Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?

A.

show track

B.

show threshold

C.

show timer

D.

show delay

Full Access
Question # 5

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 6

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 7

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 8

Which option is the best for protecting CPU utilization on a device?

A.

fragmentation

B.

COPP

C.

ICMP redirects

D.

ICMP unreachable messages

Full Access
Question # 9

Refer to the exhibit.

R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?

A.

R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.

B.

Route reflector setup requires full IBGP mesh between the routers.

C.

In route reflector setup, only classful prefixes are advertised to other clients.

D.

In route reflector setups, prefixes are not advertised from one client to another.

Full Access
Question # 10

Refer to the exhibit.

A junior engineer updated a branch router configuration. Immediately after the change, the engineer receives calls from the help desk that branch personnel cannot reach any network destinations. Which configuration restores service and continues to block 10.1.1.100/32?

A.

route-map FILTER-IN deny 5

B.

ip prefix-list 102 seq 15 permit 0.0.0.0/32 le 32

C.

ip prefix-list 102 seq 5 permit 0.0.0.0/32 le 32

D.

route-map FILTER-IN permit 20

Full Access
Question # 11

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Full Access
Question # 12

Refer to the exhibit.

An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A.

Configure the service timestamps log uptime command in global configuration mode.

B.

Configure the logging clock synchronize command in global configuration mode.

C.

Configure the service timestamps log datetime localtime command in global configuration mode.

D.

Make sure that the clock on the device is synchronized with an NTP server.

Full Access
Question # 13

Refer the exhibit.

Which action resolves intermittent connectivity observed with the SNMP trap

packets?

A.

Decrease the committed burst Size of the mgmt class map

B.

Increase the CIR of the mgmt class map

C.

Add a new class map to match TCP traffic

D.

Add one new entry in the ACL 120 to permit the UDP port 161

Full Access
Question # 14

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A.

R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.

B.

R1 does not accept any routes other than 192.168.130.0/24

C.

R1 does not forward traffic that is destined for 192.168.30.0/24

D.

Network 192.168.130.0/24 is not allowed in the R1 table

Full Access
Question # 15

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 16

Refer to the exhibit.

During troubleshooting it was discovered that the device is not reachable using a secure

web browser. What is needed to fix the problem?

A.

permit tcp port 443

B.

permit udp port 465

C.

permit tcp port 465

D.

permit tcp port 22

Full Access
Question # 17

Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A.

Router ospf3 1 address-family ipv4

B.

Router(config-router)#ospfv3 1 ipv4 area 0

C.

Router(config-if)#ospfv3 1 ipv4 area 0

D.

Router ospfv3 1 address-family ipv4 unicast

Full Access
Question # 18

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?

A.

BGP

B.

LLDP

C.

EIGRP

D.

NHRP

Full Access
Question # 19

Refer to the exhibit.

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 20

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 21

An engineer configured a company’s multiple area OSPF head office router and Site A cisco

routers with VRF lite. Each site router is connected to a PE router of an MPLS backbone.

After finishing both site router configurations, none of the LSA 3,4 5, and 7 are installed at Site A router. Which configuration resolves this issue?

A.

configure capability vrf-lite on Site A and its connected PE router under router ospf 1 vrf abc

B.

configure capability vrf-lite on Head Office and its connected PE router under router ospf 1 vrf abc

C.

configure capability vrf-lite on both PE routers connected to Head Office and Site A routers under routtr ospf 1 vrf abc

D.

configure capability vrf-lite on Head Office and Site A routers under router ospf 1 vrf abc

Full Access
Question # 22

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 23

Which command displays the IP routing table information that is associated with VRF-Lite?

A.

show ip vrf

B.

show ip route vrf

C.

show run vrf

D.

show ip protocols vrf

Full Access
Question # 24

Refer to the exhibit.

The output of the trace route from R5 shows a loop in the network. Which configuration

prevents this loop?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 26

Refer to the exhibit.

Drag and drop the credentials from the left onto the remote login information on the right to resolve a failed login attempt to vtys. Not all credentials are uf SLA by defining frequency and schedulingsed

Full Access
Question # 27

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 28

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 29

Refer to the exhibit.

Why is user authentication being rejected?

A.

The TACACS+ server expects “user”, but the NT client sends “domain/user”.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

C.

The TACACS+ server is down, and the user is in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Full Access
Question # 30

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 31

Which two statements about VRF-Lite configurations are true? (Choose two.)

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

Full Access
Question # 32

Which list defines the contents of an MPLS label?

A.

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.

32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

C.

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Full Access
Question # 33

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 34

What is the output of the following command:

show ip vrf

A.

Show's default RD values

B.

Displays IP routing table information associated with a VRF

C.

Show's routing protocol information associated with a VRF.

D.

Displays the ARP table (static and dynamic entries) in the specified VRF

Full Access
Question # 35

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

A.

DMVPN

B.

GETVPN

C.

Cisco Easy VPN

D.

FlexVPN

Full Access
Question # 36

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 37

Which protocol does VRF-Lite support?

A.

IS-IS

B.

ODR

C.

EIGRP

D.

IGRP

Full Access
Question # 38

Refer to the exhibit.

