Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibit. ISP A provides MPLS L3VPN service to customer A with BGP as the external routing protocol. Customer A has just opened a new branch office in London and requested the service provider to implement lossless service between its two offices. The LDP is enabled over the MPLS backbone and label exchange is working normally. Which action must the ISP engineering team take to enable the service?

A.

Configure LDP and redistribute the route from EIGRP.

B.

Configure BGP address family VPNv4.

C.

Configure IGP and redistribute the route from BGP.

D.

Configure IGP LDP synchronization

Full Access
Question # 5

Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Full Access
Question # 6

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

R1 and R2 are having issues forming an eBGP neighbor relationship. Troubleshoot and resolve the issue to achieve these goals:

1. Configure R1 and R2 to form a BGP neighborship using their Loopback interfaces.

2. Form the neighbor relationship using a BGP multihop mechanism. Use minimal values to solve the issue.

Full Access
Question # 7

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Full Access
Question # 8

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Full Access
Question # 9

Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)

A.

ip verify unicast source reachable-via tx under FA0/0

B.

ip verify unicast source reachable-via under FA0/1

C.

ip verify unicast source reachable-via any under FA0/1

D.

ip verify unicast source reachable-via both under FA0/0

E.

ip verify unicast source reachable-via any under FA0/0

Full Access
Question # 10

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Full Access
Question # 11

Refer to the exhibit.

While troubleshooting the network, a network operator with an employee id: 3812:12:993 is trying to ping XR1. Which result should the operator expect when trying to ping to an XR1 local address?

A.

ICMP traffic works at a policed rate of 19 bytes per second every 100 ms

B.

All ICMP traffic responds successfully.

C.

All ICMP traffic is dropped.

D.

ICMP traffic works at a policed rate of 19 packets every 100 ms.

Full Access
Question # 12

Refer to the exhibit.

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Full Access
Question # 13

What is the function of the FEC field within the OTN signal structure?

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

C.

It allows receivers to correct errors upon data arrival.

D.

It allows deep inspection of data payload fields.

Full Access
Question # 14

A network engineer is implementing BFD configuration changes on a customer's equipment. How is the bfd interval configuration on the interface disconnected?

A.

The status of the interface changes.

B.

The IPv4 or IPv6 address configuration on the interface changes.

C.

It is automatically disconnected when the BFD-configured subinterface is removed.

D.

It is automatically disconnected when the BFD main interface is removed.

Full Access
Question # 15

Refer to the exhibit:

What is significant about the number 2 in the configuration?

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Full Access
Question # 16

Refer to the exhibit. Router R1 is configured with class map CE with match Ip precedence critical to align with customer contract SLAs. The customer is sending all traffic from CE1 toward the FTP server with IP precedence 5 A network engineer must allow 10% of interface capacity on router R3 Which two actions must the engineer take to accomplish the task? (Choose two )

A.

lmptem4Dt4M$§ map on R1 to match all packets with QoS IP precedence value 100.

B.

Implement a class map on R3 to match all packets with QoS IP precedence value 101.

C.

Apply a policy map to R1 to reserve the remaining 10% of interface bandwidth.

D.

Apply a policy map to R3 to reserve 10% of interface bandwidth.

E.

Implement a class map on R3 to match all packets with QoS IP precedence.

Full Access
Question # 17

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

A.

The traffic uses the default MDT transmit the data Only if it is a (S, G) multicast route entry.

B.

A data MDT is created if is a Multicast route entries

C.

A data and default MDT are created to flood the multicast stream of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmit through the core for multicast route entries.

Full Access
Question # 18

Refer to the exhibit:

It the NetFlow configuration is updated to version 9, which additional piece of information can be reported"?

A.

IPv6 flow information

B.

flow sequence numbers

C.

BGP AS information

D.

IPv4 flow information

Full Access
Question # 19

Refer to the exhibit.

A network operator working for a telecommunication company with an employee ID: 4350:47:853 must implement an IGP solution based on these requirements:

• Subnet 10.50.10.0 traffic must exit through the R1 router to connect with the Syslog server.

• Subnet 10.50.20.0 traffic must exit through the R2 router to connect with the NTP server.

• In case of link failure between R2 and R4, traffic must be routed via R1 and R3.

Which two configurations must be implemented on R5 to meet these requirements? (Choose two.)

A.

Apply a route policy to redistribute 10.50.0.0 prefixes in OSPF to ISIS and ISIS to OSPF.

B.

