CCNP Route Flashcards

1
Q

What is the task you must perform when configuring SSH? (Choose two)

A

Configure hostname

Generate RSA key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two pieces of information can you determine from the output of the show ntp status command?

A

The IP address of the peer to which the clock is synchronized
Where the clock is synchronized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are implementing WAN access for an enterprise network while running applications that require a fully meshed network, which two design standards are appropriate for such an environment? (Choose two)

A

A centralized DMVPN solution to simplify connectivity for the enterprise
A dedicated WAN distribution layer to consolidate connectivity to remote sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which task do you need to perform first when you configure IP SLA to troubleshoot a network connectivity issue?

A

Enable the ICMP echo operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technology can combine multiple physical switches into one logical switch?

A

VSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two features are compatible with port security? (Choose two)

A

Voice VLAN

SPAN source port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which fallback method can you configure to allow all AAA authorization requests to be granted if the other methods do not respond or return an error?

A

A. Radius B. Enable C. TACACS+ D. NONE

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

By default what is the maximum number of equal metric path BGP uses for load balancing?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The track objects in IP SLA and make sure that it is only up if all track objects are up, which method achieves that goal?

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With PCA and PCB and there are three routers between them and a different MTU value and they want a PCA to run an application with PCB and DF is set so we have to choose?

A

MSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drag and Drop

  1. TLL
  2. ICMP Redirect
  3. ICMP unreachable
A
  1. when reaches ‗0‘ drops packets
  2. indicate to host that another route is available for a specific destination
  3. when destination is unreachable when IP is unable to give a packet to destination host due to some problem or issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to implement local authentication using a list for case insensitive usernames?

A

aaa authentication login default local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Define:
\+ IP NHRP redirect – ? 
\+ IP NHRP static – ? 
\+ IP NHRP (map) – ? 
\+ IP NHRP (shortcut) – ?
A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the minimum privilege level to allow a user to execute all user-level commands but prohibits enable-level commands by default?

A

level 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command can you enter to configure an enable password that uses an encrypted password from another configuration?

A

enable secret 5 $abc%!e.Cd34$!ao0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is minimum level for which user can see full commands but can‘t change anything?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which password takes precedence if you configure multiple passwords for Telnet connections to a Cisco IOS device?

A

enable secret password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which condition must be met before you can configure SSH on a device running Cisco IOS?

A

The IOS must be a crypto in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which two statements about the enable secret and enable password commands are true? (Choose two)

A
  • If both commands are missing from the global configuration, vty lines use the console password
  • The enable secret command overrides enable password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
router (config)#access-list 101 permit ip any any
router (config)#interface FastEthernet 1/0
router (config-if)#ip access-group 101 in

A

It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which two statements about IP access-lists are true? (Choose two)

A
  • They support wildcard masks to limit the address bits to which entries are applies.
  • Entries are applied to traffic in the order in which they appear.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which two different configuration can you apply to a device to block incoming SSH access? (Choose two)

A
1
ipv6 access-list VTY-ACCESS-IN 
 sequence 10 deny tcp any any eq 22 
 sequence 20 permit ipv6 any any 
line vty 0 15 
 ipv6 access-class VTY-ACCESS-IN in
2
ipv6 access-list VTY-ACCESS-IN 
 sequence 10 deny tcp any any eq 22 
 sequence 20 permit ipv6 any any 
interface Ethernet0/0 ipv6 traffic-filter VTY-ACCESS-IN in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which access list entry checks for an ACK within a packet TCP header?

A

access-list 149 permit tcp any any eq 21 established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which PPP authentication method sends authentication information in cleartext?

A

PAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which two features were added in MSCHAP Version 2? (Choose two)

A
  • Ability to change an expired password

- Mutual authentication between peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which value does a Cisco router use as its default username for CHAP authentication?

A

Its own hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which command instruct a PPPoE client to obtain its IP address from the PPPoE server? (OR What command is needed to get the ip address assigned from the PPPOE server?)

A

ip address negotiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What configurations does PPPoE allow? (Choose two)

A

-8 clients can be configured on 1 CPE -Clients can connect to multiple hosts over DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which feature can automatically assign IP addresses in a PPPoE environment?

A

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which two commands must you configure in the calling router to support the PPPoE client? (Choose two)

A
  • mtu

- pppoe-client dial-pool-number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which Cisco Express Forwarding table or tables hold forwarding information?

A

FIB and adjacency tables only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which feature eliminates the need for Cisco Express Forwarding to maintain a route cache?

A

FIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which Cisco Express Forwarding component maintains Layer 2 next-hop addresses that are used for hardware switching?

A

adjacency table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Refer to exhibit. What is indicated by the show ip cef command for an address?

A

CEF cannot switch packet for this route and passes it to the next best switching method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which three algorithms can you configure with the ip cef load-sharing algorithm command? (Choose three)

A
  • Tunnel
  • Universal
  • Include-ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Refer to Exhibit
A network engineer is working on the network topology and executes the command no ip split horizon on interface S0/0 of the Hub router. What is the result of this command?

A

Each of the spoke routers can see the routes that are advertised from the other spoke routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

If you convert a WAN connection with OSPF from T1 to a Frame Relay circuit, which two actions must you take to enable the connection? (Choose two)

A
  • Change the OSPF network type to nonbroadcast.

- Manually configure neighbors in the OSPF process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which two statements about Frame Relay LMI autosense are true on a router? (Choose two)

A
  • It operates on Frame Relay DTE interfaces

- It operates when the line is up but the line protocol is down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In a point-to-multipoint Frame Relay topology, which two methods ensure that all routing updates are received by all EIGRP routers within the Frame Relay network? (Choose two)

A
  • Disable split horizon

- Use subinterface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In which two ways can split horizon issues be overcome in a Frame Relay network environment? (choose two)

A
  • Configuring multiple subinterfaces on a single physical interface to various remote sites
  • Disabling split horizon.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

On which two types of interface is Frame Relay switching supported? (Choose two)

A
  • serial interfaces

- ISDN interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which task must you perform to enable a point-to-point Frame Relay connection?

A

Configure static address mapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which two statements about Frame Relay Point-to-Point connections are true? (Choose two)

A
  • Changing a point-to-point sub interface to a different type requires the device to be reloaded.
  • They use two DLCIs to communicate with multiple endpoints over the Frame Relay cloud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which value does a point-to-point GRE tunnel use to identify a peer?

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which two statement about GRE tunnel interface are true? (Choose two)

A
  • A tunnel destination must be routable, but it can be unreachable
  • To establish a tunnel the source interface must be up/up state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A network engineer has configured GRE between two IOS routers. The state of the tunnel interface is continuously oscillating between up and down. What is the solution to this problem?

A

Create a more specific static route to define how to reach the remote router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

When the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true?

A

The router must have a route installed towards the tunnel destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which two statements about GRE tunnel keys are true? (Choose two)

A
  • The key ID must be the same on each device.

- They prevent the injection of unwanted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
Refer to the exhibit.
R1(config-if)#interface Tunnel0 
R1(config-if)#tunnel source 10.0.0.1 
R1(config-if)#tunnel destination 10.0.0.2 
R1(config-if)#ipv6 address k:k:k:k::1/64 
R1(config-if)#ipv6 ospf 1 area 1 
R1(config-if)#tunnel mode ipv6ip 
! 
R2(config-if)#interface Tunnel1 
R2(config-if)#tunnel source 10.0.0.2 
R2(config-if)#tunnel source 10.0.0.1 
R2(config-if)#ipv6 address k:k:k:k::2/64 R2(config-if)#ipv6 ospf 1 area 1 
R2(config-if)#tunnel mode ipv6ip

A user calls from another branch office with a request to establish a simple VPN tunnel to test a new router‘s tunneling capability. Based on the configuration in the exhibit, which type of tunnel was configured?

A

6to4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Refer to the exhibit. After configuring GRE between two routers running OSPF that are connected to each other via a WAN link, a network engineer notices that the two routers cannot establish the GRE tunnel to begin the exchange of routing updates. What is the reason for this?

A

Either a firewall between the two routers or an ACL on the router is blocking IP protocol number 47.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

During which DMVPN phase is spoke-to-spoke communication enabled?

A

phase 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which two statements about NHRP in a DMVPN environment are true? (Choose two)

A
  • It can authenticate VPN endpoints

- It provides address resolution to route traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which two phases of DMVPN allow the spoke site to create dynamic tunnels to one other? (Choose two)

A
  • Phase 2

- Phase 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

A

DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which two statements about NAT in a DMVPN environment are true? (Choose two)

A
  • A spoke router can be represented by a static NAT on a device
  • A hub router can use static NAT for its public IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which security feature can protect DMVPN tunnels?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which condition prevents the establishment of a DMVPN tunnel between two spokes?

A

The two spokes are behind different PAT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three)

A
  • starvation
  • latency
  • lower throughput
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which feature can mitigate fragmentation issues within network segments that are between GRE endpoints?

A

TCP MSS

- also correct -> PMTUD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which feature mitigates fragmentation issues caused by endpoint hosts?

A

TCP MSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the default maximum segment size for TCP traffic?

A

536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which two protocols can cause TCP starvation? (Choose two)

A

TFTP, SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which technology was originally developed for routers to handle fragmentation in the path between end points?

A

PMTUD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A network engineer applies the command “ip tcp adjust-mss” under interface configuration mode. What is the result?