An engineer is trying to redistribute OSPF to BGP, but not all of the routes are

redistributed. What is the reason for this issue?

A.

By default, only internal routes and external type 1 routes are redistributed into BGP

B.

Only classful networks are redistributed from OSPF to BGP

C.

BGP convergence is slow, so the route will eventually be present in the BGP table

D.

By default, only internal OSPF routes are redistributed into BGP

Full Access
Question # 39

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 40

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

Full Access
Question # 41

Refer to the exhibit.

Which subnet is redistributed from EIGRP to OSPF routing protocols?

A.

10.2.2.0/24

B.

10.1.4.0/26

C.

10.1.2.0/24

D.

10.2.3.0/26

Full Access
Question # 42

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

TypE. dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does the authoritative flag mean in regards to the NHRP information?

A.

It was obtained directly from the next-hop server.

B.

Data packets are process switches for this mapping entry.

C.

NHRP mapping is for networks that are local to this router.

D.

The mapping entry was created in response to an NHRP registration request.

E.

The NHRP mapping entry cannot be overwritten.

Full Access
Question # 43

An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

A.

set ip next-hop

B.

set ip default next-hop

C.

set ip next-hop recursive

D.

set ip next-hop verify-availability

Full Access
Question # 44

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRPautonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Full Access
Question # 45

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 46

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 47

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 48

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Full Access
Question # 49

Drag and drop the MPLS VPN device types from me left onto the definitions on the right.

Full Access
Question # 50

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 51

Refer to the exhibit.

Redistribution is enabled between the routing protocols, and nowPC2 PC3, and PC4 cannot reach PC1. What are the two solutions to fix the problem? (Choose two.)

A.

Filter RIP routes back into RIP when redistributing into RIP in R2

B.

Filter OSPF routes into RIP FROM EIGRP when redistributing into RIP in R2.

C.

Filter all routes except RIP routes when redistributing into EIGRP in R2.

D.

Filter RIP AND OSPF routes back into OSPF from EIGRP when redistributing into OSPF in R2

E.

Filter all routes except EIGRP routes when redistributing into OSPF in R3.

Full Access
Question # 52

Exhibit:

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 53

Refer to the exhibit.

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

:582

Refer to the exhibit. Branch 2 hosts cannot receive dynamic IP addresses. Which action resolves the issue?

A.

Configure the ip helper command on the interface GigabitEthernet 0/2 of the R2 router

B.

Configure the Ip helper command on the Layer 2 switch SW2 interfaces

C.

Configure the Ip helper command on the interface GigabitEthernet 0/2 of the DHCP router.

D.

Configure the Ip helper command on the interface GigabitEthernet 0/0 of the DHCP router.

Full Access
Question # 55

Refer to the exhibit. An engineer configured user login based on authentication database on the router, but no one can log into the router. Which configuration resolves the issue?

A.

aaa authentication login default enable

B.

aaa authorization network default local

C.

aaa authentication login default local

D.

aaa authorization exec default local

Full Access
Question # 56

Refer to the exhibit.

An engineer configured NetFlow to capture traffic information through the router, but it iOS not working as expected. Which action captures the flow information from this router to the collector?

A.

Change the interface configuration FLOW-MONITOR-1 from input to output.

B.

Configure a flow exporter under flow FLOW-MONITOR-1.

C.

Configure more than one flow exporter destination addresses.

D.

Change the flow exporter transport protocol from UDP to TCP

Full Access
Question # 57

A network engineer must configure a DMVPN network so that a spoke establishes a direct path to another spoke if the two must send traffic to each other. A spoke must send traffic directly to the hub if required Which configuration meets this requirement?

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 58

Refer to the exhibit.

A network administrator successfully logs in to a switch using SSH from a (RADIUS server When the network administrator uses a console port to access the switch the RADIUS server returns shell:priv-lvl=15’’ and the switch asks to enter the enable command \ the command is entered, it gets rejected. Which command set is used to troubleshoot and reserve this issue?

A.

line con 0aaa authorization consoleauthorization exec!line vty 0 4transport input ssh

B.

line con 0aaa authorization console!line vty 0 4authorization exec

C.

line con 0aaa authorization console priv15!line vty 0 4authorization exec

D.

line con 0aaa authorization consoleauthorization priv15!line vty 0 4transport input ssh

Full Access
Question # 59

Refer to the exhibit. R1 must advertise all loopback interfaces IP addresses to neighbors, but EIGRP neighbors receive a summary route. Which action resolves the issue?

A.

Redistribute connected routes into EIGRP Enable

B.

EIGRP on loopback Interfaces.

C.

Disable auto summarization on R1.

D.

Remove the 10.100.1.0/24 static route.

Full Access
Question # 60

Refer to the exhibit SW100 cannot receive routes from R1 Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option C

Full Access
Question # 61

Refer to the exhibit.

Which command must be configured to make VRF CCNP work?

A.

interface Loopback0vrf forwarding CCNP

B.

interface Loopback0ip address 10.1.1.1 255.255.255.0

C.

interface Loopback0ip address 10.1.1.1 255.255.255.0vrf forwarding CCNP

D.

interface Loopback0ip address 10.1.1.1 255.255.255.0ip vrf forwarding CCNP

Full Access
Question # 62

How does LDP operate in an MPLS network?