Apply a route policy to redistribute 10.50.20.0 from ISIS-L2 to OSPF Area 0 at a higher cost.

C.

Enable a route policy to advertise 10.50.20.0 in ISIS-L2 at a higher cost.

D.

Apply a route policy to redistribute 10.50.10.0 from OSPF Area 0 to ISIS-L2 at a lower cost.

E.

Enable a route policy to advertise 10.50.10.0 In OSPF Area 0 at a low cost.

Full Access
Question # 20

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Full Access
Question # 21

Which additional configuration is required for NetFlow to provide traceback information?

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Full Access
Question # 22

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Full Access
Question # 23

A network engineer has configured TE tunnels in the MPLS provider core. Which two steps ensure traffic traverse? (Choose two.)

A.

Static routes is the only option for directing traffic into a tunnel.

B.

ECMP between tunnels allows RSVP to function correctly.

C.

Forwarding adjacency features allows a tunnel to be Installed in the IGP table as a link.

D.

The IGP metric of a tunnel is configured to prefer a certain path

E.

A tunnel weight is configured in SPF database the same way as a native link.

Full Access
Question # 24

Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Full Access
Question # 25

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Full Access
Question # 26

A network engineer Is implementing a QoS policy for outbound management traffic classification and marking on a CPE device with these requirements:

• Management protocols must be marked with DSCP AF class 2 w4h low drop probability.

• Monitoring protocols must be marked with DSCP AF class 1 with low drop probability.

• All remaining traffic must be marked with a DSCP value of 0.

Which configuration must the engineer implement to satisfy the requirements?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Refer to the exhibit:

Which effect of this configuration is true?

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Full Access
Question # 28

Refer to the exhibit. An engineer must Implement a traceroute operation to verity the R1 point-to-multipoint LSP connections. The traceroute operation must return all labels and hop-by-hop IP addresses for destinations 10.20.0.1. 10.30.0.1, and 10.40.0.1. and the maximum number of hops is 4. Which command must be executed to meet the requirements?

A.

traceroute mpls traffic-eng tunnel-mte 10 ttl 4

B.

traceroute mpls traffic-eng tunnel-mte 10 responder-id 10.40.0.1

C.

traceroute mpls ipv4 10.30.0.1/32 fee-type generic

D.

traceroute mpls ipv4 10.20.0.1/32 ttl 4

Full Access
Question # 29

The network-engineering team of a service provider is integrating several recently acquired networks into a more scalable common Unified MPLS architecture. The new network architecture will support end-to-end VPNv4 and VPNv6 services with these requirements:

• The IGP of the core layer is IS-IS In Area 0.

• The IGP of the aggregation layers is OSPF in Area 0.

• The LDP protocol Is used to distribute label bindings within each IGP domain.

Which task must the network engineer perform when implementing this new architecture?

A.

Configure BGP-LU between ABR routers of each IGP domain to carry MPLS label information in NLRI.

B.

Configure a BGP session between the ABR routers of each IGP domain to exchange VPNv4 or VPNv6 prefixes

C.

Configure the ABR in each IGP domain to preserve next-hop information on all VPNv4 and VPNv6 prefixes advertised by the PE.

D.

Configure mutual redistribution of each IGP domain's loopback prefix to provide end-to-end LDP LSP

Full Access
Question # 30

Refer to the exhibit:

P3 and PE4 are at the edge of the service provider core and serve as ABR routers Aggregation areas are on either side of the core.

Which statement about the architecture is true?

A.

If each area is running its own IGP. the ABR routers must redistribute the IGP routing table into BGP

B.

To support seamless MPLS. TDP must be used as the label protocol

C.

If each area is running its own IGP. BGP must provide an end-to-end MPLS LSP

D.

To support seamless MPLS, the BGP route reflector feature must be disabled

Full Access
Question # 31

How is RSVP used with MPLS traffic engineering tunnels?

A.

It assigns a tag to a packet as it travels through the tunnel.

B.

It removes and reassigns an MPLS label when the packet enters the tunnel.

C.

It reduces the CPU burden when a packet travels through the tunnel.

D.

It reserves bandwidth along the path of the tunnel.

Full Access
Question # 32

What Is one of the differences between Ansible and Chef?

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Full Access
Question # 33

You are testing the capabilities of MPLS OAM ping.

Which statement is true?

A.

MPLS OAM ping works solely with Cisco MPLS TE

B.

MPLS OAM ping works solely with P2P LSPs

C.

