Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What does the PE router convert the Ipv4 prefix to within an MPLS VPN?

A.

VPN-IPv4 prefix combined with the 64-bit route distinguisher

B.

48-bit route combining the IP and PE router-id

C.

prefix that combines the ASN, PE router-id, and IP prefix

D.

eBGP path association between the PE and CE sessions

Full Access
Question # 5

Refer to the exhibit.

The network administrator must mutually redistribute routes at the Chicago router to the LA and NewYork routers. The configuration of the Chicago router is this:

After the configuration, the LA router receives all the NewYork routes, but NewYork router does not receive any LA routes. Which set of configurations fixes the problem on the Chicago router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 6

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Configure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404

B.

Configure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01

C.

Configure DSW1(config)#ipv6 route 2002:404:404:404:404/128 FastEthernet1/0

D.

Configure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 7

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

B.

Configure syslog level 3.

C.

Configure syslog level 4.

D.

Configure syslog level 5.

Full Access
Question # 8

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

A.

Detect Mult

B.

Required Min Echo RX Interval

C.

Desired Min TX Interval

D.

Required Min RX Interval

Full Access
Question # 9

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 10

Refer to the exhibit.

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Full Access
Question # 12

Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source The configuration did not work as desired Which service must be enabled to resolve the issue?

A.

Enter the service timestamps log datetime localtime global command.

B.

Enter the service timestamps log datetime synchronize global command.

C.

Enter the service timestamps log datetime console global command.

D.

Enter the service timestamps log datetime clock-period global command

Full Access
Question # 13

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second ISP link is up?

A.

LOCAL_PREF

B.

MED

C.

WEIGHT

D.

AS-PATH

Full Access
Question # 14

Refer to the exhibit. The network administrator configured the branch router for IPv6 on the E 0/0 interface The neighboring router is fully configured to meet requirements, but the neighbor relationship is not coming up. Which action fixes the problem on the branch router to bring the IPv6 neighbors up?

A.

Enable the IPv4 address family under the E 0/0 interface by using the address-family Ipv4 unicast command

B.

Disable IPv6 on the E 0/0 interface using the no ipv6 enable command

C.

Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4 unicast command

D.

Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E 0/0 interface.

Full Access
Question # 15

Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

B.

Configure router with the telemetry data

C.

Configure router with routing to reach Cisco DNA Center

D.

Configure router with SNMPv2c or SNMPv3 traps

Full Access
Question # 16

Refer to the exhibit. The remote server is failing to receive the NetFlow data Which action resolves the issue?

A.

Modify the flow transport command transport udp 2055 to move under flow monitor profile.

B.

Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input.

C.

Modify the udp port under flow exporter profile to Ip transport udp 4739.

D.

Modify the flow record command record v4_r1 to move under flow exporter profile.

Full Access
Question # 17

Refer to the exhibit.

The Math and Science departments connect through the corporate. IT router but users in the Math department must not be able to reach the Science department and vice versa Which configuration accomplishes this task?

A.

vrf definition Science

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

B.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

vrf forwarding Science

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

vrf forwarding Science

no shut

C.

vrf definition Science

address-family ipv4

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

D.

vrf definition Science

address-family ipv4

!

interface E 0/2

vrf forwarding Science

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

vrf forwarding Science

ip address 192.168.2.1

Full Access
Question # 18

An engineer must configure a Cisco router to initiate secure connections from the router to other devices in the network but kept failing. Which two actions resolve the issue? (Choose two.)

A.

Configure a source port for the SSH connection to initiate

B.

Configure a TACACS+ server and enable it

C.

Configure transport input ssh command on the console

D.

Configure a domain name

E.

Configure a crypto key to be generated

Full Access
Question # 19

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 20

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access
Question # 21

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

C.

Packets are forwarded to the default gateway.

D.

Packets are forwarded using normal route lookup.

E.

Packets are dropped by the access list.

Full Access
Question # 22

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

What does IPv6 Source Guard utilize to determine if IPv6 source addresses should be forwarded?

A.

ACE

B.

ACLS

C.

DHCP

D.

Binding Table

Full Access
Question # 24

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 25

Refer to the exhibits.

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted on the 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip route command. Which action stabilizes the service?

A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.

B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.

C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.

Full Access
Question # 27

Refer to the exhibit.

R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A.

Fix route dampening configured on the router.

B.

Replace the SFP module because it is not supported.

C.

Fix IP Event Dampening configured on the interface.

D.

Correct the IP SLA probe that failed.

Full Access
Question # 28

Refer to the exhibit.

An engineer wanted to set a tag of 30 to route 10 1.80.65/32 but it failed How is the issue fixed?

A.

Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.

B.

Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.

C.

Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24

D.

Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32

Full Access
Question # 29

Refer to the exhibit.

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

A.

Advertise the branch WAN interface matching subnet for the DR site.

B.

Configure matching hello and dead intervals between sites.

C.

Configure the WAN interface for DR site in the related OSPF area.

D.

Stabilize the DR site flapping link to establish OSPF adjacency.

Full Access
Question # 30

Refer to the exhibit.

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Full Access
Question # 31

Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Full Access
Question # 32

Refer to the exhibit.

A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails. Which action resolves this issue?

A.

The SSH service must be enabled with the crypto key generate rsa command.

B.

The SCP service must be enabled with the ip scp server enable command.

C.

The Python interpreter must first be enabled with the guestshell enable command.