A.

When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change.

B.

When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity.

C.

Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages

D.

LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP.

Full Access
Question # 63

Refer to the exhibit.

An engineer has configured policy-based routing and applied the configured to the correct interface. How is the configuration applied to the traffic that matches the access list?

A.

It is sent to 209.165.202.131.

B.

It is sent to 209.165.202.129.

C.

It is dropped.

D.

It is forwarded using the routing table lookup.

Full Access
Question # 64

Refer to the exhibit. When an FTP client attempts to use passive FTP to connect to the FTP server, the file transfers fail Which action resolves the issue?

A.

Configure active FTP traffic.

B.

Modify FTP-SERVER access list to remove established at the end.

C.

Modify traffic filter FTP-SERVER in to the outbound direction.

D.

Configure to permit TCP ports higher than 1023.

Full Access
Question # 65

:578

Refer to the exhibit. The primary link between R1 and R2wentdownbutR3isstill advertising the 192.166.200.0/24 networktoR1 and the 192.166.100.0/24 networktoR2, which createsaloop. Which action resolves the issue?

A.

Configure the eigrp stub command under theElGRP process on R3

B.

Configure the summaryaddress 192.168.0.0 255.255.0.0 100 command on R3

C.

Configure the eigrp stub leak-map command under the EIGRPprocess on R1

D.

Configurethe eigrp stub command under theElGRP process on R2

Full Access
Question # 66

Which two components are required for MPLS Layer 3 VPN configuration? (Choose two)

A.

Use pseudowire for Layer 2 routes

B.

Use MP-BGP for customer routes

C.

Use OSPF between PE and CE

D.

Use a unique RD per customer VRF

E.

Use LDP for customer routes

Full Access
Question # 67

Refer to me exhibit. The hub and spoke are connected via two DMVPN tunnel interfaces The NHRP is configured and the tunnels are detected on the hub and the spoke Which configuration command adds an IPsec profile on both tunnel interfaces to encrypt traffic?

A.

tunnel protection ipsec profile DMVPN multipoint

B.

tunnel protection ipsec profile DMVPN tunnel1

C.

tunnel protection ipsec profile DMVPN shared

D.

tunnel protection ipsec profile DMVPN unique

Full Access
Question # 68

An engineer must override the normal routing behavior of a router for Telnet traffic that is destined to 10.10.10.10 from 10.10.1.0/24 via a next hop of 10.4.4.4. which is directly connected to the router that is connected to the 10.1.1.0/24 subnet Which configuration reroutes traffic according to this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 69

Refer to the exhibit.

Refer to the exhibit R1 cannot authenticate via TACACS Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

Refer to the exhibit An engineer must connect the Reno and Detroit spokes using DMVPN phase 2 Hub tunnel configuration is

Which configuration accomplishes the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Refer to the exhibit.

An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue?

A.

ip access-list extended OSPF permit ospf any any

B.

policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop

C.

control-plane service-policy input COPP

D.

class-map match-all OSFP match access-group name OSPF

Full Access
Question # 72

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Full Access
Question # 73

Which feature minimizes DoS attacks on an IPv6 network?

A.

IPv6 Binding Security Table

B.

IPv6 Router Advertisement Guard

C.

IPv6 Prefix Guard

D.

IPv6 Destination Guard

Full Access
Question # 74

Refer to the exhibit. Users on a call center report that they cannot browse the internet on Saturdays during the afternoon. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 75

Refer to the exhibit A network engineer is troubleshooting an AAA authentication issue for R1 from R2 When an engineer tries to open a telnet connection to R1 it opens the connection but shows a %Authorization failed error message on the terminal and closes the connection silently Which action resolves the issue?

A.

Resolve tacacs+ server host IP authentication miss configuration on the R1 router

B.

Resolve tacacs+ server reachability from the R1 router.

C.

Configure the tacacs+ server host IP on the R1 router

D.

Configure authorization commands in the tacacs* server for the R1 router.

Full Access
Question # 76

Refer to the exhibit.

An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead

of current best path. Which action resolves the issue?

A.

Configure AS_PATH prepend for the current best path

B.

Configure higher MED to select as the best path

C.

Configure AS_PATH prepend for the desired best path

D.

Configure lower LOCAL_PREF to select as the best path

Full Access
Question # 77

Refer to the exhibit.

A shoe retail company implemented the uRPF solution for an antispoofing attack. A network engineer received the call that the branch A server is under an IP spoofing attack. Which configuration must be implemented to resolve the attack?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

Refer to the exhibit. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123.

The administrator has configured the following on R1:

ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 80

An engineer notices that R1 does not hold enough log messages to Identity the root cause during troubleshooting Which command resolves this issue?

A.

#logging buffered 4096 critical

B.

(config)#logging buffered 16000 informational

C.

#logging buffered 16000 critical

D.