A

The probability of dropped or segmented TCP packets is decreased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which value determines the amount of traffic that a network path can hold in transit?

A

bandwidth delay product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which protocol can you use to remotely install an IOS image on a Cisco switch?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Under which circumstance can TCP starvation occur?

A

when TCP and UDP traffic are mixed in the same class of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which option is one way to mitigate asymmetric routing on an active/active firewall setup for TCP-based connections?

A

disabling stateful TCP checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three)

A
  • explicit congestion notification
  • keepalive
  • time stamps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Refer to the exhibit.

After configuring the routes, the network engineer executes the show ip route command. What is the expected results?

A

Gateway of last resort is not set Router #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What happens when a router receives a route with an administrative distance of 255?

A

The router is unable to install the route into the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

efer to the exhibit. Which networking challenge is the most important issue to address to enable optimal communication between the networks at company A and company B?

A

asymmetric routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A router receives a routing advertisement for 10.1.1.0/24 from an EIGRP peer and from an OSPF peer. Which route does the router install in the routing table, and for which reason?

A

The EIGRP route, because the administrative distance is lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

You are configuring a static route. Which action must you take to avoid the possibility of recursive row?

A

Use the ip route command to specify both the next-hop IP address and the connected interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which routing protocol routes traffic through the best path and second best path at the same time?

A

EIGRP or BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

You want to configure a device to select an OSPF-learned route as the preferred path over an EBGP-learned route. Which action must you take?

A

Decrease the OSPF administrative distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A network engineer is modifying RIPng timer configuration. Which configuration mode should the engineer use?

A

router(config-rtr)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the default authentication in RIPv2 when authentication is enabled?

A

Plaintext authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Two routers are configured with RIPng but can‘t form neighbors as traffic traverses a firewall. Which port does the firewall need to permit to form neighbors?

A

UDP Port 521

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which command must you configure globally to support RIPng?

A

ipv6 unicast-routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Afer configuring RIPng on two routers that are connected via a WAN link, a network engineer notices that the two routers cannot exchange routing updates. What is the reason for this?

A

Either a firewall between the two routers or an ACL on the router is blocking UDP 521

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A network engineer is enabling RIPng on a new customer link. Under which configuration mode is RIPng enabled?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A route with default RIPv2 settings loses connectivity to it‘s next-hop neighbor. How long does the router wait before removing the route to the next hop from its route table?

A

240 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Customer enabled new link to partner using RIPng, how and where is RIPng configured?

A

global – (config)#ipv6 router rip “RIPNG”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is the maximum number of hops on a route that RIPng advertises as reachable?

A

15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A network engineer is troubleshooting connectivity issues with a directly connected RIPng neighbor. Which command should show directly connected RIPng neighbor adjacencies only?

A

router#show ipv6 rip next-hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which two statements about OSPF E1 routes are true? (Choose two)

A
  • They use the OSPF cost from redistribution and the OSPF cost to the ASBR.
  • They are preferred over E2 routes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

OSPF has R1 router ID 172.18.1.1. What happens when R1 configure with a new loopback interface IP address 172.17.1.1?

A

OSPF retains 172.18.1.1 as router ID until interface on which is configured goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which two areas does OSPF send a summary route by default ? (Choose two)

A
  • Totally stubby

- Stub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Refer to the exhibit. Which LSA type does R3 propagate into Area 1 for the 192.168.10.0/24 network?

A

type 7 LSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which OSPF network type uses a DR?

A

Nonbroadcast multi-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What are two important differences between OSPFv2 and OSPFv3? (Choose two)

A
  • Only OSPFv3 provides support for IPv6.

- Only OSPFv3 supports multiple OSPF instances on a single link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Device R1 has 1 Gigabit and 10 Gigabit Ethernet interfaces, which command do you enter so that it takes full advantage of OSPF costs?

A

R1(config-router)#auto-cost reference-bandwidth 10000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which LSA type in OSPFv3 is used for link-local updates?

A

Link LSA type 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which two statements about OSPFv3 are true? (Choose two)

A
  • The router ID is configured as an IPv4 address.

- It uses link-local addresses to form neighbor relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Refer to the exhibit.
You notice that traffic from R1 to the 192.168.10 0/24 network prefers the path through R3 instead of the least-cost path through R2.What is the most likely reason for this route selection?

A

OSPF prefers intra-area routes over interarea routes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

When OSPF is forming an adjacency, in which state does the actual exchange of the information in the link-state database occur?

A

loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A network engineer enables OSPF on a Frame Relay WAN connection to various remote sites, but no OSPF adjacencies come up Which two actions are possible solutions for this issue? (Choose Two)

A
  • Change the network type to point-to-multipoint under WAN interface
  • Configure the neighbor command under OSPF process for each remote site
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which two OSPF router types can perform summarization in an OSPF network? (Choose two)

A
  • area border router

- autonomous system boundary router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

If you want to migrate an IS-IS network to another routing protocol. Which routing protocols should you choose? (Choose two)

A
  • EIGRP

- OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

A router was configured with the ―eigrp stub‖ command. The router advertises which types of routes?

A

connected and summary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Refer to Exhibit - All interfaces on each router are participating in the EIGRP 100 process. Interface Loopback 2 on HQR2 is currently in shutdown mode. An engineer issues the eigrp stub command on router BR1. Which statements about the query messages sent from router HQ-R2 for a route to reach the 12.12.12.12/32 network is true?

A

Router HQ-R1 receives query messages from HQ-R2 for a route to 12.12.12.12/32 network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
Refer to the exhibit.
router eigrp 65535 
 no auto-summary 
 network 10.0.0.0 0.0.0.255 
router ospf 1
 network 192.168.5.0 0.0.0.255 area 0 
 passive-interface loopback0 
 redistribute eigrp 65535

If this configuration is applied to a device that redistributes EIGRP routes into OSPF. which two statements about the behavior of the device are true? (Choose two)

A
  • The device redistributes all EIGRP networks into OSPF

- The device redistributes only classful EIGRP networks into OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Refer to the exhibit.

12.0.0.0/24 is subnetted, 1 subnets
D 12.12.12.0 [90/30720] vi 52.52.52.2, 00:00:12, FastEthernet2/0
[90/30720] vi 51.51.51.1, 00:00:12, FastEthernet1/0

The excerpt was taken from the routing table of router SATX. Which option ensures that routes from 51.51.51.1 are preferred over routes from 52.52.52.2?

A

SATX(config-router)#distance 89 51.51.51.1 0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which two options can you use to configure an EIGRP stub router? (Choose two)

A
  • receive-only

- summary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Which two types of authentication does EIGRP offer? (Choose two)

A
  • MD5

- Plain Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which three statements about IPv6 EIGRP are true? (Choose three)

A
  • EIGRP neighbor relationships are formed using the link-local address.
  • EIGRP route advertisement is configured under the interface configuration.
  • An IPv6 EIGRP router ID is required.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is EIGRP Summary Route Administrative Distance?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which EIGRP packets use unreliable delivery? (Choose two)

A
  • Request

- Hello

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is used in EIGRP metric calculation?

A

Minimum bandwidth on the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

How EIGRP metric is calculated?

A

Bandwidth+Delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which statements are true to configure IPv6 EIGRP configuration for route advertisements? (Choose two)

A
  • Route advertisements are configured at the interface configuration
  • Uses link-local IP address for route advertisements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Which task must you preform to implement EIGRP for IPv6 on a device?

A

Manually configure the router ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which two features are provided by EIGRP for IPv6? (Choose two)

A
  • Partial Update

- Scaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which two packet type can an EIGRP router send when a route goes into the Active state? (Choose two)

A
  • reply

- query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which two EIGRP metrics have nonzero K values by default? (Choose two)

A
  • delay

- bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Refer to the exhibit. You want router R1 to perform unequal-cost routing to the 192.168.10.0/24 network. What is the smallest EIGRP variance value that you can configure on R1 to achieve this result?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What happens when two EIGRP peers have mismatched K values?

A

The two devices fail to form an adjacency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

When an EIGRP router discovers a new neighbor, which packet type does the router send to help the neighbor build its topology table?

A

updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q
Refer to the exhibit.
R1 interface Loopback0 
 ip address 172.16.1.1. 255.255.255.255 
interface FastEthernet0/0 
 ip address 192.168.10.33 255.255.255.224 
router eigrp 100 
 eigrp router-id 172.16.1.1 
 no auto-summary 
 network 192.168.10.0 
 network 172.16.0.0
R2 interface Loopback0 
 ip address 172.16.2.2 255.255.255.255 
interface FastEthernet0/0 
 ip address 192.168.10.17 255.255.255.240 
 router eigrp 100 
 eigrp router-id 172.16.2.2 
 network 192.168.10.0 
 network 172.16.0.0

R1 and R2 are unable to establish an EIGRP adjacency. Which action corrects the problem?

A

Change the IP address and subnet mask on R2 so that is on the same subnet as R1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Which calculation is used to determine the default EIGRP metric?

A

bandwidth + delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Other than a working EIGRP configuration, which option must be the same on all routers for EIGRP authentication key rollover to work correctly?

A

Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Based on the output, which option is the next hop to get to the 130.0.1.0/24 network?