D.

The SSH access must be allowed on the VTY lines using the transport input ssh command.

Full Access
Question # 33

What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)

A.

The VPNv4 address is used to advertise the MPLS VPN label.

B.

RD is prepended to the IPv4 route to make it unique.

C.

MP-BGP is used to allow overlapping IPv4 addresses between customers to advertise

through the network.

D.

The IPv4 address is needed to tag the MPLS label.

E.

The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4

prefix.

Full Access
Question # 34

Refer to the exhibit.

The OSPF routing protocol is redistributed into the BGP routing protocol, but not all the OSPF routes are distributed into BGP Which action resolves the issue?

A.

Include the word external in the redistribute command

B.

Use a route-map command to redistribute OSPF external routes defined in an access list

C.

Include the word internal external in the redistribute command

D.

Use a route-map command to redistribute OSPF external routes defined in a prefix list.

Full Access
Question # 35

Refer to the exhibit.

R1 is being monitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?

A.

Modify the CoPP policy to increase the configured exceeded limit for SNMP.

B.

Modify the access list to include snmptrap.

C.

Modify the CoPP policy to increase the configured CIR limit for SNMP.

D.

Modify the access list to add a second line to allow udp any any eq snmp

Full Access
Question # 36

Refer to the exhibit.

A user cannot SSH to the router. What action must be taken to resolve this issue?

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Full Access
Question # 37

Refer to the exhibit.

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Full Access
Question # 38

Exhibit:

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 39

Drag and drop the MPLS VPN device types from the left onto the definitions on the right.

Full Access
Question # 40

Refer to the exhibit.

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

B.

Add icmp-echo command for the host.

C.

Add the control disable option to the tcp connect.

D.

Modify the ip sla schedule frequency to forever.

Full Access
Question # 41

Refer to the exhibit.

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 42

Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server RouterB is configured as follows:

Interface fastethernet 0/0

description Client DHCP ID 394482431

Ip address 172 31 11 255 255.255 0

!

ip route 172.16.1.0 255 255 255.0 10.1.1.2

Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?

A.

RouterB(config-if)#lp helper-address 172.31.1.1

B.

RouterBiconfig-ififclp helper-address 255.255 255 255

C.

RouterB(config-if)#lp helper-address 172.16.1.1

D.

RouterB(config-if)#lp helper-address 172.16.1.2

Full Access
Question # 43

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

B.

IPv6 Destination Guard

C.

DHCPv6 Guard

D.

IPv6 MAC address filtering

Full Access
Question # 44

Refer to Exhibit:

AS 111 wanted to use AS 200 as the preferred path for 172.20.5.0/24 and AS 100 as the backup. After the configuration, AS 100 is not used for any other routes. Which configuration resolves the issue?

A.

route-mmap SETLP permit 10

match ip address prefix-list PLIST1

set local-preference 99

route-map SETLP permit 20

B.

route-map SETLP permit 10

match ip address prefix-list PLIST1

set local-preference 110

route-map SETLP permit 20

C.

router bgp 111

no neighbor 192.168.10.1 route-map SETLP in

neighbor 192.168.10.1 route-map SETLP out

D.

router bap 111

no neighbor 192.168.10.1 route-map SETLP in

neighbor 192.168.20.2 route-map SE TLP in

Full Access
Question # 45

Exhibit:

Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and192.168.4.0/24 networks uses the HongKong router as the preferred router. Which set of configurations accomplishes this task?

A.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

interface Ethernet0/3

ip policy route-map PBR1

B.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

interface Ethernet0/1

ip policy route-map PBR1

C.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

!

interface Ethernet0/3

ip policy route-map PBR1

D.

access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255

access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255

!

route-map PBR1 permit 10

match ip address 101

set ip next-hop 172.18.1.2

!

interface Ethernet0/1

ip policy route-map PBR1

Full Access
Question # 46

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

Full Access
Question # 47

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 48

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 49

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 50

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responder

HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responder

HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 51

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 52

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 53

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Full Access
Question # 54

Refer to the exhibit.

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

A.

access-class INTERNET in

B.

ipv6 traffic-filter INTERNET in

C.

ipv6 access-class INTERNET in

D.

ip access-group INTERNET in

Full Access
Question # 55

Refer to the exhibit.

An engineer identifier a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?

A.

no spanning-tree uplinkfast

B.

spanning-tree loopguard default

C.

spanning-tree backbonesfast

D.

spanning-tree portfast bpduguard

Full Access
Question # 56

Refer to Exhibit.

A network administrator enables DHCP snooping on the Cisco Catalyst 3750-X switch and configures the uplink port (Port-channel2) as a trusted port. Clients are not receiving an IP address, but when DHCP snooping is disabled, clients start receiving IP addresses. Which global command resolves the issue?

A.

No ip dhcp snooping information option

B.

ip dhcp snooping

C.

ip dhcp relay information trust portchannel2

D.

ip dhcp snooping trust

Full Access
Question # 57

An engineer configured a company’s multiple area OSPF head office router and Site A cisco

routers with VRF lite. Each site router is connected to a PE router of an MPLS backbone.

After finishing both site router configurations, none of the LSA 3,4 5, and 7 are installed at Site A router. Which configuration resolves this issue?

