Multi_Easy Flashcards
Question 1
Which two statements about AAA authentication are true? (Choose two)
A. RADIUS authentication queries the router’s local username database
B. TACACS+ authentication uses an RSA server to authenticate users
C. Local user names are case-insensitive
D. Local authentication is maintained on the router
E. KRB5 authentication disables user access when an incorrect password is entered
Answer:C D
Question 2
A network administrator applies the following configuration to an IOS device.
aaa new-model
aaa authentication login default local group tacacs+
What is the process of password checks when a login attempt is made to the device?
A. A TACACS+ server is checked first. If that check fail, a database is checked
B. A TACACS+ server is checked first. If that check fail, a RADIUS server is checked. If that check fail, a local database is checked
C. A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADIUS server is checked
D. A local database is checked first. If that check fails, a TACACS+server is checked
Answer:D
Explanation
The “aaa authentication login default local group tacacs+” command is broken down as follows:
+ The ‘aaa authentication’ part is simply saying we want to configure authentication settings.
+ The ‘login’ is stating that we want to prompt for a username/password when a connection is made to the device.
+ The ‘default’ means we want to apply for all login connections (such as tty, vty, console and aux). If we use this keyword, we don’t need to configure anything else under tty, vty and aux lines. If we don’t use this keyword then we have to specify which line(s) we want to apply the authentication feature.
+ The ‘local group tacacs+” means all users are authenticated using router’s local database (the first method). If the credentials are not found on the local database, then the TACACS+ server is used (the second method).
Question 3
Refer to the exhibit.
aaa new-model
aaa authentication login authorizationlist tacacs+
tacacs-server host 192.168.0.202
tacacs-server key ciscotestkey
line vty 0 4
login authentication authorizationlist
What is the effect of the configuration?
A. The device will allow users at 192.168.0.202 to connect to vty lines 0 through 4 using the password ciscotestkey
B. The device will allow only users at 192 168.0.202 to connect to vty lines 0 through 4
C. When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication fails
D. The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+
Answer:D
Question 4
Refer to the exhibit.
aaa new-model
aaa authentication login default local-case enable
aaa authentication login ADMIN local-case
username CCNP secret Str0ngP@ssw0rd!
line 0 4
login authentication ADMIN
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP logs in. Which configuration change is required?
A. Add the autocommand keyword to the aaa authentication command
B. Add the access-class keyword to the aaa authentication command
C. Add the access-class keyword to the username command
D. Add the autocommand keyword to the username command
Answer:D
Explanation
The “autocommand” causes the specified command to be issued automatically after the user logs in. When the command is complete, the session is terminated. Because the command can be any length and can contain embedded spaces, commands using the autocommand keyword must be the last option on the line. In this specific question, we have to enter this line “username CCNP autocommand show running-config”.
Question 5
Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. Permit 10.0.0.0 0.0.0.1
B. Permit 10.0.0.1 0.0.0.0
C. Permit 10.0.0.1 0.0.0.254
D. Permit 10.0.0.0 255.255.255.254
Answer:C
Question 6
In a traditional 3 tier topology, an engineer must explicitly configure a switch as the root bridge and exclude it from any further election process for the spanning-tree domain. Which action accomplishes this task?
A. Configure the spanning-tree priority to 32768
B. Configure root guard and portfast on all access switch ports
C. Configure BPDU guard in all switch-to-switch connections
D. Configure the spanning-tree priority equal to 0
Answer:B
Explanation
Root guard does not allow the port to become a STP root port, so the port is always STP-designated. If a better BPDU arrives on this port, root guard does not take the BPDU into account and elect a new STP root. Instead, root guard puts the port into the root-inconsistent STP state which is equal to a listening state. No traffic is forwarded across this port.
Below is an example of where to configure Root Guard on the ports. Notice that Root Guard is always configure on designated ports.
To configure Root Guard use this command:
Switch(config-if)#spanning-tree guard root
Reference:http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10588-74.html
Question 7
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web server. Which statement allows this traffic?