An LSP breakage results in the ingress MPLS router never receiving any reply

D.

An LSP is not required for the reply to reach the ingress MPLS router

Full Access
Question # 34

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Full Access
Question # 35

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

A.

Text, letter Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text Description automatically generated

D.

Text, letter Description automatically generated

Full Access
Question # 36

Drag and drop the multicast concepts from the left onto the correct descriptions on the right.

Full Access
Question # 37

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Full Access
Question # 39

A network architect décides to expand the scope of the multicast deployment within the company network the network is already using PlM-SM with a static RP that supports a high-bandwidth. video-based training application that s heavily used by the employees, but excessive bandwidth usage is a concern How must the engineer update the network to provide a more efficient multicast implementation'?

A.

Configure IGMP to manage the multicast hosts on each LAN

B.

implement BSR to support dynamic RP notification.

C.

Deploy ICMP to Improve multicast reachability across the network using static RP.

D.

Implement STP to improve switching performance for multicast data.

Full Access
Question # 40

Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Full Access
Question # 42

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

Drag and drop the functions from the left onto the Path Computation Element Protocol roles on the right.

Full Access
Question # 44

Refer to the exhibit.

A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network Which action causes the solution to fail?

A.

A loopback with a /32 IP address has not been used

B.

OSPF does not work with L2VPN services

C.

The xconnect statement has not been defined

D.

The routing protocol network types are not compatible

Full Access
Question # 45

A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

Refer to the exhibit.

An engineer ran this show telemetry command to view subscription SUB11 on RouterX. The engineer then decided that RouterY should provide the same output lor sensor group SGroup13 as RouterX. The engineer cannot access RouterX to copy its configuration No access lists on the router block user access Which configuration must the engineer apply on RouterY to provide the same output from the show telemetry command?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 47

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

A.

It support symmetric multiprocessing

B.

It allows all processes to use the same pool of memory.

C.

It runs on a 32-bit operating system.

D.

It is built on a GNX Neutrino Microkernel.

Full Access
Question # 48

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Full Access
Question # 49

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Full Access
Question # 50

Refer to the exhibit.

The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMER-ABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2 has connectivity to the Internet?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

Refer to the exhibit:

Export statistics received do not include the BGP next hop.

Which statement about the NetFlow export statistics is true?

A.

Only the origin AS of the source router will be included in the export statistics.

B.

Loopback 0 must be participating in BGP for it to be included in the export statistics.

C.

The origin AS and the peer-as will be included in the export statistics.

D.

To include the BGP next hop in the export statistics, those keywords must be included with the version 9 entry.

Full Access
Question # 52

An engineer must implement QoS to prioritize traffic that requires better service throughout the network. The engineer started by configuring a class map to identify the high-priority traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

A.

Attach the class map to a policy map that sets the minimum bandwidth allocated to the classified traffic and designates the action to be taken on the traffic.

B.

Attach the class map to a policy map that designates the action to be taken on the classified traffic and then attach the policy map to an interface using a service policy.

C.

Attach the class map to a policy map within a VRF to segregate the high-priority traffic and then attach the policy map to an interface in another VRF.

D.

Create a route map to manipulate the routes that are entered into the routing table and then attach the route map to an interface using a service policy.

Full Access
Question # 53

Which two tasks must an engineer perform when implementing LDP NSF on the network? (Choose two.)

A.

Disable Cisco Express Forwarding.

B.

Enable NSF for EIGRP.

C.

Enable NSF for the link-state routing protocol that is in use on the network.

D.

Implement direct connections for LDP peers.

E.

Enable NSF for BGP.

Full Access
Question # 54

Drag and drop the LDP features from the left onto their usages on the right.

Full Access
Question # 55

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

Refer to the exhibit.

What does this REST API script configure?

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Full Access
Question # 57

An engineer is trying to implement BGP in a multihomed architecture. What must the engineer configure to influence inbound path selection?

A.

A route map with WEIGHT attribute to control the inbound traffic.

B.

An offset list to set the metric for routes received from neighboring autonomous systems.

C.

An access list to identify traffic and enable it on both of the provider-facing interfaces.

D.

A route map with AS_PATH attribute to control the inbound traffic.

Full Access
Question # 58

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Full Access
Question # 59

Refer to the exhibit.

What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?

A.

authentication is added to the configuration

B.

correct wildcard mask is used on Router 2

C.

OSPF process IDs match

D.

hello intervals match

Full Access
Question # 60

A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred exit

points for the customer AS?