A

10.20.20.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Which two conditions can cause BGP neighbor establishment to fail? (Choose two)

A
  • There is an access list blocking all TCP traffic between the two BGP neighbors.
  • The BGP neighbor is referencing an incorrect autonomous system number in its neighbor statement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Which BGP option is required when load sharing over multiple equal-bandwidth parallel from a single CE router to a single ISP router over eBGP?

A

eBGP Multipath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Which two options are benefits of BGP peer groups? (Choose two)

A

-A configuration change can be applied simultaneously to all peers in the peer group - Each neighbor in a peer group can have different inbound BGP policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Which criterion does the BGP maximum paths feature use for load balancing?

A

weight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Which adverse circumstance can the TTL feature prevent?

A

DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Which two tasks must you perform to configure a BGP peer group? (Choose two)

A
  • Activate each neighbor

- Assign neighbors to the peer group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which criterion does BGP evaluate first when determining the best path?

A

weight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Which command do you enter on router R6 so that BGP supports multiple protocols?

A

R6(config-router)#no bgp default ipv4-unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Which two BGP neighbor states are valid? (Choose two)

A
  • Established

- Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Refer to the exhibit.
router eigrp 1
redistribute bgp 1 route-map BGP_DEFAULT_ROUTE_RM
network 2.0.0.0
route-map BGP_DEFAULT_ROUTE_RM permit 10
match ip address prefix-list DEFAULT_ROUTE_PL
ip prefix-list DEFAULT_ROUTE_PL seq 10 permit 0.0.0.0/0

For which reason is EIGRP failing to redistribute the default route?

A

The EIGRP process is missing the default metric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Refer to the exhibit. Which option describes why the EIGRP neighbors of this router are not learning routes that are received from OSPF?

router eigrp 1 
 redistribute ospf 100 
 network 10.10.10.0 0.0.0.255 
auto-summary 
! 
router ospf 100 
network 172.16.0.0 0.0.255.255 area 100 
redistribute eigrp 1
A

Default metrics are not configured under EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Refer to the exhibit. How does R1 handle the route to network 10.1.80.0/24?
R1 router eigrp 1 no auto-summary redistribute ospf 1 route-map ospf-to-eigrp default-metric 10000 10 255 1 1500
ip prefix-list ccnp1 seq 5 permit 10.1.48.0/24 le 24 ip prefix-list ccnp2 seq 5 permit 10.1.80.0/24 le 32
ip prefix-list ccnp3 seq 5 permit 10.1.64.0/24 le 24
route-map ospf-to-eigrp permit 10 match ip address prefix-list ccnp1 route-map ospf-to-eigrp permit 20 match ip address prefix-list ccnp2

A

R1 redistributes network 10.1.80.0/24 into EIGRP without changing the mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Which option is an invalid redistribute command option for redistributing routes from EIGRP into OSPF?

A

access list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Which command denies the default route?

A

ip prefix-list de10.ny-route seq 5 deny 0 0 0.0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

A network engineer is configuring a DHCP server to support a specialized application. Which additional DHCP feature must be enabled to support the delivery of various additional parameters to DHCP clients?

A

options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

After testing various dynamic IPv6 address assignment methods, an engineer decides that more control is needed when distributing addresses to clients. Which two advantages does DHCPv6 have over EUI-64 (Choose two)

A
  • DHCPv6 allows for additional parameters to be sent to the client, such as the domain name and DNS server.
  • DHCPv6 providers tighter control over the IPv6 addresses that are distributed to clients.
140
Q

Which three options are valid DHCPv6 functions? (Choose three)

A
  • Server
  • Client
  • Relay
141
Q

DHCPv6 can obtain configuration parameters from a server through rapid two-way message exchange. Which two steps are involved in this process? (Choose two)

A
  • Solicit

- reply

142
Q

Which set of actions does a network engineer perform to set the IPv6 address of a DHCP relay server at the VLAN interface level?

A

Enter the VLAN interface configuration mode, enable IPv6 DHCP relay, and define the IPv6 address of a DHCP relay server

143
Q

Where must a network engineer configure the ip helper-address command on a router?

A

On the interface that will receive the broadcasts

144
Q

When a new PC is connected to the network, which step must it take first to receive a DHCP address?

A

It sends a DHCPDISCOVER message to 255.255.255.255

145
Q

Which two tasks does a DHCP relay agent perform? (Choose two)

A
  • It forwards DHCPDISCOVER and DHCPREQUEST messages to the DHCP server
  • It forwards DHCPOFFER and DHCPACK messages to the DHCP client
146
Q

Consider this scenario. TCP traffic is blocked on port 547 between a DHCPv6 relay agent and a DHCPv6 server that is configured for prefix delegation. Which two outcomes will result when the relay agent is rebooted? (Choose two)

A
  • Routers will not obtain DHCPv6 prefixes.

- The DHCPv6 relay agent will resume distributing addresses.

147
Q

Refer in the exhibit.
interface FastEthernet0/0 ip helper-address 192.168.145.5
A packet capture indicates that the router is not forwarding the DHCP packets that it receives on interface FastEthernet0/0. Which command needs to be entered in global configuration mode to resolve this issue?

A

ip DHCP relay

148
Q

After reviewing the EVN configuration, a network administrator notices that a predefined EVN, which is known as ―vnet global‖ was configured. What is the purpose of this EVN? (OR) What is the purpose of ‗vnet global‖?

A

It refers to the global routing context and corresponds to the default RIB.

149
Q
Refer to the exhibit.
-hostname R1 ! ip vrf Yellow 
rd 100:1 ! interface Serial0/0 
 ip vrf forwarding Yellow 
 ip address 209.165.202.129 255.255.255.224 ! 
ip route 209.165.202.129 255.255.255.224 null0 ! router eigrp 100 
address-family ipv4 vrf Yellow 
network 209.165.202.129 0.0.0.0 
no auto-summary 
autonomous-system 100 
redistribute static
-hostname R2 ! 
ip vrf Yellow 
 rd 100:1 !
interface Serial0/0 
 ip vrf forwarding Yellow 
 ip address 209.165.202.130 255.255.255.224 ! 
router eigrp 100 
 address-family ipv4 vrf Yellow 
 network 209.165.202.130 0.0.0.0 
 no auto-summary 
 autonomous-system 100

A senior network engineer tries to propagate a summary route 209.165.201.0/27 to R2 by redistributing static route on R1, but setup is not working. What is the issue with the configuration in the exhibit.

A

The summary route is in the global routing table.

150
Q

Which technology does Easy Virtual Network use?

A

VRF-Lite

151
Q

Which technology is required on an EVN trunk interface?

A

802.1q

152
Q
Refer to the exhibit.
hostname R1 ! 
ip vrf Yellow 
 rd 100:1 ! 
interface Serial0/0 
 ip vrf forwarding Yellow
 ip address 209.165.202.129 255.255.255.224 ! router eigrp 100 
 address-family ipv4 vrf Yellow 
 network 209.165.202.129 0.0.0.0 
 no auto-summary
hostname R2 ! 
 ip vrf Yellow 
 rd 100:1 !
interface Serial0/0 
 ip vrf forwarding Yellow
 ip address 209.165.202.130 255.255.255.224 ! 
router eigrp 100 
address-family ipv4 vrf Yellow 
network 209.165.202.130 0.0.0.0 
no auto-summary

A network engineer is unable to make VRF lite EIGRP adjacency work. There is nothing wrong with communication between R1 and R2. What command will eliminate the issue when executed on both routers?

A

(config-router-af)#autonomous-system 100

153
Q

Which two statements about EVN are true? (Choose two)

A
  • Virtual network tags are assigned per-VRF.

- The VLAN ID in the 802.1q frame carries the virtual network tag.

154
Q

What is the primary service that is provided when you implement Cisco Easy Virtual Network?

A

It allows for traffic separation and improved network efficiency.

155
Q

Which condition must be met before two EVN devices can connect?

A

A trunk interface must be configured between the devices.

156
Q

Where does the EVN marks the traffic to separate different users?

A

On the trunk, with VNET tag

157
Q

Which two statements about EVN are true? (Choose two)

A
  • It uses redistribution to share routes between VNs.

- A configuration can be based on an existing VRF configuration.

158
Q

Which protocol does VRF-Lite support?

A

EIGRP

159
Q

A customer asks its service provider for VPN support for IPv4 and IPv6 address families. Which command enables a VRF that supports these requirements?

A

Router(config-vrf)#vrf definition CUSTOMER

160
Q

Which technology supports overlapping IP addresses on a single interface?

A

VRF-Lite

161
Q
Refer to the exhibit.
interface gigabitethernet 2/0/0 
vnet trunk 
ip address 192.168.1.1 255.255.255.0
vnet name cisco

Which effect of this configuration is true?

A

It designates the interfaces as an EVN trunk

162
Q

What is the role of a route distinguisher via a VRF-Lite setup implementation?

A

It extends the IP address to identify which VRF instance it belongs to.

163
Q

Which statement is true about an edge interface in relation to the Cisco Easy Virtual Network?

A

An edge interface connects a user device to the EVN while defining the EVN boundaries.

164
Q

Which two statements about EVNs are true? (Choose two)

A
  • All EVNs within a trunk interface can share the same IP infrastructure
  • Commands that are specified once under a trunk interface can be inherited by all EVNs
165
Q

Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three)

A
  • simplified Layer 3 network virtualization
  • improved shared services support
  • enhanced management, troubleshooting, and usability
166
Q

What is VRF-lite?