(config)#logging buffered 4096 informational

Full Access
Question # 81

:584

Reler Iothe exhibit The engineer is trying to transfer the newIOSfile to the router R3 but is getting an error Which configuration achieves the file transfer?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 82

An engineer is creating a policy that overrides normal routing behavior.if the route to a destination of

10.100.100.0/24 is withdrawn from the routing

Table, the policy must direct traffic to a next hop of 10.1 1.1. if the route is present in the routing table, then

normal forwarding must occur. Which

configuration meets the requirements?

A.

access-list 100 permit ip any any!route-map POLICY permit 10match ip address 100set ip next-hop recursive 10.1.1.1

B.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!Route-map POLICY permit 10match ip address 100set ip default next-hop 10.1.1.1

C.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route-map POLICY permit 10match ip address 100set ip next-hop 10.1.1.1!route map POLICY permit 20

D.

access-list 100 permit ip any 10.100.100.0 0.0.0.255!route map POLICY permit 10match ip address 100Set ip next-hop recursive 10.1.1.1!route-map POLICY permit 20

Full Access
Question # 83

The network administrator configured R1 for Control Plane Policing so that the inbound Telnet traffic is policed to 100 kbps. This policy must not apply to traffic coming in from 10.1.1.1/32 and 172.16.1.1/32. The administrator has configured this:

The network administrator is not getting the desired results. Which set of configurations resolves this issue?

A.

control-planeno service-policy input PM-CoPP!interface Ethernet 0/0service-policy input PM-CoPP

B.

control-planeno service-policy input PM-CoPPservice-policy input PM-CoPP

C.

no access-list 101access-list 101 deny tcp host 10,1,1.1 any eq 23access-list 101 deny tcp host 172,16.1.1 any eq 23access-list 101 permit ip any any

D.

no access-list 101access-list 101 deny tcp host 10,1.1.1 any eq 23access-list 101 deny tcp host 172.16.1.1 any eq 23access-list 101 permit ip any any!interface E0/0service-policy input PM-CoPP

Full Access
Question # 84

How do devices operate in MPLS L3VPN topology?

A.

P and associated PE routers with IGP populate the VRF table in different VPNs.

B.

CE routers connect to the provider network and perform LSP functionality

C.

P routers provide connectivity between PE devices with MPLS switching.

D.

P routers support PE to PE VPN tunnel without LSP functionality

Full Access
Question # 85

Exhibit.

Refer to the exhibit. A network is configured for EIGRP equal-cost load balancing, but the traffic destined to the servers is not load balanced. Link metrics from router R2 to R3 and R4 are the same. Which delay value must be configured to resolve the issue?

A.

208 oon R3 E0/0

B.

120 on R4 E0/1

C.

120/on R3 E0/1

D.

2200 on R4 E0/1

Full Access
Question # 86

Refer to the exhibit.

While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.

Which command resolves this issue?

A.

access-class INTERNET in

B.

ip access-group INTERNET in

C.

ipv6 traffic-filter INTERNET in

D.

ipv6 access-class INTERNET in

Full Access
Question # 87

Refer to the exhibit EIGRP adjacency between router A and router C is not working as expected Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 88

A DMVPN network is preconfigured with tunnel 0 IP address 192.168.1.254 on the HUB, IP connectivity, crypto policies, profiles, and EIGRP AS 100. The NHRP password is ccnp123, and the network ID and tunnel key is EIGRP ASN Do not introduce a static route. Configure DMVPN connectivity between routers BR1 and BR2 to the HUB router using physical interface as the tunnel source to achieve these goals:

Full Access
Question # 89

Refer to the exhibit.

An OSPF neighbor relationship between R2 and R3 is showing stuck in EXCHANGE/EXSTART state. The neighbor is established between R1 and R2. The network engineer can ping from R2 to R3 and vice versa, but the

neighbor is still down. Which action resolves the issue?

A.

Restore the Layer 2/Layer 3 conectivity issue in the ISP network.

B.

Match MTU on both router interfaces or ignore MTU.

C.

Administrative "shut then no shut" both router interfaces.

D.

Enable OSPF on the interface, which is required.

Full Access
Question # 90

:585

Which type of ports are protected by IPv6 Source Guard?

A.

Layer 2 ports

B.

access ports

C.

Layer 3 ports

D.

trunk ports

Full Access
Question # 91

Refer to the exhibit A network engineer received a call from the vendor for a failed attempt to remotely log in to their managed rooter loopback interface from 192 168.40 15 Which action must the network engineer take to resolve the issue?

A.

The IP access list VENDOR must be applied to interface loopback 100

B.

The time-range configuration must be changed to use absolute instead of periodic

C.

The EIGRP configuration must be updated to include a network statement for loopback 100

D.

The source IP summarization must be updated to include the vendor source IP address

Full Access
Question # 92

Refer to the exhibit.

A NOC team receives a ticket that data traffic from RA to RF is not forwarded when the link between the RC-RE path goes down. All routers learn loopback IP through the IGP protocol. Which configuration resolves?

A.

RD(config)#router bgp B5201RD(config-router)# neighbor 10.10.10.2 update-source loopback 0

B.

RD(config-router)# neighbor bgp 65101RB(config-router)# neighbor 10.10.10.3 ebgp-multihop 3

C.

RB(config)# router bgp 65101RB(config)#neighbor 10.10.10.3 update-source loopback 0

D.