A.

configure capability vrf-lite on Site A and its connected PE router under router ospf 1 vrf abc

B.

configure capability vrf-lite on Head Office and its connected PE router under router ospf 1 vrf abc

C.

configure capability vrf-lite on both PE routers connected to Head Office and Site A routers under routtr ospf 1 vrf abc

D.

configure capability vrf-lite on Head Office and Site A routers under router ospf 1 vrf abc

Full Access
Question # 58

Refer to the exhibit.

Which configuration configures a policy on R1 to forward any traffic that is sourced from

the 192.168.130.0/24 network to R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A.

sudo maglev-config update

B.

sudo maglev install config update

C.

sudo maglev reinstall

D.

sudo update config install

Full Access
Question # 60

Refer to the exhibit.

An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the

summary route does not show up in the routing table. Why is the summary route missing?

A.

The summary-address command is used only for summarizing prefixes between areas.

B.

The summary route is visible only in the OSPF database, not in the routing table.

C.

There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.

D.

The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

Full Access
Question # 61

Refer to the exhibit.

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 62

Drag and drop the packet types from the left onto the correct descriptions on the right.

Full Access
Question # 63

Refer to the exhibit.

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 64

Refer to the exhibit.

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 65

Refer to Exhibit.

Which statement about redistribution from BGP into OSPF process 10 is true?

A.

Network 172.16.1.0/24 is not redistributed into OSPF.

B.

Network 10.10 10.0/24 is not redistributed into OSPF

C.

Network 172.16.1.0/24 is redistributed with administrative distance of 1.

D.

Network 10.10.10.0/24 is redistributed with administrative distance of 20.

Full Access
Question # 66

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 67

Refer to the exhibit.

An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A.

Configure the service timestamps log uptime command in global configuration mode.

B.

Configure the logging clock synchronize command in global configuration mode.

C.

Configure the service timestamps log datetime localtime command in global configuration mode.

D.

Make sure that the clock on the device is synchronized with an NTP server.

Full Access
Question # 68

Refer to the exhibit.

In which circumstance does the BGP neighbor remain in the idle condition?

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Full Access
Question # 69

Which two statements about VRF-Lite configurations are true? (Choose two.)

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

Full Access
Question # 70

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 71

Refer to the exhibit.

An engineer is trying to redistribute OSPF to BGP, but not all of the routes are

redistributed. What is the reason for this issue?

A.

By default, only internal routes and external type 1 routes are redistributed into BGP

B.

Only classful networks are redistributed from OSPF to BGP

C.

BGP convergence is slow, so the route will eventually be present in the BGP table

D.

By default, only internal OSPF routes are redistributed into BGP

Full Access
Question # 72

Refer to the exhibit.

An engineer configures a static route on a router, but when the engineer checks the route

to the destination, a different next hop is chosen. What is the reason for this?

A.

Dynamic routing protocols always have priority over static routes.

B.

The metric of the OSPF route is lower than the metric of the static route.

C.

The configured AD for the static route is higher than the AD of OSPF.

D.

The syntax of the static route is not valid, so the route is not considered.

Full Access
Question # 73

Refer to the exhibit.

An engineer is trying to block the route to 192.168.2.2 from the routing table by using the

configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?

A.

Use an extended access list instead of a standard access list.

B.

Change sequence 10 in the route-map command from permit to deny.

C.

Use a prefix list instead of an access list in the route map.

D.

Add this statement to the route map: route-map RM-OSPF-DL deny 20.

Full Access
Question # 74

Users were moved from the local DHCP server to the remote corporate DHCP server. After the move,

none of the users were able to use the network.

Which two issues will prevent this setup from working properly? (Choose two)

A.

Auto-QoS is blocking DHCP traffic.

B.

The DHCP server IP address configuration is missing locally

C.

802.1X is blocking DHCP traffic

D.

The broadcast domain is too large for proper DHCP propagation

E.

The route to the new DHCP server is missing

Full Access
Question # 75

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 76

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 77

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

A.

DMVPN

B.

MPLS VPN

C.

Virtual Tunnel Interface (VTI)

D.

SSL VPN

E.

PPPoE

Full Access
Question # 78

Exhibit:

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-

7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 79

Which list defines the contents of an MPLS label?

A.

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.

32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

C.

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Full Access
Question # 80

While troubleshooting connectivity issues to a router, these details are noticed:

  • Standard pings to all router interfaces, including loopbacks, are successful.
  • Data traffic is unaffected.
  • SNMP connectivity is intermittent.
  • SSH is either slow or disconnects frequently.

Which command must be configured first to troubleshoot this issue?

A.

show policy-map control-plane

B.

show policy-map

C.

show interface | inc drop

D.

show ip route

Full Access
Question # 81

What is a limitation of IPv6 RA Guard?

A.

It is not supported in hardware when TCAM is programmed

B.

It does not offer protection in environments where IPv6 traffic is tunneled.

C.

It cannot be configured on a switch port interface in the ingress direction

D.

Packets that are dropped by IPv6 RA Guard cannot be spanned

Full Access
Question # 82

Which protocol does VRF-Lite support?

A.

IS-IS

B.

ODR

C.

EIGRP

D.

IGRP

Full Access
Question # 83

What is the output of the following command:

show ip vrf

A.

Show's default RD values

B.

Displays IP routing table information associated with a VRF

C.

Show's routing protocol information associated with a VRF.

D.

Displays the ARP table (static and dynamic entries) in the specified VRF

Full Access
Question # 84

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Full Access
Question # 85

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 86

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Which command is used to check IP SLA when an interface is suspected to receive lots of traffic with options?

