AS number E. a 32-bit IP address
an OUI
a VPN index
R1# Show logging
count and timestamp logging messages: disable
Refer to the exhibit. Which statement about the R1 configuration is true?
A. It supports the service timestamps log uptime command to display time stamps.
B. The logging buffer command was used to increase the default of the buffer.
C. The logging of warning messages is disabled.
D. Log message sequence numbering is disabled.
Log message sequence numbering is disabled.
Interface tunnel 1
tunnel1 source ethernet 0
tunne1 mode ipv6ip isatap
ipv6 address 2001:DB8::/64 eui-64
Refer to the exhibit. What is wrong with the configuration of this tunnel interface?
A. ISATAP tunnels cannot use the EUI-64 address format.
B. No tunnel destination has been specified.
C. The tunnel source of an ISATAP tunnel must always point to a loopback interface.
D. Router advertisements are disabled on this tunnel interface.
Router advertisements are disabled on this tunnel interface.
Which two statements about packet fragmentation on an IPv6 network are true? (Choose two.)
A. The fragment header is 64 bits long.
B. The identification field is 32 bits long.
C. The fragment header is 32 bits long.
D. The identification field is 64 bits long.
E. The MTU must be a minimum of 1280 bytes.
F. The fragment header is 48 bits long.
The fragment header is 64 bits long.
The identification field is 32 bits long.
Refer to the exhibit. Which technology can be used on the switch to enable host A to receive multicast packets for 239.2.2.2 but prevent host B from receiving them?
A. IGMP filtering
B. MLD snooping
C. IGMP snooping
D. MLD filtering
IGMP snooping
Which statement about the EIGRP RTO is true?
A. It is six times the SRTT.
B. It is the time that it normally takes for an update to be received by a peer.
C. It is the time that it normally takes to receive a reply to a query.
D. It is the average time that it takes for a reliable packet to be acknowledged
It is six times the SRTT.
Which two statements are true about RSTP? (Choose two.)
A. By default, RTSP uses a separate TCN BPDU when interoperating with 802.1D switches.
B. By default, RTSP does not use a separate TCN BPDU when interoperating with 802.1D switches.
C. If a designated port receives an inferior BPDU, it immediately triggers a reconfiguration.
D. By default, RTSP uses the topology change TC flag.
E. If a port receives a superior BPDU, it immediately replies with its own information, and no reconfiguration is triggered.
By default, RTSP does not use a separate TCN BPDU when interoperating with 802.1D switches.
If a designated port receives an inferior BPDU, it immediately triggers a reconfiguration
FHR# show ipv6 mroute FF7E::1234
Refer to the exhibit. Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A. The scope of the IPv6 multicast address is link-local.
B. The outgoing interface for the IPv6 multicast group should not be a tunnel interface.
C. The R-bit is set in the IPv6 address, but this is not an embedded RP multicast IPv6 address.
D. The S flag should not be set on a first-hop PIM router.
E. A multicast IPv6 address does not start with FF.
The R-bit is set in the IPv6 address, but this is not an embedded RP multicast IPv6 address.
Which two statements about the ipv6 ospf authentication command are true? (Choose two.)
A. The command is required if you implement the IPsec AH header.
B. The command configures an SPI.
C. The command is required if you implement the IPsec TLV.
D. The command can be used in conjunction with the SPI authentication algorithm.
E. The command must be configured under the OSPFv3 process.
The command is required if you implement the IPsec AH header.
The command configures an SPI.
In an STP domain, which two statements are true for a nonroot switch, when it receives a configuration BPDU from the root bridge with the TC bit set? (Choose two.)
A. It sets the MAC table aging time to max_age + forward_delay time.
B. It sets the MAC table aging time to forward_delay time.
C. It recalculates the STP topology upon receiving topology change notification from the root switch.
D. It receives the topology change BPDU on both forwarding and blocking ports.
It receives the topology change BPDU on both forwarding and blocking ports.
It sets the MAC table aging time to forward_delay time
Which three statements about SPAN traffic monitoring are true? (Choose three.)
A. Traffic from a non-source VLAN is discarded when it arrives on a source VLAN.
B. Multiple sessions can send traffic to an individual destination port.
C. It supports up to 32 SPAN ports per switch.
D. The destination port acts as a normal switchport.
E. It supports up to 64 SPAN ports per switch.
F. Only one session can send traffic to an individual destination port.
Traffic from a non-source VLAN is discarded when it arrives on a source VLAN.
It supports up to 64 SPAN ports per switch.
Only one session can send traffic to an individual destination port.
Which three statements are functions that are performed by IKE phase 1? (Choose three.)