A. permit tcp host 209.165.201.25 eq 80 host 209.165.200.225
B. permit tcp host 209.165.201.25 host 209.165.200.225 eq 80
C. permit tcp host 209.165.200.225 eq 80 host 209.165.201.25
D. permit tcp host 209.165.200.225 host 209.165.201.25 eq 80
Answer:C
Question 8
Which access controls list allows only TCP traffic with a destination port range of 22-443, excluding port 80?
A. Deny tcp any any eq 80 Permit tcp any any gt 21 lt 444
B. Permit tcp any any neq 80
C. Permit tcp any any range 22 443 Deny tcp any any eq 80
D. Deny tcp any any neq 80 Permit tcp any any range 22 443
Answer:A
Question 9
What is the result of applying this access control list?
ip access-list extended STATEFUL
10 permit tcp any any established
20 deny ip any any
A. TCP traffic with the DF bit set is allowed B. TCP traffic with the SYN bit set is allowed C. TCP traffic with the ACK bit set is allowed D. TCP traffic with the URG bit set is allowed
Answer:C
Question 10
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A. ip access-list extended 200 deny tcp host 10.10.10.1 eq 80 any permit ip any any
B. ip access-list extended 10 deny tcp host 10.10.10.1 any eq 80 permit ip any any
C. ip access-list extended NO_HTTP deny tcp host 10.10.10.1 any eq 80
D. ip access-list extended 100 deny tcp host 10.10.10.1 any eq 80 permit ip any any
Answer:D
Question 11
An engineer must configure a ACL that permits packets which include an ACK in the TCP header. Which entry must be included in the ACL?
A. access-list 110 permit tcp any any eq 21 tcp-ack
B. access-list 10 permit ip any any eq 21 tcp-ack
C. access-list 10 permit tcp any any eq 21 established
D. access-list 110 permit tcp any any eq 21 established
Answer:D
Question 12
Which OSPF network types are compatible and allow communication through the two peering devices?
A. broadcast to nonbroadcast
B. point-to-multipoint to nonbroadcast
C. broadcast to point-to-point
D. point-to-multipoint to broadcast
Answer:A
Explanation
The following different OSPF types are compatible with each other:
+ Broadcast and Non-Broadcast (adjust hello/dead timers)
+ Point-to-Point and Point-to-Multipoint (adjust hello/dead timers)
Broadcast and Non-Broadcast networks elect DR/BDR so they are compatible. Point-to-point/multipoint do not elect DR/BDR so they are compatible.
Question 14
Refer to the exhibit. Which statement about the OPSF debug output is true?
R1#debug ip ospf hello
R1#debug condition interface fa0/1
Condition 1 set
A. The output displays all OSPF messages which router R1 has sent or received on interface Fa0/1
B. The output displays all OSPF messages which router R1 has sent or received on all interfaces
C. The output displays OSPF hello messages which router R1 has sent or received on interface Fa0/1
D. The output displays OSPF hello and LSACK messages which router R1 has sent or received
Answer:C
Explanation
This combination of commands is known as “Conditional debug” and will filter the debug output based on your conditions. Each condition added, will behave like an ‘And’ operator in Boolean logic. Some examples of the “debug ip ospf hello” are shown below:
*Oct 12 14:03:32.595: OSPF: Send hello to 224.0.0.5 area 0 on FastEthernet1/0 from 192.168.12.2
*Oct 12 14:03:33.227: OSPF: Rcv hello from 1.1.1.1 area 0 on FastEthernet1/0 from 192.168.12.1
*Oct 12 14:03:33.227: OSPF: Mismatched hello parameters from 192.168.12.1
Question 15
Which EIGRP feature allows the use of leak maps?
A. offset-list
B. neighbor
C. address-family
D. stub
Answer:D
Explanation
If we configured an EIGRP stub router so that it only advertises connected and summary routes. But we also want to have an exception to this rule then we can configure a leak-map. For example:
R4(config-if)#router eigrp 1
R4(config-router)#eigrp stub
R4(config)#ip access-list standard R4_L0opback0
R4(config-std-nacl)#permit host 4.4.4.4
R4(config)#route-map R4_L0opback0_LEAKMAP
R4(config-route-map)#match ip address R4_L0opback0
R4(config)#router eigrp 1
R4(config-router)#eigrp stub leak-mapR4_L0opback0_LEAKMAP
As we can see the leak-map feature goes long with ‘eigrp stub’ command.