A

VRF without MPLS

167
Q

Which CLI command can you enter to permit or deny IPv6 traffic travelling through an interface?

A

ipv6 traffic-filter

168
Q

Which two technologies can encapsulate an IPv6 payload in an IPv4 packet for transmission across a network? (Choose two)

A
  • ISATAP

- NAT-PT

169
Q

When a packet is denied by an IPv6 traffic filter, which additional action does the device perform?

A

It generates an ICMP unreachable message for the frame.

170
Q

Which two options are components of a dual stack? (Choose two)

A
  • IPv6 traffic

- IPv4 traffic

171
Q

What are two limitations when in use of NPTv6 for IPV6 vs IPV6 Address translation? (Choose two)

A
  • lack of overloading functionality

- mismatched prefix allocations

172
Q

Which two statements about 6to4 tunneling are accurate? (Choose two)

A
  • Each 6to4 site receives a /48 prefix in a 6to4 tunnel

- Prepending 0x2002 with the IPv4 address creates an IPv6 address that is used in 6to4 tunneling

173
Q

The Neighbor Discovery Protocol in IPv6 is replaced with which discovery protocol in IPv4?

A

ARP

174
Q

Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation?

A

rewriting of higher layer information

175
Q

Company is deploying a multicast application that must be accessible between sites, but must not be accessible outside of the organization. Based on the scoping requirements, the multicast group address for the application will be allocated out of which range?

A

FF08::/16

176
Q

Which statement about stateless and stateful IPv6 autoconfiguration are true?

A

Stateless autoconfiguration requires no additional setup, whereas stateful autoconfiguration requires additional setup

177
Q

Which two statements about uRPF are true? (Choose two)

A
  • Strict mode may drop legitimate traffic

- It is enabled on a per interface basis

178
Q

Which command sequence can you enter on a router to configure Unicast Reverse Path Forwarding in loose mode?

A

interface GigabitEthernet0/0

ip verify unicast source reachable-via any

179
Q

Refer to the exhibit.
The IP SLA configuration of R1 is shown below:
R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface f1/0
R1(config-ip-sla)#frequency 10
R1(config-ip-sla)#threshold 100
R1(config)#ip sla schedule 1 start-time now life forever R1(config)#track 10 ip sla 1 reachability
R1(config)#ip route 0.0.0.0.0 0.0.0.0 172.20.20.2
What makes default route not removed when SLA state down or failed?

A

missing of track feature on default static route command

180
Q

A network engineer wants to baseline the network to determine suitability for real-time voice applications. Which IP SLA operation is best suited for this task?

A

UDP-jitter

181
Q

Refer to exhibit. Which two reasons for IP SLA tracking failure are likely true? (Choose two)
R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet0/0
R1(config-ip-sla-echo)#timeout 5000
R1(config-ip-sla-echo)#frequency 10
R1(config-ip-sla-echo)#threshold 500
R1(config)#ip sla schedule 1 start-time now life forever
R1(config)#track 10 ip sla 1 reachability
R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2 track 10
R1(config)#no ip route 0.0.0.0 0.0.0.0 172.20.20.2
R1(config)#ip route 0.0.0.0 0.0.0.0 172.30.30.2 5

A
  • A route back to the R1 LAN network is missing in R2

- The threshold value is wrong

182
Q

Which IP SLA operation can be used to measure round-trip delay for the full path and hop-by-hop round-trip delay on the network?

A

ICMP path echo

183
Q

A network engineer wants to monitor hop by hop response time on the network. Which IP SLA operation accomplishes this task?

A

ICMP path echo

184
Q

Which three IP SLA performance metrics can you use to monitor enterprise-class networks? (Choose three)

A
  • Packet loss
  • Delay
  • Connectivity
185
Q

Which three items can you track when you use two time stamps with IP SLAs? (Choose three)

A
  • delay
  • jitter
  • packet loss
186
Q

Which feature can be used to reduce the number of ICMP unreachable message egressing a router?

A

ICMP rate-limiting

187
Q

Which LAN feature enables a default gateway to inform its end device?

A

ICMP redirects

188
Q

Which IP SLA operation can be used to simulate voice traffic on a network?

A

UDP-jitter

189
Q

Which location within the network is preferred when using a dedicated router for Cisco IP SLA operations?

A

provider edge

190
Q

Which two statements about ICMP unreachable messages are true? (Choose two)

A
  • They are sent when a route to the destination is missing from the routing table
  • They include a portion of the original data so that the source can identify the process that generated the message
191
Q

When does a Cisco router send an ICMP redirect?

A

when the packet‘s ingress and egress interface are the same

192
Q

Which two types of threshold can you configure for tracking objects? (Choose two)

A
  • percentage

- weight

193
Q

Which type of information is displayed when a network engineer executes the show track 1 command on the router?

A

information about tracking list 1

194
Q

A network engineer is asked to create an SNMP-enabled proactive monitoring solution to ensure that jitter levels remain between particular boundaries. Which IP SLA option should the engineer use?

A

threshold

195
Q

Which three statements about SNMP are true? (Choose three)

A
  • The manager sends GET and SET messages.
  • SNMPv3 supports authentication and encryption
  • The manager polls the agent using UDP port 161
196
Q

In SNMPv3, which security level provides encryption of the data?

A

authPriv

197
Q

What does the number 16 in the following command represent?

Router(config)#snmp-server user abcd public v2c access 16

A

the standard named access list 16, which contains the access rules that apply to user abcd

198
Q

In SNMPv3, which security level provides encryption of the data?

A

authPriv

199
Q

Which SNMP model and level can provide DES encryption?

A

SNMPv3 authPriv

200
Q

Refer to the exhibit.
snmp-server community ciscotest
snmp-server host 192.168.1.128 ciscotest
snmp-server enable traps bgp
Which effect of this configuration is true?

A

The device sends SNMP traps related to BGP operations to host 192.168.1.128

201
Q

Which SNMP verification command shows the encryption and authentication protocols that are used in SNMPv3?

A

show snmp user

202
Q

Refer to the following command.
Logging Console 7
Which option is one of the effects entering this command on a Cisco IOS router, with no additional logging configuration?

A

The router can experience high CPU utilization

203
Q

A router is connected to a Windows Syslog server which does not function. What is the reason?

A

Firewall is blocking UDP port 514

204
Q

A network engineer executes the commands ―logging host 172.16.200.225‖ and ―logging trap 5‖. Which action results when these two commands are executed together?

A

Logging messages that have a severity level of ―notifications‖ and above (numerically lower) are sent to the remote server 172.16.200.225

205
Q

Refer to the exhibit.
A network engineer has configured NTP on a Cisco router, but the time on the router is still incorrect. What is the reason for this problem?

A

The router is not syncing with the peer, even though the NTP request and response packets are being exchanged.

206
Q

Which two statements about NTP stratum are true? (Choose two)

A
  • Stratum 2 devices receive their time from a peer that is connected directly to an authoritative time source
  • Stratum 1 devices are connected directly to an authoritative time source
207
Q
Refer to the exhibit. Which effect of this configuration is true?
R1# show run | include ntp 
ntp master 5 
ntp authenticate 
ntp authentication-key 1 md4 123Cisco 
ntp authentication-key 5 md4 Cisco123 
ntp trusted-key 1
A

R1 acts as an authoritative clock at stratum 5

208
Q

Refer to the following configuration command.
router (config-line)# ntp master 10
Which statement about this command is true?

A

The router acts as an authoritative NTP clock at stratum 10.

209
Q
Refer to exhibit:
access-list 1 permit 192.168.1.1 access-list 1 deny any
access-list 2 permit 192.168.1.4 
access-list 2 deny any ! 
ntp access-group peer 2 
ntp access-group serve 1 
ntp master 4 !
Which three NTP features can be deduced on the router? (Choose three)
A
  • Only accepts time requests from 192.168.1.1
  • Only is in stratum 4
  • Only updates its time from 192.168.1.4
210
Q

Which three NTP operating modes must the trusted-key command be configured on for authentication to operate properly? (Choose three)

A
  • Client
  • Server
  • Broadcast
211
Q

Which two statements about NTP operation are true? (Choose two)

A
  • If multiple NTP servers are configured, the one with the lowest stratum is preferred
  • By default, NTP communications use UDP port 123.
212
Q

Which statement describes what this command accomplishes when inside and outside interfaces are correctly identified for NAT?
ip nat inside source static tcp 192.168.1.50 80 209.165.201.1 8080 extendable

A

It allows external clients to connect to a web server hosted on 192.168.1.50.

213
Q

Which option is a prerequisite for stateful NAT64?

A

DNS64

214
Q

Which technology uses the many-to-one method of mapping IP addresses?

A

PAT

215
Q

Which three functionalities are specific to stateful NAT64? (Choose three)

A
  • It conserves IPv4 addresses
  • A state or bindings are created on every unique translation.
  • No constraint is put on the number of endpoints due to 1 :N translation.
216
Q

Which command enables NAT-PT on an IPv6 interface?

A

ipv6 nat

217
Q

Which functionality is required within an IP router that is situated at the boundary of an IPv4 network and an IPv6 network to allow communication between IPv6-only and IPv4-only nodes?

A

Network Address Translator-Protocol Translator (NAT-PT)

218
Q

Which NAT command to disable dynamic ARP learning on an interface?