A.

highest local preference outbound

B.

lowest local preference inbound

C.

highest local preference inbound

D.

lowest multi-exit discriminator

Full Access
Question # 61

Refer to the exhibit. Tier 1 ISP A purchased several Tier 2 ISPs to increase their customer base and provide more regional coverage. ISP A plans to implement MPLS services in the access layer, with scalability up to 100.000 devices In one packet network and service recovery up to 50 ms. The network architect decided to use different independent IGP and LDP domains and interconnect LSPs that are based on RFC 3107. Which two actions must the network engineer perform to meet the requirements? (Choose two.)

A.

Implement BGP PIC core functionality on routers R2 and R3.

B.

Configure three OSPF areas, with Area 0 In the core domain, and Areas 2 and 3 in the aggregation domain.

C.

Implement BGP connectivity between routers R1 and R4 with VPNv4 address family enabled.

D.

Implement BGP inline RR functionality with next-hop-self capabilities on routers R2 and R3.

E.

Implement the IS-IS routing protocol on the access domain.

Full Access
Question # 62

Refer to the exhibit.

What does the number 2 mean in the configuration?

A.

It dictates the number of sessions that will be open with the SNMP manager

B.

It represents the version of SNMP running.

C.

It indicates two SNMP managers are able to read and write with the agent using community string ciscotest.

D.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent.

Full Access
Question # 63

Which statement describes the advantage of a Multi-Layer control plane?

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Full Access
Question # 64

Exhibit:

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Full Access
Question # 65

Refer to the exhibit. Over the last few months. ISP A has doubled Its user base. The IT Director asked the engineering team to monitor memory consumption and buffer statistics on all P and PE devices In the MPLS core. Most devices have CPU usage of 70% or more, so the solution must be targeted and secure. Which two commands must the engineering team implement on P and PE devices to meet these requirements? (Choose two.)

A.

snmp-server host 192.168.101.1 version 3 auth community1 memory

B.

snmp-server enable traps memory bufferpeak

C.

snmp-server host 192.168.101.1 version 2c community1 memory

D.

snmp-server host 192.168.101.1 version 1 community1 auth memory

E.

snmp-server enable snmp-traps community1 bufferpeak

Full Access
Question # 66

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

Refer to the exhibit.

An engineer applied a gRPC dial-in configuration on customer's router to provide connection multiplexing and two-way streaming. What does this configuration accomplish in a gRPC?

A.

It is the encoding requested by the gRPC server.

B.

IT is the encoding that is used for dial-in and dial-out.

C.

It is used for encoding with the default protocol buffers

D.

It is the encoding requested by the gRPC client.

Full Access
Question # 68

Refer to the exhibit.

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 69

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Full Access
Question # 70

Refer to the exhibit. Routers P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering. P4 is the primary Internet gateway router, and P5 is its backup. P5 is already advertising a default route into the OSPF domain. Which configuration must be applied to P4 so that it advertises a default route into OSPF and becomes the primary Internet gateway for the network?

A.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 2

end

B.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 1

end

C.

configure terminal

router ospfv3 100

address-family ipv4 unicast

redistribute bgp 65500 metric 40 metric-type 1

end

D.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate always metric 40 metric-type 1

end

Full Access
Question # 71

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Full Access
Question # 72

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Full Access
Question # 73

What are two features of 6RD IPv6 transition mechanism? (Choose two.)

A.

It inserts IPv4 bits into an IPv6 delegated prefix.

B.

It uses a native IPv6-routed network between CE routers and the BR router.

C.

It allows dynamic 1:N translation of IPv6 address.

D.

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

E.

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.

Full Access
Question # 74

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Full Access
Question # 75

Refer to the exhibit:

Which statement describes this configuration?

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Full Access
Question # 76

Refer to the exhibit:

An engineer is preparing to implement link aggregation configuration.

Which statement al about this configuration is true?

A.

The switch port actively sends packets to negotiate an EtherChannel using PAgP

B.

The switch port accepts LACP and PAgP packets from a connected peer and negotiate an EtherChannel using the common EtherChannel mode.

C.

The switch port passively negotiates an EtherChannel if it receives PAgP packets from a connected peer

D.

The switch port negotiates an EtherChannel if it receives LACP packets from a connected peer

Full Access
Question # 77

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure. Which two actions must the engineering team perform to meet the requirements? (Choose two.)

A.