Question 16
Which two statements about EIGRP load balancing are true? (Choose two)
A. EIGRP supports 6 unequal-cost paths
B. A path can be used for load balancing only if it is a feasible successor
C. EIGRP supports unequal-cost paths by default
D. Any path in the EIGRP topology table can be used for unequal-cost load balancing
E. Cisco Express Forwarding is required to load-balance across interfaces
Answer:A B
Explanation
EIGRP provides a mechanism to load balance over unequal cost paths (or called unequal cost load balancing) through the “variance” command. In other words, EIGRP will install all paths withmetric < variance * best_metricinto the local routing table, provided that it meets the feasibility condition to prevent routing loop. The path that meets this requirement is called a feasible successor. If a path is not a feasible successor, it is not used in load balancing.
Note: The feasibility condition states that, the Advertised Distance (AD) of a route must be lower than the feasible distance of the current successor route.
Question 16
Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. OTP uses LISP encapsulation for dynamic multipoint tunneling
B. OTP maintains the LISP control plane
C. OTP uses LISP encapsulation to obtain routes from neighbors
D. LISP learns the next hop
Answer:A
Explanation
OTP leverages existing LISP encapsulation which:
+ Allows dynamic multi-point tunneling (-> Answer A is correct)
+ Provides instance ID field to optionally support virtualization across WAN (see EVN WAN Extension section)
OTP does NOT use LISP control plane(map server/resolver, etc.) (-> Therefore answer B is not correct)instead it uses EIGRP to exchange routes and provide the next-hop(-> answer C and answer D are not correct), which LISP encapsulation uses to reach remote prefixes.
Reference:https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip-routing/whitepaper_C11-730404.html
Question 17
Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?
A. Mismatched OSPF network type
B. Mismatched areas
C. Mismatched MTU size
D. Mismatched OSPF link costs
Answer:C
Explanation
When OSPF adjacency is formed, a router goes through several state changes before it becomes fully adjacent with its neighbor. The states are Down -> Attempt (optional) -> Init -> 2-Way -> Exstart -> Exchange -> Loading -> Full. Short descriptions about these states are listed below:
Down: no information (hellos) has been received from this neighbor.
Attempt: only valid for manually configured neighbors in an NBMA environment. In Attempt state, the router sends unicast hello packets every poll interval to the neighbor, from which hellos have not been received within the dead interval.
Init: specifies that the router has received a hello packet from its neighbor, but the receiving router’s ID was not included in the hello packet
2-Way: indicates bi-directional communication has been established between two routers.
Exstart: Once the DR and BDR are elected, the actual process of exchanging link state information can start between the routers and their DR and BDR.
Exchange: OSPF routers exchange database descriptor (DBD) packets
Loading: In this state, the actual exchange of link state information occurs
Full: routers are fully adjacent with each other
(Reference:http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f0e.shtml)
Neighbors Stuck in Exstart/Exchange State
The problem occurs most frequently when attempting to run OSPF between a Cisco router and another vendor’s router. The problem occurs when the maximum transmission unit (MTU) settings for neighboring router interfaces don’t match. If the router with the higher MTU sends a packet larger that the MTU set on the neighboring router, the neighboring router ignores the packet.
Question 18
Which feature is supported by EIGRP but is not supported by OSPF?
A. route summarization
B. equal-cost load balancing
C. unequal-cost load balancing
D. route filtering
Answer:C
Explanation
EIGRP support unequal-cost load balancing via the “variance …” while OSPF only supports equal-cost load balancing.
Question 19
In OSPF, which LSA type is responsible for pointing to the ASBR router?
A. type 1
B. type 2
C. type 3
D. type 4
Answer:D
Explanation
Summary ASBR LSA (Type 4)– Generated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to external routes through that ASBR. For example, suppose R8 is redistributing external route (EIGRP, RIP…) to R3. This makes R3 an Autonomous System Boundary Router (ASBR). When R2 (which is an ABR) receives this LSA Type 1 update, R2 will create LSA Type 4 and flood into Area 0 to inform them how to reach R3. When R5 receives this LSA it also floods into Area 2.