A

R(config)# ip nat allow-static-host

219
Q

Which feature or technology is supported with stateful NAT64?

A

VFR

220
Q

What does stateful NAT64 do that stateless NAT64 does not do?

A

Stateful NAT64 maintains bindings or session state while performing translation

221
Q

What are two options for authenticating a user who is attempting to access a network device? (Choose two)

A
  • RADIUS

- TACACS+

222
Q

Which keyword of the AAA authentication PPP command supports PAP only?

A

krb5

223
Q

A network access serve using TACACAS+ for AAA operations receives an error message from the TACACS+ server. Which action does the network access server take next?

A

It checks the method list for an additional AAA option

224
Q

In which network environment is AAA with RADIUS most appropriate?

A

when users require access to only one device at a time

225
Q

A user is attempting to authentication on the device connected to a TACACS+ server but the server require more information from the user to complete authentication. Which reponse does the TACACS+ daemon return?

A

CONTINUE

226
Q

Which two statements about AAA with the local database are true? (Choose two)

A

-It supports a limited number of usernames and passwords -Accounting is not supported locally

227
Q

Which two features does RADIUS combine? (Choose two)

A
  • Authentication

- Authorization

228
Q

A network engineer executes the ―show ip cache flow‖ command. Which two types of information are displayed in the report that is generated? (Choose two)

A
  • flow sample for specific protocols

- IP packet distribution

229
Q

Where is the best place to position a NetFlow server?

A

WAN edge

230
Q

Which two statements about NetFlow templates are true? (Choose two)

A
  • Only NetFlow version 9 is template based

- Template can increased bandwidth usage

231
Q

Where can NetFlow export data for long term storage and analysis?

A

collector

232
Q

Which version or versions of NetFlow support MPLS?

A

NetFlow version 9

233
Q

Refer to the exhibit. How can you configure a second export destination for IP address 192.168.10.1?

configure terminal
ip flow-export destination 192.168.10.1 9991
ip flow-export version 9

A

Specify a different UDP port

234
Q

Which two commands would be used to troubleshoot high memory usage for a process? (Choose two)

A
  • router#show memory allocating-process table

- router#show memory summary

235
Q

Which statement about conditional debugging is true?

A

You can limit the output to a specific interface

236
Q

Which two debug commands can you use to view issues with CHAP and PAP authentication? (Choose two)

A
  • debug ppp authentication

- debug ppp negotiation

237
Q

Which action can you take to mitigate unicast flooding in a network?

A

Set the ARP timer value to less than the CAM timer value.

238
Q

Which three causes of unicast flooding are true? (Choose three)

A
  • forwarding table overflow -changes in STP topology

- asymmetric routing

239
Q

What happens when unicast flood protection is triggered on a VLAN?

A

The VLAN is shut down

240
Q

Which adverse event can occur as a consequence of asymmetric routing on the network?

A

unicast flooding

241
Q

How can you minimize unicast flooding in a network?

A

Set the router‘s ARP timeout value to be the same as the timeout value for Layer 2 forwarding table entries

242
Q

Which of the following situations results in a routing loop?

A

when you have multiple points of redistribution

243
Q

Which three methods can a network engineer use to fix a metric-based routing loop in the network? (Choose three)

A
  • Filter routes based on tags -Implement offset lists at network boundaries
  • Filter routes manually using distribute lists
244
Q

Which command do you enter to filter only routing updates that are sent through interface GigabitEthernet0/0?

A

R1(config-router)#passive-interface GigabitEthernet0/0

245
Q

Given the network diagram, which address would successfully summarize only the networks seen?

A

192.168.8.0/21

246
Q

How big is the smallest packet that will always be fragmented on a standard Ethernet network with default configuration?

A

1800 bytes

247
Q

Which option is the best for protecting CPU ultilization on a device?

A

COPP

248
Q

Which STP feature can reduce TCNs on ports that are connected to end devices?

A

PortFast

249
Q

Which two causes of latency are true? (Choose two)

A
  • Propagation delay

- Serialization delay

250
Q

In which scenario can asymmetric routing occur?

A

redundant routers running VRRP

251
Q

The Cisco ASA 500 Series Security Appliances are built specifically for businesses with less than 100 employees. What are three important benefits of this device? (Choose three)

A
  • business-grade firewall
  • site-to-site VPN for remote offices
  • email security
252
Q

Drag and drop for adverse network conditions.

  1. Excessive unicast flooding condition:
  2. Out-of-order packets:
  3. TCP starvation:
  4. Asymmetric routing:
  5. Latency:
A
  1. caused by including a host port in STP
  2. potential result of disabling FIFO
  3. potential effect of excessive UDP traffic on link
  4. cause of inconsistent traffic patterns
  5. condition in which packets require an excessive length of time to traverse a switch
253
Q

Drag drop the correct descriptions on the right to the Frame Relay LMI extensions on the left.

1 Address registration 
2 Global addressing  
3 Multicasting 
4 Simple flow control 
5 Virtual circuit status messages
A

1 It allows neighboring Cisco devices to exchange management IP addresses
2 It enables the Frame Relay network to identify interfaces in the same manner as a LAN
3 It provides the most efficient transmission of routing protocol messages and supports address resolution
4 It supports devices that are unable to use congestion notification
5 It prevents data from being transmitted into black holes

254
Q

Drag the descriptions on the left to the appropriate group on the right.

1 Authentication
2 Authorization
3 Accounting

A

1
+ supports a local database for device access
+ supports encryption
2
+ specifies a user‘s specific access privileges
+ enforces time periods during which a user can access the device
3
+ not supported with local AAA
+ verifies network usage

255
Q

Drag drop about AAA commands.

1 if authenticated – 
2 none –  
3 local – 
4 krb5-instance – 
5 group radius – 
6 group tacas+ –
A

1 It allows the user to perform the requested function once authenticated
2 It instructs the network access server to proceed without requesting authorization information
3 It provides authorization for a limited set of functions only
4 It uses a defined instance for authorization
5 It uses authorization information from a standards based server
6 It uses authorization information stored as attribute value pair in a Cisco proprietary server

256
Q

Refer to the exhibit. You are configuring the R1 Serial0 interface for a multipoint connection. Drag and drop the required configuration statements from the left onto the corresponding locations from the diagram on the right.

1 interface Ethernet0 
 ip address 10.1.1.2 255.255.255.0
Serial interface config
2 no ip address 
3 frame-relay lmi-type ansi
 subinterface config 
4 ip address 192.168.1.5 255.255.255.240
A

1 interface Serial0
2 encapsulation frame-relay
3 interface Serial0.1 multipoint
4 frame-relay map ip 192.168.1.1 100 broadcast

257
Q

Drag and drop the GRE features from the left onto the correct description on the right.

1 mGRE: 
2 IPSec: 
3 Keepalive: 
4 Tunnel Key: 
5 MSS:
A

1 technology that supports dynamic tunnel endpoints
2 encryption protocol used to source tunnels
3 technology that prevents one side of the tunnel from going down while the other stays up
4 clear-text password that confirms the peer connection
5 configurable value that prevents an interface from sending packets that are too large for the tunnel

258
Q

Drag and drop the AAA features from the left onto the correct description on the right.

1 Authentication: 
2 Accounting: 
3 TACACS+: 
4 RADIUS: 
5 Authorization:
A
1 challenge and response operation 
2 feature that logs network usage 
3 authentication method that uses TCP 
4 authentication method that uses UDP 
5 controls specific access privileges of a user
259
Q

Drag and drop each statement about uRPF on the left to the correct uRPF mode on the right.

1 Loose Modes:
2 Strict Modes:

A

1
+ It supports using the default route as a route reference
+ It requires the source address to be routable
2
+ It can drop legitimate traffic
+ It permits only packets that are received on the same interface as the exit interface for the destination address

260
Q

Refer to the exhibit. You are configuring the R1 Serial0 interface for a point-to-point connection. Drag and drop the required configuration statements from the left onto the correct locations from the diagram on the right. Not all commands are used.

Interface Serial0/0/0
1
encapsulation frame-relay
frame-relay lmi-type ansi
!subinterface config
2
3
interface virtual-template 1
ip unnumbered ethernet 0
4
A

1 no ip address
2 interface serial0.1 point-to-point
3 frame-relay interface-dlci 100 ppp virtual-template1
4 ppp authentication chap

261
Q

Drag and drop the statements from the left onto the correct IPv6 router security features on the right.

1 IPv6 Traffic Filter

2 IPv6 Access Classes management traffic

A

1
+ It filters traffic on the interface level
+ It supports tagged ACLs

2
+ It controls traffic to and from the router
+ It requires the destination address for inbound traffic to be a local address
+ It filters

262
Q

Drag and drop the statements about device security from the left onto the correct description on the right.

1 CoPP:

2 MPP:

A

1
+ It protects the device against DoS attacks
+ It supports packet forwarding by reducing the load on the device
+ It uses QoS to limit the load on the device
2
+ It designates the permitted management interfaces on the device
+ It is enabled only when an interface is configured
+ It requires only a single command to configure

263
Q

Drag and drop the correct description on the right onto the corresponding ACL types on the left.

1 Dynamic: 
2 Extended: 
3 Reflexive:  
4 Standard: 
5 Time-based:
A

1 ACL that uses Telnet for Authentication
2 ACL type that should be placed closest to the traffic source
3 ACL that must be defined with a named ACL
4 ACL numbered from 1300 through 1999
5 ACL that applied to traffic only during specifically defined periods

264
Q

Drag and drop the steps in the NAT process for IPv4-initiated packers from the left into the correct sequence on the right.