RD(config)# router bgp 65201RDI(config-router)# neighbor 10.10.10.2 ebgp-multihop 3

Full Access
Question # 93

Refer to the exhibit.

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1destination 10.221.10.11

B.

flow exporter FlowAnalyzer1destination 10.221.10.11

C.

interface Ethernet0/1flow-destination 10.221.10.11

D.

interface Ethernet0/0flow-destination 10.221.10.11

Full Access
Question # 94

Refer to the exhibit. The authentication is not working as desired and the user drops into user-exec mode. Which configuration resolves the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 95

Refer to the exhibit.

Which two commands provide the administrator with the information needed to resolve the issue? (Choose two.)

A.

snmp user

B.

debug snmp engine-id

C.

debug snmpv3 engine-id

D.

debug snmp packet

E.

showsnmpv3 user

Full Access
Question # 96

Refer to the exhibit.

An engineer applies a prefix-list filter that filters most of the network 10 prefixes instead of allowing them. Which action resolves the issue?

A.

Modify the ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 9 command.

B.

Modify the command Modify the Ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 32 command.

C.

Modify the Ip prefix-list ElGRP seq 20 permit 0.0.0.0/0 le 32 command.

D.

Modify the ip prefix-list ElGRP seq 20 permit 10.0.0.0/8 ge 9 command

Full Access
Question # 97

Refer to the exhibit. The company implemented uRPF to address an antispoofing attack. A network engineer received a call from the IT security department that the regional data center is under an IP attack Which configuration must be implemented on R1 to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

Refer to the exhibit. A network engineer is provisioning end-to-end traffic service for two different enterprise networks with these requirements

The OSPF process must differ between customers on HQ and Branch office routers, and adjacencies should come up instantly.

The enterprise networks are connected with overlapping networks between HO and a branch office

Which configuration meets the requirements for a customer site?

A

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

Refer to the exhibit.

A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log message stream it is impossible to capture the problem Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two)

A.

debug condition interface

B.

debug condition ip

C.

debug condition ospf neighbor

D.

debug condition session-id ADJCHG

E.

debug condition all

Full Access
Question # 100

Refer to the exhibit. An administrator can log in to the device using Telnet but the attempts to log in to the same device using SSH with the same credentials fail Which action resolves this issue?

A.

Configure SSH service on the router

B.

Configure transport input all on the VTY lines to allow SSH

C.

Configure to use the Telnet user database for SSH as well

D.

Configure the VTY lines with login local

Full Access
Question # 101

Refer to the exhibit. A network engineer troubleshooting a packet drop problem for the host 172.16.100.5 notices that only one link is used and installed on the routing table, which saturates the bandwidth. Which action must the engineer take to resolve the high bandwidth utilization problem and share the traffic toward this host between the two available links?

A.

Set the eigrp variance equal to 4 to install a second route with a metric not larger than 4 times of the best metric.

B.

Change the EIGRP delay metric to meet the feasibility condition.

C.

Set the eigrp variance equal to 3 to install a second route with a metric not larger than 3 times of the best metric.

D.

Disable the eigrp split horizon loop protection mechanism.

Full Access
Question # 102

Refer to the exhibit.

While troubleshooting a BGP route reflector configuration, an engineer notices that reflected routes are missing from neighboring routers. Which two BGP configurations are needed to resolve the issue? (Choose two)

A.

neighbor 10.1.1.14 route-reflector-client

B.

neighbor R2 route-reflector-client

C.

neighbor 10.1.1.2 allowas-in

D.

neighbor R4 route-reflector-client

E.

neighbor 10.1.1.2 route-reflector-client

Full Access
Question # 103

Refer to the exhibit.

An engineer is trying to add an encrypted user password that should not be visible in the router configuration. Which two configuration commands resolve the issue? (Choose two)

A.

password encryption aes

B.

username Admin password Cisco@maedeh motamedi

C.

username Admin password 5 Cisco@maedeh motamedi

D.

username Admin secret Cisco@maedeh motamedi

E.

no service password-encryption

F.

service password-encryption

Full Access
Question # 104

Refer to the exhibit.

A network engineer receives a fault ticket about traffic drops from BANK SITE to BANK

Users can reach BANK SITE Y from router RA as a source.

Routers RB and RD are acting as route reflectors.

Which configuration resolves the issue?

A.

RC(config)#router bgp 65201RC(config-router)#neighbor 10.10.10.4 route-reflector-client

B.

RF(config)#router bgp 65201RF(config-router)#neighbor 10.10.10.6 route-reflector-client

C.

RC(config)#router bgp 65201RC(config-router)#neighbor 10.10.10.2 route-reflector-client

D.

RB(config)router bgp 65201RB(config-router)#neighbor 10.10.10.3 route-reflector-client

Full Access
Question # 105

Refer to the exhibit A network engineer notices that the configured track option is down Which configuration resolves the issue*?

A.

ip sla schedule 10 start-time now

B.

ip sla schedule 10 start-time pending life forever

C.

ip sla schedule 10 no timeout

D.

ip sla schedule 10 no threshold

Full Access
Question # 106

Refer to the exhibit.

An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?

A.