A.

show track

B.

show threshold

C.

show timer

D.

show delay

Full Access
Question # 88

Refer to the exhibit.

Drag and drop the credentials from the left onto the remote login information on the right to resolve a failed login attempt to vtys. Not all credentials are uf SLA by defining frequency and schedulingsed

Full Access
Question # 89

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Full Access
Question # 90

Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A.

nonbroadcast multiaccess

B.

packet switching

C.

policy-based routing

D.

forwarding information base

Full Access
Question # 91

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 92

Which configuration enabled the VRF that is labeled “Inet” on FastEthernet0/0?

A.

R1(config)# ip vrf Inet

R1(config-vrf)#interface FastEthernet0/0

R1(config-if)#ip vrf forwarding Inet

B.

R1(config)#router ospf 1 vrf Inet

R1(config-router)#ip vrf forwarding FastEthernet0/0

C.

R1(config)#ip vrf Inet FastEthernet0/0

D.

R1(config)# ip vrf Inet

R1(config-vrf)#ip vrf FastEthernet0/0

Full Access
Question # 93

Which component of MPLS VPNs is used to extend the IP address so that an engineer is able to

identify to which VPN it belongs?

A.

VPNv4 address family

B.

RD

C.

RT

D.

LDP

Full Access
Question # 94

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Full Access
Question # 95

Which two statements about redistributing EIGRP into OSPF are true? (Choose two)

A.

The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database

B.

The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database

C.

The administrative distance of the redistributed routes is 170

D.

The redistributed EIGRP routes appear as OSPF external type 1

E.

The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRP

autonomous system number

F.

The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table

Full Access
Question # 96

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 97

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A.

service timestamps log uptime

B.

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.

service timestamps log datetime localtime show-timezone

D.

clock calendar-valid

Full Access
Question # 98

Refer to the exhibit.

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 99

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

Full Access
Question # 100

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

Full Access
Question # 101

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

Full Access
Question # 102

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 103

Which command displays the IP routing table information that is associated with VRF-Lite?

A.

show ip vrf

B.

show ip route vrf

C.

show run vrf

D.

show ip protocols vrf

Full Access
Question # 104

Refer to the exhibit.

During troubleshooting it was discovered that the device is not reachable using a secure

web browser. What is needed to fix the problem?

A.

permit tcp port 443

B.

permit udp port 465

C.

permit tcp port 465

D.

permit tcp port 22

Full Access
Question # 105

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A.

R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.

B.

R1 does not accept any routes other than 192.168.130.0/24

C.

R1 does not forward traffic that is destined for 192.168.30.0/24

D.

Network 192.168.130.0/24 is not allowed in the R1 table

Full Access
Question # 106

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 107

Refer to the exhibit.

An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A.

Use the icmp-echo command to track both default routes

B.

Use the same AD for both default routes

C.

Start IP SLA by matching numbers for track and ip sla commands

D.

Start IP SLA by defining frequency and scheduling it

Full Access
Question # 108

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 109

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A.

Copy the file to the destination router with the copy tftp: flash: command

B.

Enable the TFTP server on the source router with the tftp-server flash: command

C.

TFTP is not supported in recent IOS versions, so an alternative method must be used

D.

Configure a user on the source router with the username tftp password tftp command

E.

Configure the TFTP authentication on the source router with the tftp-server authentication local command

Full Access
Question # 110

Refer to the exhibit.

A junior engineer updated a branch router configuration. Immediately after the change, the engineer receives calls from the help desk that branch personnel cannot reach any network destinations. Which configuration restores service and continues to block 10.1.1.100/32?

A.

route-map FILTER-IN deny 5

B.

ip prefix-list 102 seq 15 permit 0.0.0.0/32 le 32

C.

ip prefix-list 102 seq 5 permit 0.0.0.0/32 le 32

D.

route-map FILTER-IN permit 20

Full Access
Question # 111

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Full Access
Question # 112

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Full Access
Question # 113

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 114

Refer to the exhibit.

An IP SLA is configured to use the backup default route when the primary is down, but it is not working as desired. Which command fixes the issue?

A.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.

R1(config)#ip sla track 1

D.

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Full Access
Question # 115

The network administrator configured the router for Control Plane Policrg so that inbound SSH traffic is policed to 500 kbps This policy must apply to traffic coming in from 101010 0<24 and 192 168 10.0/24 networks

The Control Rane Policing is not applied to SSH traffic and SSH is open to use any bandwidth available. Which configuration resolves this issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 116

Refer to the exhibit.

A network engineer must establish communication between three different customer sites with these requirements:

  • Site-A: must be restricted to access to any users at Site-B or Site-C.
  • Site-B and Site-C must be able to communicate between sites and share routes using OSPF.

Which configuration meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 117

Refer to the exhibit.

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from ethernet 0/0 of R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1

source Ethernet0/0

B.

interface Ethernet0/1

ip flow monitor Flowmonitor1 input

ip flow monitor Flowmonitor1 output

C.

interface Ethernet0/0

ip flow monitor Flowmonitor1 input

ip flow monitor Flowmonitor1 output

D.

flow exporter FlowAnalyzer1

source Ethernet0/0

Full Access
Question # 118

Refer to the exhibit. An organization is installing a new L3 MPLS link to establish DM VPN Phase 2 tunnels between the hub and two spoke routers Which additional configuration should the engineer implement on each device to achieve optimal routing between the spokes?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 119

An engineer creates a default static route on a router with a hop of 10.1.1.1. On inspection, the engineer finds the router has two VRFs, Red and Blue. The next hop is valid for both VRFs and exists in each assigned VRF. Which configuration achieves connectivity?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 120

Refer to the exhibit.