Step 1:
Step 2:
Step 3:
Step 4:

A

Step 1: The packet is routed to an NVI
Step 2: The packet is assigned a dynamic or static binding
Step 3: The IPV4 source address is translated to IPv6
Step 4: The translation information is used to create a session

265
Q

Drag the items on the left to the proper locations on the right.

1 network-specific stateful NAT64 prefix:
2 NAT64 :
3 NPTv6 :
4 well-known stateful NAT64 prefix:

A

1 IPv6 prefix assigned by an organization
2 supports application layer gateway
3 translates 2001:1::/64 to 2001:2::/64
4 supports IPv6 prefix 64:FF9B::/96

266
Q

A network engineer configures two connected routers to run OSPF in Area 0; however, the routers fail to establish adjacency. Which option is one of the caused for this issue?

A

The Same OSPF router IDs are configured on both routers

267
Q

A network engineer trying to synchronize the time clock but the time is not working. What is likely the cause of this problem?

A

Either a firewall between the two routers or an ACL on the router is blocking UDP 123.

268
Q

Refer to the exhibit. Router DHCP is configured to lease IPv4 and IPv6 addresses to clients on ALS1 and ALS2. Clients on ALS2 receive IPv4 and IPv6 addresses. Clients on ALS1
receive IPv4 addresses. Which configuration on DSW1 allows clients on ALS1 to receive IPv6 addresses?

DSW1#sh run int f0/0 
Building configuration… 
! 
interface FastEhternet0/0 
ip address 10.4.10.1 255.255.255.0 
ip helper-address 4.4.4.4 
duplex auto 
speed auto 
ipv6 address 2002:A04:A01:A04:A01/120 
ipv6 enable
end
A

DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

269
Q

Which two statements about configuring Frame Relay point-to-multipoint connections are true? (Choose two)

A
  • They require the frame-relay mapping command to be configured
  • They require inverse ARP
270
Q

Which interface type does a PPPoE client use to establish a session?

A

dialer

271
Q

Which values identifies VPNs in an EVN environment?

A

virtual network tag

272
Q

Which two protocols are required for DMVPN? (Choose two)

A
  • mGRE

- NHRP

273
Q

Which command do you enter to display log messages with a timestamp that includes the length of time since the device was last rebooted?

A

service timestamps log uptime

274
Q

A network engineer executes the command ―show ip eigrp vrf purple topology‖. Which type of information is displayed as a result?

A

route successors for a specific routing table

275
Q

A network engineer wants an NTP client to be able to update the local system without updating or synchronizing with the remote system. Which option for the ntp access-group command is needed to accomplish this?

A

Serve

276
Q

Which option is invalid when configuring Unicast Reverse Path Forwarding?

A

source reachable via both

277
Q

Drag and drop the statements about NAT64 from the left onto the correct NAT64 types on the right.

1 Stateful:

2 Stateless:

A

1
+ It supports FTP64 for ALG + It supports PAT and overload + It allows IPv6 systems to use any type of IPv6 address
2
+ ALG is not supported
+ It supports one-to-one mapping only
+ It requires IPv6 systems to use RFC6052 IPv4-translatable addresses

278
Q

Which statement about the metric calculation in EIGRP is true?

A

The minimum bandwidth between the source and destination is used

279
Q

Which two steps must you perform to allow access to a device when the connection to a remote TACACS+ authentication server fails? (Choose two)

A

1 Include the local keyword in the AAA configuration

2 Configure a local username and password on the device

280
Q
Refer to the exhibit.
ip vrf BLUE 
ip vrf RED 
! 
interface FastEthernet0/0 
ip vrf forwarding RED
ip address 10.1.1.1 255.255.255.0 
! 
interface FastEthernet0/1 
ip vrf forwarding BLUE 
ip address 10.1.2.1 255.255.255.0

Network users on the 10.1.2.0/24 subnet have a default gateway of 10.1.2.254. Which command will configure this gateway?

A

router(config)#ip route vrf BLUE 0.0.0.0 0.0.0.0 10.1.2.254

281
Q

Refer to the exhibit.

Router# show processes cpu sorted
Router# show processes memory sorted

Based on Cisco best practice, which statement about the output is true?

A

The output should be analyzed by a network engineer before executing any debug commands on an IOS router in production

282
Q

Users were moved from the local DHCP server to the remote corporate DHCP server. After the move, none of the users were able to use the network. Which two issues wil prevent this setup from working properly? (Choose two)

A

-The DHCP server IP address configuration is missing locally -The route to the new DHCP server is missing

283
Q

Which two statements about the OSPF down bit are true? (Choose two)

A
  • It is set only for LSA types 3,5, and 7

- It is set when MP-BGP routes are redistributed into OSPF

284
Q

Which command can be entered on router R5 to configure 80 percent of the bandwidth of a link for EIGRP Autonomous System 55?

A

R5(config-if)#ip bandwidth-percent eigrp 55 80

285
Q

Which two addresses types are included in NAT? (Choose two)

A
  • inside global

- outside local

286
Q

Refer to the exhibit.

Hostname R1 
! 
ip vrf Yellow 
rd 100:1 
interface Serial0/0 
ip vrf forwarding Yellow 
ip address 192.168.1.1 255.255.255.0
! 
router eigrp 100 
network 192.168.1.1 0.0.0.0 
no auto-summary 
redistribute static 
! 
R1#ping vrf Yellow 192.168.1.2 
Type escape sequence to abort. 
Sending 5, 100-byte ICMP Echoes to 192.168.1.2, timeout is 2 second: 
!!!!! 
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms

R1 is configured with VRF-Lite and can ping R2. R2 is fully configured, but it has no active EIGRP neighbors in vrf Yellow If the configuration of R2 is complete, then which issue prevents the EIGRP 100 neighbor relationship in vrf Yellow from forming?

A

EIGRP 100 network 192 168 1 0/24 is configured in the global routing table on R1

287
Q

Which two LSA types were introduced to support OSPF for IPv6? (Choose two)

A
  • type 9

- type 8

288
Q

Which two statements about DMVPN are true? (Choose two)

A
  • It uses NHRP to create a mapping database of spoke addresses
  • It supports dynamic addresses for spokes in a hub-and-spoke VPN topology
289
Q

A netwoik engineer is configuring two dedicated Internet connections within the Internet module One connection is the primary connection to all wired business communications while Che other is the primary connection for all customer wireless traffic If one of the links goes down, the affected traffic needs to be redirected to the redundant link Winch current technology should be deployed to monitor the scenario?

A

IP SLA

290
Q

Refer to the exhibit.

access-list 1 permit 10.1.1.0 0.0.0.255
access-list 1 deny any

Which command we use to control the type of routes that are processed in incoming route updates?

A

distribute-list 1 in

291
Q

Which two types of traffic can benefit from LLQ? (Choose two)

A
  • voice

- video

292
Q

A network administrator is attempting to configure IP SLA to allow one time stamp to be logged when a packet arrives on the interface and one time stamp to be logged when a packet leaves the interface. Which IP SLA accuracy tool enables this functionality?

A

Responder

293
Q

Which two actions are common methods for migrating a network from one protocol to another? (Choose two)

A
  • redistributing routes from the current routing protocol to the new routing protocol
  • changing the relative administrative distances of the two routing protocols
294
Q

Which statements best describes the following two OSPF commands, which are used to summarize routes?

area 0 range 192.168.110.0 255.255.0.0
summary-address 192.168.110.0 255.255.0.0

A

The area range command specifies the area where the subnet resides and summarizes it to other areas. The summary-address command summarizes external routes

295
Q

Which action is the most efficient way to handle route feedback when converting a RIPv2 network to OSPF?

A

Implement route tags

296
Q

Which types of LSAs are present in the stub area?

A

LSA type 1, 2 and 3

297
Q

What is the hop count is advertised for an unreachable network by a RIP router that uses poison reverse?

A

16

298
Q

Refer to the exhibit.

aaa new-model
aaa authentication login default local-case enable
aaa authentication login ADMIN local-case
username CCNP secret Str0ngP@ssw0rd!
line 0 4
login authentication ADMIN

How can you change this configuration so that when user CCNP logs in, the show run command is executed and the session is terminated?

A

Add the autocommand keyword to the username command

299
Q

Refer to the exhibit.

router ospf 10 
router-id 192.168.1.1 
log-adjacency-changes 
redistribute bgp 1 subnets route-map BGP-TO-OSPF 
!
route-map BGP-TO-OSPF deny 10 
match ip address 50 
route-map BGP-TO-OSPF permit 20 
! 
access-list 50 permit 172.16.1.0 0.0.0.255

Which statement about redistribution from BGP into OSPF process 10 is true?

A

Network 172.16.1.0/24 is not redistributed into OSPF

300
Q

Which functions are included in the two-message rapid exchange that a DHCPv6 client can receive from a server?

A

solicit and reply

301
Q

Refer to the exhibit.
(exhibit missing)
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

A

CISCO

302
Q

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A
  • The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database
  • The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table
303
Q

A network engineer executes the show ip flow interface command. Which type of information is displayed on the interface?