A. It builds a secure tunnel to negotiate IKE phase 1 parameters.
B. It establishes IPsec security associations.
C. It authenticates the identities of the IPsec peers.
D. It protects the IKE exchange by negotiating a matching IKE SA policy.
E. It protects the identities of IPsec peers.
F. It negotiates IPsec SA parameters.
It authenticates the identities of the IPsec peers.
It protects the IKE exchange by negotiating a matching
IKE SA policy.
It protects the identities of IPsec peers.
Two routers are trying to establish an OSPFv3 adjacency over an Ethernet link, but the adjacency is not forming. Which two options are possible reasons that prevent OSPFv3 to form between these two routers? (Choose two.)
A. mismatch of subnet masks B. mismatch of network types C. mismatch of authentication types D. mismatch of instance IDs E. mismatch of area types
mismatch of instance IDs
mismatch of area types
Which three actions are required when configuring NAT-PT? (Choose three.)
A. Enable NAT-PT globally.
B. Specify an IPv4-to-IPv6 translation
C. Specify an IPv6-to-IPv4 translation.
D. Specify a ::/96 prefix that will map to an IPv4 address.
E. Specify a ::/48 prefix that will map to a MAC address.
F. Specify a ::/32 prefix that will map to an IPv6 address.
Specify an IPv4-to-IPv6 translation
Specify an IPv6-to-IPv4 translation.
Specify a ::/96 prefix that will map to an IPv4 address.
Which two options are the two main phases of PPPoE? (Choose two.)
A. Active Discovery Phase B. IKE Phase C. Main Mode Phase D. PPP Session Phase E. Aggressive Mode Phase F. Negotiation Phase
Active Discovery Phase
PPP Session Phase
Which two statements are true about unicast RPF?
A. Unicast RPF requires CEF to be enabled.
B. Unicast RPF strict mode works better with multihomed networks.
C. Unicast RPF strict mode supports symmetric paths.
D. Unicast RPF strict mode supports asymmetric paths.
E. CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance.
F. Unicast RPF loose mode is typically used with ISP networks.
Unicast RPF requires CEF to be enabled.
Unicast RPF strict mode supports symmetric paths
What is the range of addresses that is used for IPv4-mapped IPv6 addresses?
A. 2001. db9. . /32 B. 2001. db8. . /32 C. 2002. . /16 D. . . ffff. /16 E. . . ffff. 0. 0/96
. . ffff. 0. 0/96
Which three features are common to OSPF and IS-IS? (Choose three.)
A. They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree
B. They both use DR and BDR in the broadcast network.
C. They both use hello packets to form and maintain adjacencies.
D. They both use NSSA and stub type areas to scale the network design.
E. They both have areas to form a two-level hierarchical topology
They both maintain a link-state database from which a Dijkstra-based SPF algorithm computes a shortest path tree
They both use hello packets to form and maintain adjacencies
They both have areas to form a two-level hierarchical topology.
R2# sh clns neighbors
Refer to the exhibit. Why is the neighbor relationship between R2 and R4 shown as ES-IS?
A. because there is an MTU mismatch between R2 and R4
B. because interface S3/0 of R4 is configured as L1/L2
C. because interface S3/0 of R2 is configured as L1
D. because there is a hello interval mismatch between R2 and R4
because interface S3/0 of R2 is configured as L1
A company is multihomed to several Internet providers using EBGP. Which two measures guarantee that the network of the company does not become a transit AS for Internet traffic? (Choose two.)
A. Prepend three times the AS number of the company to the AS path list.
B. Add the community NO_EXPORT when sending updates to EBGP neighbors.
C. Write AS-path access-list which permits one AS long paths only and use it to filter updates sent to EBGP neighbors.
D. Add the community NO_EXPORT when receiving updates from EBGP neighbors.
Write AS-path access-list which permits one AS long paths only and use it to filter updates sent to EBGP neighbors.
Add the community NO_EXPORT when receiving updates from EBGP neighbors
Which two actions can you take to allow the greatest number of pertinent packets to be stored in the temporary buffer of Cisco IOS Embedded Packet Capture? (Choose two.)
A. Specify the sampling interval.
B. Specify the capture buffer type.
C. Specify a reflexive ACL.
D. Specify the minimum packet capture rate.
E. Specify the packet size.
F. Store the capture simultaneously onto an external memory card as the capture occurs.
Specify the sampling interval.
Specify the capture buffer type
Which statement about passive interfaces is true?
A. The interface with the OSPF passive interface configuration appears as a not-so-stubby network.
B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello packets.
C. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units.
D. Passive interface can be configured on the interface for IS-IS.
The interface with the IS-IS passive interface configuration sends the IP address of that interface in the link-state protocol data units.