The network administrator configured the Chicago router to mutually redistribute the LA and NewYork routes with OSPF routes to be summarized as a single route in EIGRP using the longest summary mask:

After the configuration, the New York router receives all the specific LA routes but the summary route. Which set of configurations resolves the issue on the Chicago router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 121

Refer to the exhibit A CoPP policy is implemented to allow specific control traffic, but the traffic is not matching as expected and is getting unexpected behavior of control traffic. Which action resolves the issue?

A.

Use match-any instruction in class-map

B.

Create a separate class map against each ACL.

C.

Create a separate class map lor ICMP traffic.

D.

Use default-class to match ICMP traffic

Full Access
Question # 122

Refer to the exhibit. An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?

A.

Configure the debug uptime option

B.

Configure the msec option

C.

Configure the timezone option

D.

Configure the tog uptime option

Full Access
Question # 123

Refer to the exhibit.

An administrator is configuring a GRE tunnel to establish an EIGRP neighbor to a remote router. The

other tunnel endpoint is already configured. After applying the configuration as shown, the tunnel

started flapping. Which action resolves the issue?

A.

Modify the network command to use the Tunnel0 interface netmask

B.

Advertise the Loopback0 interface from R2 across the tunnel

C.

Stop sending a route matching the tunnel destination across the tunnel

D.

Readdress the IP network on the Tunnel0 on both routers using the /31 netmask

Full Access
Question # 124

Refer to the exhibit.

An engineer configured SNMP communities on the Core_SW1, but the SNMP server cannot obtain information from Core_SW1. Which configuration resolves this issue?

A.

snmp-server group NETVIEW v2c priv read NETVIEW access 20

B.

access-list 20 permit 10.221.10.11

C.

access-list 20 permit 10.221.10.12

D.

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22

Full Access
Question # 125

What is the function of BFD?

A.

It provides uniform failure detection regardless of media type.

B.

It creates high CPU utilization on hardware deployments.

C.

It negotiates to the highest version if the neighbor version differs.

D.

It provides uniform failure detection on the same media type.

Full Access
Question # 126

Refer to the exhibit.

An engineer is troubleshooting a TACACS problem.

Which action resolves the issue?

A.

Configure a matching TACACS server IP.

B.

Configure a matching preshared key.

C.

Generate authentication from a relative source interface.

D.

Apply a configured AAA profile to the VTY.

Full Access
Question # 127

A newly Installeo router starts establishing an LDP session from another MPLS router to which it is not directly connected. Which LDP message type responds by target router to the Initiating router using UDP protocol?

A.

notification message

B.

session message

C.

extended discovery message

D.

advertisement message

Full Access
Question # 128

Refer to the exhibit.

An engineer must configure OSPF with R9 and R10 and configure redistribution between OSPF and RIP causing a routing loop Which configuration on R9 and R10 meets this objective?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 129

Refer to the exhibit.

The R2 loopback interface is advertised with RIP and EIGRP using default values. Which configuration changes make R1 reach the R2 loopback using RIP?

A.

R1(config)# router rip

R1(config-router)# distance 90

B.

R1(config)# router rip

R1(config-router)# distance 100

C.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 130 120

D.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 120 120

Full Access
Question # 130

Refer to the exhibit While troubleshooting an issue on the network, an engineer notices that a TCP Connect operation failed on port 3000 between R101 and R201. Which command must be configured on R201 to respond to the R101 IP SLA configurations with a control connection on UDP port 1967?

A.

ip sla responder udp-echo ipaddress 1.1.1.1 port 1967

B.

ip sla responder tcp-connect ipaddress 1.1.1.1 port 3000

C.

ip sla responder tcp-connect ipaddress 2.2.2.2 port 3001

D.

ip sla responder

Full Access
Question # 131

How is the LDP router ID used in an MPLS network?

A.

The MPLS LOP router ID must match the IGP router ID.

B.

If not configured, the operational physical interface is chosen as the router ID oven d a loopback is configured.

C.

The loopback with the highest IP address is selected as the router ID

D.

The force keyword changes the router ID to the speeded address without causing any impact.

Full Access
Question # 132

Refer to the exhibit.

An administrator is attempting to disable the automatic logout after a period of inactivity. After logging out the console stopped responding to all keyword inputs. Remote access through SSH still work resolves the issue?

A.

Configure the exec command on line con 0.

B.

Configure the absolute-timeout command on line con 0.

C.

Configure the default exec-timeout command on line con 0.

D.

Configure the no exec-timeout command on line con 0.

Full Access
Question # 133

Refer to the exhibit.

An engineer is trying to add an encrypted user password that should not be visible in the router configuration. Which two configuration commands resolve the issue? (Choose two)

A.

password encryption aes

B.

username Admin password Cisco@maedeh motamedi

C.

username Admin password 5 Cisco@maedeh motamedi

D.

username Admin secret Cisco@maedeh motamedi

E.

no service password-encryption

F.

service password-encryption

Full Access
Question # 134

Refer to the exhibit.