A

NetFlow configuration

304
Q

Which two statements are differences between AAA with TACACS+ and AAA with RADIUS? (Choose two)

A
  • Unlike TACACS+, RADIUS sends packets with only the password encrypted.
  • Only TACACS+ uses TCP
305
Q

Which IOS commands can you use to limit the CPU impact of log generation and transmission on an IOS router?

A

You can use the ip access-list logging interval command in conjunction with the logging rate-limit command.

306
Q

You are configuring a Microsoft client to call a PPP server using CHAP. Only the client will be authenticated but the client‘s password has expired and must be changed. Which PPP server configuration allows the call to be completed?

A

ppp authentication ms-chap-v2 callin

307
Q

Which command creates a manual summary on an interface when using EIGRP?

A

ip summary-address eigrp 100 172.32.0.0 255.255.254.0

308
Q

A network engineer wants to implement an SNMP notification process for host machines using the strongest security available. Which command accomplishes this task?

A

router(config)#snmp-server host 172.16.200.225 traps v3

309
Q

Which issue is important to address when integrating two networks with different routing protocol?

A

preventing asymmetric routing

310
Q

Drag and drop the DMVPN components from the left onto the correct descriptions on the right.

1 hub –
2 spoke –
3 mGRE –
4 NHRP –

A

1 device that acts as the next-hop server
2 device that is usually identified with a dynamic address
3 technology that allows one interface to support multiple tunnels
4 protocol that allows spokes to communicate directly with one another

311
Q

Refer to the exhibit.

%Interfact GigabitEthernet1: IPv4 disabled and address(es) removed due to enabling VRF
CUST_A

An engineer is enabling VPN service for a customer and notices this output when placing the customer-facing interface into a VRF. Which action corrects the issue?

A

Reconfigure the IP address on Gigabit Ethernet 1

312
Q

Which two statements about VRF-Lite configurations are true? (Choose two)

A
  • Different customers can have overlapping IP addresses on different VPNs
  • Each customer has its own private routing table.
313
Q

Which two statements about PPPoE packet types are true? (Choose two)

A
  • PADI is an initialization packet sent as a broadcast message
  • PADO is a unicast reply packet sent to the client
314
Q

Which two statements are examples of the differences between IPv4 and IPv6 EIGRP? (Choose two)

A
  • IPv6 keyword is used in many EIGRP commands

- Network command is not used in IPv6

315
Q

Refer to the exhibit.
VRF HUB (VRF Id = 3): default RD 100:10;
default VPNID
New CLI format, supports multiple address-families
Flags: 0x180C
Interfaces:
G1/1
Address family ipv4 unicast (Table ID = 0x3)
Flags: 0x0
Export VPN route-target communities
RT 100:10
Import VPN route-target communities
RT 100:10 RT 200:20
No import route-map
No global export route-map
No export route-map
VRF label distribution protocol: not configured VRF label allocation mode: per-prefix
Address family ipv6 unicast (Table ID = 0x1E000001)

VRF SPOKE (VRF Id = 4): default RD 200:20; 
default VPNID  
New CLI format, supports multiple 
address-families 
Flags: 0x180C 
Interfaces: 
G1/2 
Address family ipv4 unicast (Table ID = 0x4) 
Flags: 0x0 
Export VPN route-target communities 
RT 200:20
Import VPN route-target communities 
RT 200:20 
No import route-map 
No global export route-map 
No export route-map 
VRF label distribution protocol: not configured 
VRF label allocation mode: per-prefix 
Address family ipv6 unicast (Table ID = 0x1E000001)

A network engineer is modifying configurations for a customer that currently uses VPN connectivity between their sites The customer has added a new spoke site but it does not have reachability to servers located at the hub. Based on the output which statement describes the cause?

A

The SPOKE VRF is not impoThe SPOKE VRF is not importing Route-Target 100:10rting Route-Target 100:10

316
Q

Which statement about dynamic NAT is true?

A

It maps inside addresses to a pool of global addresses

317
Q

Which statement about the IP SLA feature is true?

A

It measures how the network treats traffic for specific applications by generating traffic that bears similar characteristics to application traffic

318
Q

A network engineer is enabling conditional debugging and execute two commands: debug condition interfaces serial0/0 and debug condition interfaces serial 0/1. Which debugging output is displayed as a result?

A

Output is display for both specified interfaces.

319
Q

What is the DHCP option to download TFTP info to a Cisco phone?

A

option 66

320
Q

What type of address OSPFv3 uses to form adjacency and send updates?

A

link-local

321
Q

What security feature is supported across all SNMP version?

A

noauthnopriv

322
Q

A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three)

A
  • inbound crypto map
  • remaining key lifetime
  • path MTU
323
Q

Drag drop about AAA.

1 Auth-proxy: 
2 Commands: 
3 Connection: 
4 Exec: 
5 Network: 
6 Resources:
A

1 It returns information about hosts using proxy service
2 It returns information about individual EXEC commands and permissions associated with a privilege level
3 It returns information about outbound communications from the network access server
4 It returns information about user EXEC terminal sessions with the network access server
5 It returns information about SLIP, PPP and ARA sessions
6 It returns information about calls that have passed and failed user authentication

324
Q

What are two reasons to use multicast to deliver video traffic, instead of unicast or broadcast?

A
  • It supports distributed applications

- It enables multiple clients to receive the video stream simultaneously

325
Q

Which two statements about PAP authentication in a PPP environment are true? (Choose two)

A
  • It is performed at the beginning of the session only

- It sends the password in clear text

326
Q

Which two tasks should you perform to begin troubleshooting a network problem? (Choose two)

A
  • Gather all the facts

- Define the problem as a set of symptoms and causes

327
Q

Which two piece of information can you learn by viewing the routing table? (Choose two)

A
  • Whether the administrative distance was manually or dynamically configured
  • The length of time that a route has been known
328
Q

Which two facts must you take into account when you deploy PPPoE? (Choose two)

A
  • PPPoE supports a maximum of 10 clients per customer premises equipment
  • An individual PVC can support one PPPoE client
329
Q

OSPF Eval Sim

How old is the Type 4 LSA from Router 3 for area 1 on the router R5 based on the output you have examined?

A

1858

on R5
show ip ospf database
 Summary Net Link States: (Area 2)
 Link ID: 3.3.3.3
 Age: 1858
330
Q

OSPF Eval Sim

Which of the following statements is true about the serial links that terminate in R3?

A

The R2-R3 link OSPF timer values are 30, 120, 120

On R2
show ip ospf interface serial 1/0
Network Type NON_BROADCAST
Timer intervals configured, Hello 30, Dead 120, Wait 120

331
Q

OSPF Eval Sim

How many times was SPF algorithm executed on R4 for Area 1?

A

9

on R4
show ip ospf
SPF Algorithm executed 9 times

332
Q

OSPF Eval Sim

Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is true?

A

R5‘s Loopback and R6‘s Loopback are both present in R5‘s Routing table

on R4 and R5
show ip ospf
Area 2
It is a NSSA area

on R5 look for Loopbacks of both R5 and R6
show ip route
!R5
C 5.5.5.5/32 is directly connected, Loopback0
C 5.5.1.0/24 is directly connected, Loopback1
!R6
O IA 6.6.6.6 [110/3] via 192.168.45.4, 00:26:33, Ethernet0/0

on R4
show ip ospf
Area 3
It is a stub area, no summary LSA in this area

on R6
show ip ospf
Area 3
IT is a stub area

on R6 - we will not see R5’s Loopbacks in R6’s route table
show ip route

333
Q

EIGRP Eval Sim
Traffic from R1 to R6′ s Loopback address is load shared between R1-R2-R4-R6 and R1-R3-R5-R6 paths. What is the ratio of traffic over each path?

A

19:80

on R6 to learn the loopback’s IP
show ip interface brief
Loopback0 150.1.6.6

on R1 to learn the ratio of traffic load shared between paths
show ip route 150.1.6.6
 Routing Descriptor Blocks:
  192.168.13.3
   traffic share count is 19
  192.168.12.2
   traffic share count is 80
334
Q

EIGRP Eval Sim

What type of route filtering is occurring on R6?

A

Distribute-list using an ACL

on R6 to see the distribute-list pointing to the ACL
show running-config
 router eigrp 1
  distribute-list 1 out
  network 150.1.6.6 0.0.0.0
  network 172.16.6.6 0.0.0.0
  network 192.168.46.0
  network 192.168.56.0
!
access-list 1 permit 192.168.46.0
access-list 1 permit 192.168.56.0
access-list 1 permit 150.1.6.6
335
Q

EIGRP Eval Sim

Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

A

CISCO

on R2 and R4
show running-config

!R2
key chain CISCO
 key 1
 key-string firstkey
key chain FIRSTKEY
 key 1
 key-string CISCO

!R4
key chain CISCO
key 1
key-string firstkey

336
Q

EIGRP Eval Sim

What is the advertised distance for the 192.168.46.0 network on R1?

A

333056

on R1
show ip eigrp 1 topology OR show ip eigrp topology
P 192.168.46.0/24, 1 successors, FD is 332800
via 192.168.12.2 (1810944/333056), Ethernet0/0

337
Q

EIGRP Eval Sim

What percent of R1‘s interfaces bandwidth is EIGRP allowed to use?