Create the hosting-as-a-service VRF on router R4 and configure It with the route target both 65123:88 command.

B.

Configure the fast-reroute per-prefix command for the IS-IS protocol in the MPLS network and enable the BGP route-reflector feature on R2.

C.

Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.

D.

Configure the mpls Idp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.

E.

Configure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.

Full Access
Question # 79

How does SR policy operate in Segment Routing Traffic Engineering?

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Full Access
Question # 80

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Full Access
Question # 81

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Full Access
Question # 82

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Full Access
Question # 83

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Full Access
Question # 84

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

A.

MPLS

B.

LDP neighbor

C.

global

D.

interface

Full Access
Question # 85

Drag and drop the BGP Best Path Algorithm rules from the left into the corresponding order of importance on the right.

Full Access
Question # 86

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Full Access
Question # 87

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Full Access
Question # 88

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

If you apply this code to BGP filters, which effect does the code have on your router?

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Full Access
Question # 89

Which configuration modifies Local Packet Transport Services hardware policies?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 90

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Full Access
Question # 91

Why is the keyword none needed when implementing management plane security using TACACS?

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Full Access
Question # 92

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Full Access
Question # 93

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Full Access
Question # 94

An engineer working for a telecommunication company with an employee ID: 4460:35:466 must configure an OSPF router in a multivendor network so that it performs NSF in the event of a route processor switchover. Which configuration must the engineer apply?

A.

router ospf 1 nsf Cisco

B.

router ospf 1 nsf ietf

C.

router ospf 1 nsf ietf helper

D.

router ospf 1 nsf Cisco helper

Full Access
Question # 95

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all prefixes that it receives from origin AS 200 before installing them in the BGP route table. Which configuration meets the requirement?

A.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

RB(config-router-af)# bgp bestpath origin-as use validity

B.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation signal ibgp

RB(config-bgp)# bgp bestpath origin-as allow invalid

C.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation time off

D.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

PB(config-router-af)# bgp origin-as validation enable

Full Access
Question # 96

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Full Access
Question # 97

Which characteristic describes prefix segment identifier?

A.

It contains the interface address of the device per each link.

B.

It Is globally unique.

C.

It is locally unique.

D.

It contains a router to a neighbor.

Full Access
Question # 98

Which two routing protocols support Cisco MPLS TE tunnels? (Choose two.)

A.

IS-IS

B.

RIP

C.

BGP

D.

OSPF

E.

EIGRP

Full Access
Question # 99

What is the primary role of a BR router in a 6rd environment?

A.

It provides connectivity between end devices and the IPv4 network.

B.

It embeds the IPv4 address in the 2002::/16 prefix.

C.

It connects the CE routers with the IPv6 network.

D.

It provides IPv4-in-IPv6 encapsulation

Full Access
Question # 100

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Full Access
Question # 101

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Full Access
Question # 102

An engineer working for a private service provider with employee id: 3994 37 650 is configuring a Cisco device to redistribute OSPF into BGP. Which task enables the device to filter routes?

A.

Configure a distribute list and associate it to the BGP peer interface

B.

Configure a prefix list and associate it to the BGP peer interface

C.

Configure a route map and reference it with the redistribute command

D.

Configure an access list and reference it with the redistribute command

Full Access
Question # 103

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Full Access
Question # 104

Drag and drop the message types from the left onto the target field of the message originator on the right.

Full Access
Question # 105

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

A.

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Full Access
Question # 106

Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?

A.

Configure redistribution using route maps to filter the routes that are shared

B.

Configure redistribution using an offset list to filter the routes that are shared.

C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

Full Access
Question # 107

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Full Access
Question # 108

Refer to the exhibit.

Router 4 is added to the network and must be in the same area as router 1. Which NET should the engineer assign?

A.

49.0001.0000.0000.0004.00

B.

49.0111.0000.0000.0001.00

C.

49.0011.0000.0000.0003.00

D.

49.0011.0000.0000.0002.00

Full Access
Question # 109

Refer to the exhibit. A host connected to R3 must connect with a server on R1 that provides critical, time-sensitive data. Traffic between the host and server must always be given bandwidth to traverse the links when they are congested, with other traffic being dropped. How must the network engineer implement a QoS strategy with classification to ensure that the traffic is given the appropriate bandwidth?

A.

Implement FIFO to guarantee that the server traffic is sent first while other traffic is queued.

B.

Implement policing to rate-limit noncritical traffic that exceeds designated thresholds.

C.