A network engineer applied a filter for LSA traffic on OSPFv3 interarea routes on the area 5 ABR to protect advertising the internal routes of area 5 to the business partner network. All other areas should receive the area 5 internal routes. After the respective route filtering configuration is applied on the ABR, area 5 routes are not visible on any of the areas. How must the filter list be applied on the ABR to resolve this issue?

A.

in the “in” direction for area 5 on router R1

B.

in the “out” direction for area 5 on router R1

C.

in the “in” direction for area 20 on router R2

D.

in the “out” direction for area 20 on router R2

Full Access
Question # 135

Refer to the exhibit. An engineer examines the BGP update for the IPv6 prefix 2001:db8::1/128. which should have been summarized into a /64 prefix. Which sequence of actions achieves the summarization?

A.

R1 is a route reflector client of a RR with a router ID of 1.1.1.1. and the originator of the prefix has a router ID of 3.3.3.3. Both routers belong to different ASs. The prefix is not advertised to any peer and must be advertised using the network statement on R3.

B.

R1 is a route reflector with a router ID of 3.3.3.3. and the originator of the prefix is a route reflector client, which has a router ID of 3.3.3.3. Both routers belong to the same AS Configure an aggregate address on the router with ID 1.1.1.1 for the prefix

C.

R1 is a route reflector with a router ID of 1.111. and the originator of the prefix is a route reflector client, which has a router ID of 3.3.3.3. Both routers belong to the same AS Configure an aggregate address on the router with ID 1.1.1.1 for the prefix

D.

R1 is a route reflector client of a RR with a router ID of 1.1.1.1. and the originator of the prefix has a router ID of 3.3.3.3. Both routers belong to the same AS. Configure an aggregate address on the router with ID 3 3.3.3 for the prefix.

Full Access
Question # 136

Refer to the exhibit R1 cannot establish a neighbor relationship with R2 Which action resolves the issue"?

A.

Configure the mtu Ignore command on the Interfaces of R1 and R2

B.

Configure the ip ospf network point-to-point command on the interfaces of R1 and R2

C.

Configure the ip ospf network broadcast command on the interfaces of R1 and R2

D.

Configure the neighbor 2.2.2.2 command on R1 under the OSPF process

Full Access
Question # 137

Refer to the exhibit.

Which action makes 10.1.3.2 the feasible successor to reach 10. 200. 1 0/24 for location S42T447E33F95?

A.

Increase path bandwidth lower than 1011 2 and lower than 1012 2 between RtrA and the destination

B.

Increase path bandwidth higher than 10.1 2 2 and lower than 101.1.2 between RtrA and the destination.

C.

Increase path bandwidth higher than 1011 2 and lower than 1012 2 between RtrA and the destination

D.

Increase path bandwidth higher than 10.1 2 2 and higher than 10.1.1.2 between RtrA and the destination

Full Access
Question # 138

Which two technologies optimize MPLS infrastructure using bandwidth protection services when experiencing slow response7 (Choose two.)

A.

IPLFA

B.

MPLS OAM

C.

VPLS

D.

SO-MPLS

E.

Fast-Rwoute

Full Access
Question # 139

Refer to the exhibit An engineer observes that every time the ICMP packet is lost at a polling interval, track 1 goes down, which causes unnecessary disruption and instability in the network. The engineer does not want the traffic to be rerouted if the loss of ICMP packets is negligible. If the packet loss is persistent for a longer duration, the track must go down and the traffic must be rerouted. Which action resolves the issue?

A.

Change the IP SLA schedule to run only at certain intervals.

B.

Increase the threshold value from 1000 to 1500.

C.

Increase the timeout value from 1000 to 1500

D.

Define a delay timer under track 1.

Full Access
Question # 140

Refer to the exhibit.

An engineer must establish a point-to-point GRE VPN between R1 and the remote site. Which configuration accomplishes the task for the remote site?

A.

Interface Tunnel1

tunnel source 199.1.1.1

tunnel destination 200.1.1.3

ip address 192.168.1.3 255.255.255.0

B.

Interface Tunnel1

tunnel source 200.1.1.3

tunnel destination 199.1.1.1

ip address 192.168.1.1.255.255.255.0

C.

Interface Tunnel1

tunnel source 200.1.1.3

tunnel destination 199.1.1.1

ip address 192.168.1.3.255.255.255.0

D.

Interface Tunnel

lunnel source 199.1.1.1

tunnel destination 200.1.1.3

ip address 192.168.1.1.255.255.255.0

Full Access
Question # 141

What are two characteristics of IPv6 Source Guard? (Choose two.)

A.

requires IPv6 snooping on Layer 2 access or trunk ports

B.

used in service provider deployments to protect DDoS attacks

C.

requires the user to configure a static binding

D.

requires that validate prefix be enabled

E.

recovers missing binding table entries

Full Access
Question # 142

Which technique removes the outermost label of an MPLS-tagged packet before the packet is forwarded to an adjacent LER?

A.

label swap

B.

explicit-null

C.

label imposition

D.

PHP

Full Access
Question # 143

Refer to the exhibit.

While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.

Which command resolves this issue?

A.

access-class INTERNET in

B.

ip access-group INTERNET in

C.

ipv6 traffic-filter INTERNET in

D.

ipv6 access-class INTERNET in

Full Access
Question # 144

Refer to the exhibit.