Replace OSPF process 10 on the interfaces with OSPF process 1 and configure an additional router IO with IPv6 address

B.

Replace OSPF process 10 on the interfaces with OSPF process 1. and remove process 10 from the global configuration

C.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv6 address and remove process 10 from the global configuration

D.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv4 address and remove process 10 from the global configuration

Full Access
Question # 107

Which two solutions are used to overcome a flapping link that causes a frequent label binding

exchange between MPLS routers? (Choose two)

A.

Create link dampening on links to protect the session.

B.

Increase input queue on links to protect the session.

C.

Create targeted hellos to protect the session.

D.

Increase a hold-timer to protect the session.

E.

Increase a session delay to protect the session.

Full Access
Question # 108

A network administrator cannot connect to a device via SSH. The line vty configuration is as follows:

Which action resolves this issue?

A.

Increase the session timeout

B.

Change the stopbits to 10.

C.

Configure the transport input SSH

D.

initialize the SSH key

Full Access
Question # 109

Refer to the exhibit. An administrator wanted to make R1 always elected as DR. R2 as BDR. and R3 as DROTHER but could not achieve the desired results. Which two configurations resolve the issue? (Choose two.)

A.

On the R1 FO/0 interface, configure OSPF priority to 255.

B.

On the R2 FO/0 interface, configure OSPF priority to 201.

C.

On the R1 F0/0 interface, configure OSPF priority to 202.

D.

On the R3 FO'O interface, configure OSPF priority to 201.

E.

On the R2 FO/0 interface, configure OSPF priority to 200.

Full Access
Question # 110

A network administrator performed a Compact Flash Memory upgrade on a Cisco Catalyst 6509 Switch. Everything is functioning normally except SNMP, which was configured to monitor the bandwidth of key interfaces but the interface indexes are changed. Which global configuration resolves the issue?

A.

snmp-server ifindex permanent

B.

snmp ifindex permanent

C.

snmp-server ifindex persist

D.

snmp ifindex persist

Full Access
Question # 111

Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies?

A.

RIB

B.

FEC

C.

LDP

D.

CEF

Full Access
Question # 112

Refer to the exhibit. The traffic from spoke to hub is dropping. The operations team observes:

R2-R3 link is down due to the fiber cut.

R2 and R5 receive traffic from R1 in AS 65101.

R3 and R5 receive traffic from R4 in AS 65201.

Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 113

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 114

:577

Refer to the exhibit. R3 is dual-homed to two service providers for traffic redundancy. R3 prefers its outbound traffic via R2. Which set of configurations achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 115

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 116

Refer to the exhibit.

The R1 and R2 configurations are:

The neighbor is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 tti-security hops 1neighbor 10.1.1.1 update-source loopback 0

B.

R2ip route 10.1.1.1 255.255.255.255 192.168.1.1!router bgp 200neighbor 10.1.1.1 disable-connected-checkneighbor 10.1.1.1 update-source loopback 0

C.

R2ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

D.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.1 ttl-security hops 1neighbor 10.1.1.2 update-source loopback 0

E.

R1ip route 10.1.1.2 255.255.255.255 192.168.1.2!router bgp 100neighbor 10.1.1.2 disable-connected-checkneighbor 10.1.1.2 update-source Loopback0

Full Access
Question # 117

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 118

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?

A.

router ospf 1default-information originate

B.

router ospf 1network 0.0.0.0 0.0.0.0 area 0

C.

router ospf 1redistribute connected 0.0.0.0

D.

router ospf 1redistribute static subnets

Full Access
Question # 119

Refer to the exhibit.

The network administrator must mutually redistribute routes at the Chicago router to the LA and NewYork routers. The configuration of the Chicago router is this:

After the configuration, the LA router receives all the NewYork routes, but NewYork router does not receive any LA routes. Which set of configurations fixes the problem on the Chicago router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 120

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/3ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2interface Ethernet0/1ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/3ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255!route-map PBR1 permit 10match ip address 101set ip next-hop 172.18.1.2!interface Ethernet0/1ip policy route-map PBR1

Full Access
Question # 121

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 122

Refer to the exhibit. A network administrator configured an IPv6 access list to allow TCP return traffic only, but it is not working as expected. Which changes resolve this issue?

A.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

B.

ipv6 access-list inboundpermit tcp any any syndeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

C.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound in

D.

ipv6 access-list inboundpermit tcp any any establisheddeny ipv6 any any log!interface gi0/0ipv6 traffic-filter inbound out

Full Access
Question # 123

Refer to Exhibit.

A network administrator has successfully configured DMVPN topology between a hub and two spoke routers. Which two configuration commands should establish direct communications between spoke 1 and spoke 2 without going through the hub? (Choose two).

A.

At the hub router, configure the ip nhrp shortcut command.

B.

At the spoke routers, configure the ip nhrp spoke-tunnel command.

C.

At the hub router, configure ip nhrp redirect the command

D.

At the spoke routers, configure the ip nhrp shortcut command.

E.

At the hub router, configure tne Ip nhrp spoke-tunnel command

Full Access
Question # 124

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

A.

Interface Tunnel1no ip split-horizon eigrp 111

B.

Interface Tunnel1Ip next-hop-self elgrp 111

C.