In the above example, the only ASBR belongs to area 1 so the two ABRs (R2 & R5) send LSA Type 4 to area 0 & area 2 (not vice versa). This is an indication of the existence of the ASBR in area 1.
Note: + Type 4 LSAs contain the router ID of the ASBR. + There are no LSA Type 4 injected into Area 1 because every router inside area 1 knows how to reach R3. R3 only uses LSA Type 1 to inform R2 about R8 and inform R2 that R3 is an ASBR.
Question 20
How does the EIGRP metric differ from the OSPF metric?
A. The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only.
B. The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay.
C. The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay.
D. The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only.
Answer:D
Explanation
By default, EIGRP metric is calculated:
metric = bandwidth + delay
While OSPF is calculated by:
OSPF metric = Reference bandwidth / Interface bandwidth in bps
(Or Cisco uses 100Mbps (108) bandwidth as reference bandwidth. With this bandwidth, our equation would be:
Cost = 108/interface bandwidth in bps)
Question 21
A local router shows an EBGP neighbor in the Active state. Which statement is true about the local router?
A. The local router has active prefix in the forwarding table firom the neighboring router
B. The local router has BGP passive mode configured for the neighboring router
C. The local router is attempting to open a TCP session with the neighboring router.
D. The local router is receiving prefixes from the neighboring router and adding them in RIB-IN
Answer:C
Explanation
The BGP session may report in the following states
1 – Idle:the initial state of a BGP connection. In this state, the BGP speaker is waiting for a BGP start event, generally either the establishment of a TCP connection or the re-establishment of a previous connection. Once the connection is established, BGP moves to the next state.
2 – Connect:In this state, BGP is waiting for the TCP connection to be formed. If the TCP connection completes, BGP will move to the OpenSent stage; if the connection cannot complete, BGP goes to Active
3 – Active:In the Active state, the BGP speaker is attempting to initiate a TCP session with the BGP speaker it wants to peer with. If this can be done, the BGP state goes to OpenSent state.
4 – OpenSent:the BGP speaker is waiting to receive an OPEN message from the remote BGP speaker
5 – OpenConfirm:Once the BGP speaker receives the OPEN message and no error is detected, the BGP speaker sends a KEEPALIVE message to the remote BGP speaker
6 –Established:All of the neighbor negotiations are complete. You will see a number, which tells us the number of prefixes the router has received from a neighbor or peer group.
Question 22
What is the correct EBGP path attribute list, ordered from most preferred to the least preferred, that the BGP best-path algorithm uses?
A. weight, AS path, local preference, MED
B. weight, local preference, AS path, MED
C. local preference, weight, AS path, MED
D. local preference, weight, MED, AS path
Answer:B
Explanation
Path Selection Attributes:Weight > Local Preference > Originate > AS Path > Origin > MED > External > IGP Cost > eBGP Peering > Router ID
Question 23
Which PAgP mode combination prevents an Etherchannel from forming?
A. auto/auto
B. desirable/desirable
C. auto/desirable
D. desirable
Answer:A
Question 24
Which two GRE features are configured to prevent fragmentation? (Choose two)
A. TCP window size
B. TCP MSS
C. IP MTU
D. DF bit Clear
E. MTU ignore
F. PMTUD
Answer:B F
Question 25
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
A. MTU
B. Window size
C. MRU
D. MSS
Answer:D
Question 26
Which statement about dynamic GRE between a headend router and a remote router is true?
A. The headend router learns the IP address of the remote end router statically
B. A GRE tunnel without an IP address has a status of administratively down
C. GRE tunnels can be established when the remote router has a dynamic IP address
D. The remote router initiates the tunnel connection
Answer:D
Question 27
A GRE tunnel is down with the error message %TUN-5-RECUR DOWN:
Tunnel0 temporarily disabled due to recursive routing error.
Which two options describe possible causes of the error? (Choose two)
A. Incorrect destination IP addresses are configured on the tunnel
B. There is link flapping on the tunnel
C. There is instability in the network due to route flapping
D. The tunnel mode and tunnel IP address are misconfigured
E. The tunnel destination is being routed out of the tunnel interface
Answer:C E