The static route is not present in the routing table of an adjacent OSPF neighbor router. Which action resolves the issue?

A.

Configure the next hop of 10.20.20.1 in the prefix list DMZ-STATIC

B.

Configure the next-hop interface at the end of the static router for it to get redistributed

C.

Configure a permit 20 statement to the route map to redistribute the static route

D.

Configure the subnets keyword in the redistribution command

Full Access
Question # 145

Refer to the exhibit. An engineer configured SNMP traps to record spoofed packets drop of more than 48000 a minute on the ethernet0/0 interlace. During an IP spoofing attack, the engineer noticed that no notifications have been received by the SNMP server. Which configuration resolves the issue on R1?

A.

ip verity unicast notification threshold 48000

B.

ip verify unicast notification threshold 8000

C.

ip verify unicast notification threshold 800

D.

ip verify unicast notification threshold 80

Full Access
Question # 146

Refer to the exhibit.

A loop occurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled. Which action prevents the loop between R1, R2, and R3?

A.

Configure route tagging

B.

Enable split horizon

C.

Configure R2 as stub receive-only

D.

Configure route filtering

Full Access
Question # 147

An engineer configured a router with this configuration

ip access-hst DENY TELNET

10 deny tcp any any eq 23 log-input

The router console starts receiving log message :%SEC-6-IPACCESSLOGP: list DENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) ->192.168.2.20(23), 1 packet"

Which action stops messages on the console while still denying Telnet?

A.

Configure a 20 permit ip any any command

B.

Remove log-Input keyword from the access list.

C.

Replace log-input keyword with the log keyword in the access list.

D.

Configure a 20 permit ip any any log-input command.

Full Access
Question # 148

Refer to the exhibit. Site1 must perform unequal cost load balancing toward the segments behind Site2 and Site3. Some of the routes are getting load balanced but others are not. Which configuration allows Site1 to load balance toward all the LAN segments of the remote routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 149

Refer to the exhibit An engineer must connect the Reno and Detroit spokes using DMVPN phase 2 Hub tunnel configuration is

Which configuration accomplishes the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 150

Refer to the exhibit. An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 151

What is a function of BFD?

A.

peer recovery after a Layer 3 protocol adjacency failure

B.

peer recovery after a Layer 2 adjacency failure

C.

failure detection independent of routing protocols and media types

D.

failure detection dependent on routing protocols and media types

Full Access
Question # 152

Which IPv6 first hop security feature controls the traffic necessary for proper discovery of neighbor device operation and performance?

A.

RA Throttling

B.

Source or Destination Guard

C.

ND Multicast Suppression

D.

IPv6 Snooping

Full Access
Question # 153

Refer to lhe exhibit. APC is configured to obtain an IP address automatically, but it receives an IP address only from the 169.254.0.0 subnet The DHCP server logs contained no DHCPDISCOVER message from the MAC address of the PC. Which action resolves the issue?

A.

Configure an ip helper-address on the router to forward DHCP messages to the server.

B.

Configure DHCP Snooping on the switch to forward DHCP messages to the server.

C.

Configure a DHCP reservation on the server for the PC.

D.

Configure a static IP address on the PC and exclude it from the DHCP pool.

Full Access
Question # 154

Refer to the exhibit.

An administrator must configure the router with OSPF for IPv4 and IPv6 networks under a single process. The OSPF adjacencies are not established and did not meet the requirement. Which action resolves the issue?

A.

Replace OSPF process 10 on the interface with OSPF process 1, and configure an additional router ID with IPv6 address.

B.

Replace OSPF process 10 on the interface with OSPF process 1, for the VPv6 addressma nd remove process route ID with IPv6 address.

C.

Replace OSPF process 10 on the interface with OSPF process 1, and remove process 10 from the global configuration.

D.

Replace OSPF process 10 on the interface with OSPF process 1 for the IPv4 address, and remove process 10 from the global configuration.

Full Access
Question # 155

Refer to the exhibit.

After a new regional office is set up,not all guests can access the internet via guest Wi

Fi. Clients are getting the correct IP address from guest Wi-Fi VLAN 364. which action resolves the issue ?

A.

Allow 10.66.46.0/23 in the outbound ACL

B.

Allow DNS traffic through the outbound ACL

C.

Allow DNS traffic through the inbound ACL

D.

Allow 10.66.46.0/23 in the inbound ACL

Full Access
Question # 156

Refer to the exhibit. Which action resolves the issue?

A.

Establish connectivity between the NTP server and the switch.

B.

Configure the local time on Cisco DNA Center

C.

Configure the local time on the SW1 device

D.

Establish connectivity between the NTP server and Cisco DNA Center.

Full Access
Question # 157

Refer to the exhibit.

An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?

A.

Replace OSPF process 10 on the interfaces with OSPF process 1 and configure an additional router IO with IPv6 address

B.

Replace OSPF process 10 on the interfaces with OSPF process 1. and remove process 10 from the global configuration

C.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv6 address and remove process 10 from the global configuration

D.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv4 address and remove process 10 from the global configuration

Full Access
Question # 158

Refer to the exhibit.

The forwarding entries how that the next hop for prefixes from the 172.16.0.0/16 network is set to 10.2.2.2 instead of 10.1.1.1. Which action resolves the issue?

A.

Add set ip next hop 10.1.1.1 in route-map RED permit 20.

B.