Interface Tunnel1tunnel mode Ipsec Ipv4

D.

Interface Tunnel1tunnel protection ipsec profile IPSec-PROFILE

Full Access
Question # 125

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 126

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Full Access
Question # 127

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

A.

Packets are not forwarded to the specific next hop.

B.

Packets are forwarded based on the routing table.

C.

Packets are forwarded based on a static route.

D.

Packets are forwarded to the specific next hop.

Full Access
Question # 128

Drag and drop the actions from the left into the correct order on the right to configure a policy to avoid following packet forwarding based on the normal routing path.

Full Access
Question # 129

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 130

Which two protocols work in the control plane of P routers across the MPLS cloud? (choose two)

A.

LSP

B.

RSVP

C.

ECMP

D.

LDP

E.

MPLS OAM

Full Access
Question # 131

Refer to the exhibit.

The network administrator can see the DHCP discovery packet in R1. but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the FaO/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)

A.

service dhcp-relay command on R1

B.

ip dhcp option 82 command on R2

C.

service dhcp command on R1

D.

ip dhcp relay information enable command on R1

E.

ip dhcp relay information trust-all command on R2

Full Access
Question # 132

Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source The configuration did not work as desired Which service must be enabled to resolve the issue?

A.

Enter the service timestamps log datetime localtime global command.

B.

Enter the service timestamps log datetime synchronize global command.

C.

Enter the service timestamps log datetime console global command.

D.

Enter the service timestamps log datetime clock-period global command

Full Access
Question # 133

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Full Access
Question # 134

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 135

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Full Access
Question # 136

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 137

What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Full Access
Question # 138

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 139

What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)

A.

The VPNv4 address is used to advertise the MPLS VPN label.

B.

RD is prepended to the IPv4 route to make it unique.

C.

MP-BGP is used to allow overlapping IPv4 addresses between customers to advertisethrough the network.

D.

The IPv4 address is needed to tag the MPLS label.

E.

The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4prefix.

Full Access
Question # 140

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second ISP link is up?

A.

LOCAL_PREF

B.

MED

C.

WEIGHT

D.

AS-PATH

Full Access
Question # 141

Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24. Which set of configurations resolves the issue?

A.

HQ_R3(config)# ip sla responderHQ_R3(config)# ip sla responder icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 192.168.100.2

C.

HQ R3(config)# Ip sla responderHQ R3(config)# Ip sla responder Icmp-echo 172.16.35.5

D.

BRANCH(config)# Ip sla 1BRANCH(config-ip-sta)# Icmp-echo 192.168.100.1

Full Access
Question # 142

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access
Question # 143

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 144

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 145

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 146

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 147

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 148

Exhibit:

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

A.

Check and resolve reachability between the WLC and the NTP server

B.

Reset the NTP server to resolve any synchronization issues for all devices

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Full Access
Question # 149

How are MPLS Layer 3 VPN services deployed?

A.

The RD and RT values must match under the VRR

B.

The RD and RT values under a VRF must match on the remote PE router

C.

The import and export RT values under a VRF must always be the same.

D.

The label switch path must be available between the local and remote PE routers.

Full Access
Question # 150

Refer to Exhibit.

The network administrator configured the branch router for IPv6 on the E0/0 interface. The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

B.

Disable IPv6 on the E0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the E0/0 interface by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E0/0 interface

Full Access
Question # 151

Refer to the exhibit.

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

A.

Configure TACACS+ synchronization with the Active Directory admin group

B.

Configure the username from a local database

C.

Configure full access for the username from TACACS+ server

D.

Configure an authorized IP address for this user to access this router

Full Access
Question # 152

Refer to the exhibit.

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Full Access
Question # 153

Refer to the exhibit.

The administrator successfully logs into R1 but cannot access privileged mode commands. What should be configured to resolve the issue?

A.

aaa authorization reverse-access

B.

secret cisco123! at the end of the username command instead of password cisco123!

C.

matching password on vty lines as cisco123!

D.

enable secret or enable password commands to enter into privileged mode

Full Access
Question # 154

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responderHQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responderHQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 155

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 156

Refer to the exhibit.

The OSPF routing protocol is redistributed into the BGP routing protocol, but not all the OSPF routes are distributed into BGP Which action resolves the issue?

A.

Include the word external in the redistribute command

B.

Use a route-map command to redistribute OSPF external routes defined in an access list

C.

Include the word internal external in the redistribute command

D.

Use a route-map command to redistribute OSPF external routes defined in a prefix list.

Full Access
Question # 157

A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?

A.

tunnel interface of the hub with ip nhrp ospf dr

B.

OSPF priority to 0

C.

route map to set the metrics of learned routes to 110

D.

OSPF priority greater than 1

Full Access
Question # 158

Refer to the exhibit.

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 159

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Full Access
Question # 160

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

A.

router bgp 64511aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511neighbor 192.168.100.1 summary-onlyneighbor 192.168.200.2 summary-only

C.

interface E 0/0ip bgp suppress-map BLOCK_SPECIFIC!interface E 0/1ip bgp suppress-map BLOCK_SPECIFIC!ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC!router bgp 64511aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Full Access
Question # 161

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 162

Refer to Exhibit:

AS 111 wanted to use AS 200 as the preferred path for 172.20.5.0/24 and AS 100 as the backup. After the configuration, AS 100 is not used for any other routes. Which configuration resolves the issue?