A

20

on R1
show running-config
interface Ethernet0/0
ip bandwidth-percent eigrp 1 20

338
Q

EIGRP OSPF Redist Sim

You are a network engineer with ROUTE.com, a small IT company. They have recently merged two organizations and now need to merge their networks as shown in the topology exhibit. One network is using OSPF as its IGP and the other is using EIGRP as its IGP. R4 has been added to the existing OSPF network to provide the interconnect between the OSPF and EIGRP networks. Two links have been added that will provide redundancy.
The network requirements state that you must be able to ping and telnet from loopback 101 on R1 to the OPSF domain test address of 172.16.1.100. All traffic must use the shortest path that provides the greatest bandwidth. The redundant paths from the OSPF network to the EIGRP network must be available in case of a link failure. No static or default routing is allowed in either network.
A previous network engineer has started the merger implementation and has successfully assigned and verified all IP addressing and basic IGP routing. You have been tasked with completing the implementation and ensuring that the network requirements are met. You may not remove or change any of the configuration commands currently on any of the routers. You may add new commands or change default values.

A

1 determine metrics on R2 (bw, delay, reliability, load, mtu) on port between R2 and R4 (devide the delay by 10)
show interface s0/0/0
Bandwidth=1544 Kbit, Delay=20000 us, Reliability=25, Load=1, MTU=1500

2 redistribute on R2
config terminal
router ospf 1 (confirm process#)
redistribute eigrp 100 metric-type 1 subnets
exit
router eigrp 100
redistribute ospf 1 metric 1544 2000 255 1 1500
(if any don’t work, a lower value should be acceptable)

3 get the metrics on R3 as well
show interface fa0/0
Bandwidth=100000 Kbit, Delay=1000 us, Reliability=255, Load=1, MTU=1500 bytes

4 redistribute on R3
config terminal
router ospf 1 (confirm process#)
redistribute eigrp 100 metric-type 1 subnets
exit
router eigrp 100
redistribute ospf 1 metric 100000 100 255 1 1500

5 on R1, check for the network behind R4: 172.16.100.0/24 and ping it
show ip route
ping 172.16.100.1

6 on R2
router eigrp 100
distance eigrp 90 105

339
Q

Policy Based Routing Sim

Company Acan has two links which can take it to the Internet. The company policy demands that you use web traffic to be forwarded only to Frame Relay link if available and other traffic can go through any links. No static or default routing is allowed.

A

On Border Router

1 build acl to catch http
access-list 101 permit tcp any any eq www

2 route map that sets the next hop to be ISP1 and permits the rest of the traffic
route-map pbr permit 10
 match ip address 101
 set ip next hop 10.1.101.1
 exit
3 apply route map to int to server in eigrp network
int fa0/0
 ip policy route-map pbr
 exit
 exit

4 test - from “host for testing” in EIGRP network, click generate traffic
on Border Router
show route-map
policy routing matches: 9 packets

340
Q

IPv6 OSPF Virtual Link Sim

Acme is a small export company that has an existing enterprise network that is running IPv6 OSPFv3. Currently OSPF is configured on all routers. However, R4‘s loopback address (FEC0:4:4) cannot be seen in R1‘s IPv6 routing table. You are tasked with identifying the cause of this fault and implementing the needed corrective actions that uses OSPF features and does no change the current area assignments. You will know that you have corrected the fault when R4‘s loopback address (FEC0:4:4) can be seen in the routing table of R1.

A

Special Note: To gain the maximum number of points you must remove all incorrect or unneeded configuration statements related to this issue.

  1. on all 4 routers:
    show running-config
    - see that R2 and R3 do not have a virtual link set up
    • this is needed as Area54 needs a virtual link to connect to Area 0
      - R4 does have a virtual link that needs to be removed.
  2. set up virtual link between R2 and R3
on R2
enable
configure terminal
ipv6 router ospf 1
area 11 virtual-link 3.3.3.3
on R3
enable
configure terminal
ipv6 router ospf 1 
no area 54 virtual-link 4.4.4.4
area 11 virtual-link 2.2.2.2 
3. remove the virtual link from R4
on R4
enable
config terminal
ipv6 router ospf 1
no area 54 virtual-link 3.3.3.3 
  1. Ping from R4 to R1
  2. Confirm R4’s loopback can be seen in R1’s routing table
    on R1
    show ipv6 route
  3. IF THE ROUTE TO R4 IS NOT IN R1’S ROUTING TABLE, advertise the IPv6 Loopbacks into OSPFv3 first
    on R4
    int loopback 0
    ipv6 ospf 1 area 54

on R1
int loopback 0
ipv6 ospf 1 area 0

341
Q

EIGRP Stub Sim

By increasing the first distant office, JS manufactures has extended their business. They configured the remote office router (R3) from which they can reach all Corporate subnets. In order to raise network stableness and lower the memory usage and broadband utilization to R3, JS manufactures makes use of route summarization together with the EIGRP Stub Routing feature. Another network engineer is responsible for the implementing of this solution. However, in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been missing.

Presently JS has configured EIGRP on all routers in the network R2, R3, and R4. Your duty is to find and solve the connectivity failure problem with the remote office router R3. You should then configure route summarization only to the distant office router R3 to complete the task after the problem has been solved.

The success of pings from R4 to the R3 LAN interface proves that the fault has been corrected and the R3 IP routing table only contains two 10.0.0.0 subnets.

A

1: on R3 - find out why R3 and R4 cannot talk
show running config
router eigrp 123
eigrp stub receive-only
(receive-only means it won’t share routes in this AS)

2: remove receive-only
configure terminal
 router eigrp 123
  no eigrp stub receive-only
  eigrp stub
  end
(now AS will share - connected and summary are shared by default)

3: configure R3 so it has only 2 subnets in 10.0.0.0
show ip route (to see how many routes it has)

4: on R4 port s0/0 connected to R3, set the subnets to summary
enable
configure terminal
interface s0/0
!if you don’t see 10.0.0.0/8 is a summary
ip summary-address eigrp 123 10.2.0.0 255.255.0.0
!if you do see 10.0.0.0/8 is a summary
ip summary-address eigrp 123 10.0.0.0 255.0.0.0

5 on R3, see if the summary was successful
show ip route

copy running-config startup-config

ping to test

342
Q

OSPF Sim

OSPF is configured on routers Amani and Lynaic. Amani‘s S0/0 interface and Lynaic‘s S0/1 interface are in Area 0. Lynaic‘s Loopback0 interface is in Area 2.

Your task is to configure the following:
Portland’s S0/0 interface in Area 1
Amani’s S0/1 interface in Area 1
Use the appropriate mask such that ONLY Portland’s S0/0 and Amnani’s S0/1 could be in Area 1.
Area 1 should not receive any external or inter-area routes (except the default route).

A
  1. determine the IPs on Portland s0/0 and Amani s0/1 to create a network command that only includes these 2 IPs and puts them in Area 1
IPs: 192.168.4.5/30 and 191.68.4.6/30
 - /30 has 4 IPs (192.168.4.4, 4.5, 4.6 and 4.7)
 - changing /30 to a wlidcard is 0.0.0.3
 - so the command will be: 
    network 192.168.4.4 0.0.0.3 area 1

On Amani, put s0/1 in Area 1

on Portland
configure terminal
 router ospf 1
  network 192.168.4.4 0.0.0.3 area 1
  area 1 stub
  end
 copy running-config startup-config
on Amani
configure terminal
 router ospf 1
  network 192.168.4.4 0.0.0.3 area1
  area 1 stub no-summary
  end
copy running-config startup-config
343
Q

EIGRP Simlet

Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all-links command, answer the administrator‘s questions.

Which two networks does the Core1 device have feasible successors for? (Choose two)

A

show ip eigrp topology
- find the routes where the AD of the 2nd line is less than the fd in the 1st line: EG 155160 < 156160

P 10.140.0.0/24, 1 successors, FD is 156160. semo 26
via 172.17.3.2 (156160/128256), FastEthernet0/3
via 172.17.10.2 (157720/155160), FastEthernet0/1

  • 172.17.0.0/30
  • 10.140.0.0/24
344
Q

EIGRP Simlet

Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all-links command, answer the administrator‘s questions.

Which three EIGRP routes will be installed for the 172.17.3.128/25 and 172.17.2.0/24 networks? (Choose three)

A

show ip eigrp topology
- take note of how many successors are listed and what the FD is

  • 172.17.3.128/25 [90/30720] via 172.17.3.2, 01:26:35, FastEthemet0/3
  • 172.17.3.128/25 [90/30720] via 172.17.10.2, 01:26:35, FastEthernet0/1
  • 172.17.2.0/24 [90/30720] via 172.17.10.2, 02:10:11, FastEthernet0/1
345
Q

EIGRP Simlet

Refer to the exhibit. BigBids Incorporated is a worldwide auction provider. The network uses EIGRP as its routing protocol throughout the corporation. The network administrator does not understand the convergence of EIGRP. Using the output of the show ip eigrp topology all-links command, answer the administrator‘s questions.

Which three networks is the router at 172.17.10.2 directly connected to? (Choose three)

A

show ip eigrp topology
- to see which subnets are in 172.17.10.0 and which ones have 172.17.10.2 as successors.

  • 172.17.2.0/24
  • 172.17.3.128/25
  • 172.17.10.0/24
346
Q

A network engineer executes the ―show ip cache flow‖ command. Which two types of information are displayed in the report that is generated? (Choose two)

A
  • flow sample for specific protocols

- IP packet distribution