Add the continue statement in route-map RED permit 10 instead of continue 20.

C.

Remove match ip address prefix-list 1 from route-map RED permit 10.

D.

Remove the continue 20 statement from route-map RED permit 10

Full Access
Question # 159

Refer to the exhibit.

An engineer must filter incoming EIGRP updates to allow only a set of specific prefixes. The distribute list is tested, and it filters out all routes except network 10.10.10.0/24. How should the engineer temporarily allow all prefixes to be learned by the routers again without adjusting the existing access list?

A.

A permit 20 statement should be added before completing the ACL with the required prefixes, and then the permit 20 statement can be removed.

B.

A permit any statement should be added before completing the ACL with the required prefixes and then the permit any statement can be removed.

C.

A continue statement should be added within the permit 10 statement before completing the ACL with the required prefixes, and then the continue statement can be removed.

D.

An extended access list must be used instead of a standard access list to accomplish the task

Full Access
Question # 160

Refer to the exhibit A company builds WAN infrastructure between the head office and POPs using DMVPN hub-and-spoke topology to provide end-to-end communication All POPs must maintain point-to-point connectivity with the head office Which configuration meets the requirement at routers R12 and R13?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 161

Refer to the exhibit An engineer must ensure that R3 sees only type 1 and 2 LSAs in area 1. Which command must the engineer apply on R2?

A.

Area 1 stub nssa

B.

Area 1nssa no-summary

C.

Area a stub no-summary

D.

Area 1 stub

Full Access
Question # 162

Refer to the exhibit.

R1 is configured with uRPF, and ping to R1 is failing from a source present in the R1 routing table via the GigatxtEthernet 0/0 interface. Which action resolves the issue?

A.

Remove the access list from the interface GigabrtEthernet 0/0

B.

Modify the uRPF mode from strict to loose

C.

Enable Cisco Express Forwarding to ensure that uRPF is functioning correctly

D.

Add a floating static route to the source on R1 to the GigabitEthernet 0/1 interface

Full Access
Question # 163

Refer to the exhibit An engineer configured NetFlow but cannot receive the flows from R1 Which two configurations resolve the issue? (Choose two )

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 164

Refer to the exhibit.

An engineer applies a prefix-list filter that filters most of the network 10 prefixes instead of allowing them. Which action resolves the issue?

A.

Modify the ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 9 command.

B.

Modify the command Modify the Ip prefix-list ElGRP seq 10 permit 10.0.0.0/8 le 32 command.

C.

Modify the Ip prefix-list ElGRP seq 20 permit 0.0.0.0/0 le 32 command.

D.

Modify the ip prefix-list ElGRP seq 20 permit 10.0.0.0/8 ge 9 command

Full Access
Question # 165

What is LDP label binding?

A.

neighboring router with label

B.

source prefix with label

C.

destination prefix with label

D.

two routers with label distribution session

Full Access
Question # 166

R1 and R2 are configured as eBGP neighbor , R1 is in AS100 and R2 is in AS200. R2 is advertising these networks to R1:

The network administrator on R1 must improve convergence by blocking all subnets of 172-16.0.0/16 major network with a mask lower than 23 from coming in, Which set of configurations accomplishes the task on R1?

A.

ip prefix-list PL-1 deny 172.16.0.0/16 le 23

ip prefix-list PL-1 permit 0.0.0.0/0 le 32

!

router bgp 100

neighbor 192.168.100.2 remote-as 200

neighbor 192.168.100.2 prefix-list PL-1 in

B.

ip prefix-list PL-1 deny 172.16.0.0/16 ge 23

ip prefix-list PL-1 permit 0.0.0.0/0 le 32

!

router bgp 100

neighbor 192.168.100.2 remote-as 200

neighbor 192.168.100.2 prefix-list PL-1 in

C.

access-list 1 deny 172.16.0.0 0.0.254.255

access-list 1 permit any

!

router bgp 100

neighbor 192.168.100.2 remote-as 200

neighbor 192.168.100.2 distribute-list 1 in

D.

ip prefix-list PL-1 deny 172.16.0.0/16

ip prefix-list PL-1 permit 0.0.0.0/0

!

router bgp 100

neighbor 192.168.100.2 remote-as 200

neighbor 192.168.100.2 prefix-list PL-1 in

Full Access
Question # 167

Refer to the exhibit.

Routers R1, R2, R3, and R4 use EIGRP However, traffic always prefers R1 to R5 backup links in nonfailure scenarios. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 168

Which router attaches the VPN label to incoming packets from CE routing?

A.

CE router

B.

core router

C.

P router

D.

PE router

Full Access
Question # 169

Drag and drop the IPv6 first hop security device roles from the left onto the corresponding descriptions on the right.

Full Access
Question # 170

How does LDP operate in an MPLS network?

A.

When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change.

B.

When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity.

C.

Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages

D.

LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP.

Full Access
Question # 171

Refer to the exhibit. Users on a call center report that they cannot browse the internet on Saturdays during the afternoon. Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 172

Exhibit.

Refer to the exhibit. A network is configured for EIGRP equal-cost load balancing, but the traffic destined to the servers is not load balanced. Link metrics from router R2 to R3 and R4 are the same. Which delay value must be configured to resolve the issue?

A.

208 oon R3 E0/0

B.

120 on R4 E0/1

C.

120/on R3 E0/1

D.

2200 on R4 E0/1

Full Access