A.

route-mmap SETLP permit 10match ip address prefix-list PLIST1set local-preference 99route-map SETLP permit 20

B.

route-map SETLP permit 10match ip address prefix-list PLIST1set local-preference 110route-map SETLP permit 20

C.

router bgp 111no neighbor 192.168.10.1 route-map SETLP inneighbor 192.168.10.1 route-map SETLP out

D.

router bap 111no neighbor 192.168.10.1 route-map SETLP inneighbor 192.168.20.2 route-map SE TLP in

Full Access
Question # 163

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 164

Refer to the exhibit.

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Full Access
Question # 165

What are two functions of MPLS Layer 3 VPNs? (Choose two.)

A.

LDP and BGP can be used for Pseudowire signaling.

B.

It is used for transparent point-to-multipoint connectivity between Ethernet links/sites.

C.

BGP is used for signaling customer VPNv4 routes between PE nodes.

D.

A packet with node segment ID is forwarded along with shortest path to destination.

E.

Customer traffic is encapsulated in a VPN label when it is forwarded in MPLS network.

Full Access
Question # 166

Refer to the exhibit.

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

B.

Add icmp-echo command for the host.

C.

Add the control disable option to the tcp connect.

D.

Modify the ip sla schedule frequency to forever.

Full Access
Question # 167

Refer to the exhibit.

An engineer configured BGP between routers R1 and R3 The BOP peers cannot establish neighbor adjacency to be able to exchange routes. Which configuration resolves this issue?

A.

R3router bgp 6502address-family ipv6neighbor AB01:2011:7:100::1 activate

B.

R1router bgp 6501address-family ipv6neighbor AB01:2011:7:100;:3 activate

C.

R3router bgp 6502neighbor AB01:2011:7:100::1 ebgp-muttlhop 255

D.

R1router bgp 6501 neighborAB01:2011:7:100::3ebgp-multihop255

Full Access
Question # 168

Refer to the exhibit.

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 169

Refer to the exhibit.

While troubleshooting an EIGRP neighbor adjacency problem, the network engineer notices that the interface connected to the neighboring router is not participating in the EIGRP process. Which action resolves the issues?

A.

Configure the network command to network 172.16.0.1 0.0.0.0

B.

Configure the network command under EIGRP address family vrf CLIENT1

C.

Configure EIGRP metrics on interface FastEthernet0/3

D.

Configure the network command under EIGRP address family ipv4

Full Access
Question # 170

Refer to the exhibit.

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 171

Refer to the exhibit.

A company with autonomous system number AS65401 has obtained IP address block 209.165.200.224/27 fro, ARIN. The company needed more IP addresses and was assigned block209.165.202.128/27 from ISP2. An engineer is ISP1 reports they are receiving ISP2 routes from AS65401. Which configuration onR1 resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 172

Exhibit:

An engineer configured R2 and R5 as route reflectors and noticed that not all routes are sent to R1 to advertise to the eBGP peers. Which iBGP routers must be configured as route reflectors to advertise all routes to restore reachability across all networks?

A.

R1 and R4

B.

R1 and R5

C.

R4 and R5

D.

R2 and R5

Full Access
Question # 173

Refer to Exhibit.

Which two configurations allow clients to get dynamic ip addresses assigned?

A.

Configure access-list 100 permit udp any any eq 61 as the first line

B.

Configure access-list 100 permit udp any any eq 86 as the first line

C.

Configure access-list 100 permit udp any any eq 68 as the first line

D.

Configure access-list 100 permit udp any any eq 69 as the first line

E.

Configure access-list 100 permit udp any any eq 67 as the first line

Full Access
Question # 174

Drag and drop the LDP features from the left onto the descriptions on the right

Full Access
Question # 175

Refer to the exhibit.

A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

A.

The local preference value in another neighbor statement is higher than 250.

B.

The local preference value should be set to the same value as the weight in the route map.

C.

The route map is applied in the wrong direction.

D.

The weight value in another neighbor statement is higher than 200.

Full Access
Question # 176

Refer to the exhibit.

Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and

ignores BGP traffic that is sent at higher rate?

A.

policy-map SHAPE_BGP

B.

policy-map LIMIT_BGP

C.

policy-map POLICE_BGP

D.

policy-map COPP

Full Access
Question # 177

While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?

A.

The device must be resynced to Cisco DNA Center.

B.

The software image for the device is in install mode.

C.

The device has lost connectivity to Cisco DNA Center.

D.

The software image for the device is in bundle mode

Full Access
Question # 178

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 179

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 180

Refer to the exhibit.

The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host

192.168.10.10cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action

resolves the issue without opening full access to this router?

A.

Move the SSH entry to the beginning of the ACL

B.

Temporarily move the permit ip any any line to the beginning of the ACL to see if the flow works

C.

Temporarily remove the ACL from the interface to see if the flow works

D.

Run the show access-list FILTER command to view if the SSH entry has any hit statistic associated with it

Full Access