Implement traffic shaping to delay noncritical traffic when the link is congested.

D.

Implement strict priority to guarantee bandwidth for the server traffic.

Full Access
Question # 110

Refer to the exhibit.

A network engineer is implementing a standard customer route-policy on ASBR1 with these requirements:

• It must accept only customer-assigned prefixes

• It must preserve customer advertised BGP communities

• It must set the local-preference to 110 for all prefixes

• It must attach the ORIGINATION-PE and LOCAL-CITY communities to all accepted prefixes.

Which route policy must the engineer implement on ASBR1 to satisfy the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 111

According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?

A.

TE default metric

B.

maximum reservable link bandwidth

C.

administrative group (color)

D.

IPv4 neighbor address

Full Access
Question # 112

Refer to the exhbit. ISP A has a BGP peering with ISP C with the maximum-prefix 150 configuration on R1. After a recent security breach on the ISP A network, a network engineer has been asked to enable a lightweight security mechanism to protect the R1 CPU and BGP membership from spoofing attacks. Which solution must ISP A implement?

A.

Configure bgp maxas-limit 1 in the IPv4 address family urateUhe global BGP configuration.

B.

Configure neighbor 10.163.83.54 enable-connected-check under the BGP IPv4 address family.

C.

Configure neighbor 10.163.83.55 password Cisco under the global BGP IPv4 address family.

D.

Configure neighbor 10.163.83.55 ttl-stcurity hops 2 under the global BGP configuration.

Full Access
Question # 113

Refer to the exhibit.

The CE router is peering with both PE routers and advertising a public prefix to the internet. Routing to and from this prefix will be asymmetric under certain network conditions, but packets must not be discarded. Which configuration must an engineer apply to the two PE routers so that they validate reverse packet forwarding for packets entering their Gi2 interfaces and drop traffic from the RFC1918 space?

A.

ip verify unicast source reachable-via rx allow-default

B.

interface GigabitEthernet 2

ip verify unicast source reachable-via rx

C.

ip verify unicast source reachable-via any allow-default

interface GigabitEthernet 2

D.

ip verify unicast source reachable-via any

Full Access
Question # 114

What are two characteristics of MPLS TE turrets? (Choose two)

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Full Access
Question # 115

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Full Access
Question # 116

Which statement about Network Services Orchestrator (NSO) is true?

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Full Access
Question # 117

Refer to the exhibit.

Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?

A.

show ip traffic

B.

showip interface

C.

show cef interface

D.

show ip interface brief

Full Access
Question # 118

Which type of attack is an application attack?

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Full Access
Question # 119

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Full Access
Question # 120

Refer to the exhibit.

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

A.

ip ospf network broadcast

B.

ip ospf network point-to-point

C.

ip ospf network non-broadcast

D.

ip ospf network point-to-multipoint

Full Access
Question # 121

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Full Access
Question # 122

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnel’s router?

A.

error

B.

reservation

C.

path

D.

tear

Full Access
Question # 123

Refer to the exhibit. What is the purpose of this JSON script?

A.

It changes the existing password.

B.

It updates a user authentication record.

C.

It deletes a user’s authentication record.

D.

It confirms a user’s login credentials.

Full Access
Question # 124

Which Cisco software OS uses monolithic architecture?

A.

NX-OS

B.

IOS XE

C.

IOS XR

D.

IOS

Full Access
Question # 125

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Full Access
Question # 126

Refer to the exhibit. Router P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering P4 is the primary Internet gateway router, and P5 is its Backup. P5 is already advertising a default route into OSPF domain. Which configuration must Be applied to P4 so that advertises a default route Into OSPF and Becomes me primary internet gateway for the network?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 127

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

A.

Enable communication over TCP port 646 for T-LDP hello messages.

B.

Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers.

C.

Enable LDP session protection on either one of the routers, which allows them to autonegotiate.

D.

Set the LDP session protection timer on each router to the same value.

Full Access
Question # 128

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Full Access
Question # 129

Refer to the exhibit:

If router A is the RP, which PIM mode can you configure so that devices will send multicast traffic toward the RP?

A.

PIM-SM

B.

PI MM-DM

C.

BIDIR-PIM

D.

PIM-SSM

Full Access
Question # 130

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Full Access
Question # 131

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Full Access
Question # 132

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Full Access
Question # 133

Which statement about segment routing prefix segments is true?

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Full Access
Question # 134

What is a role of NSO?

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Full Access
Question # 135

Which type of attack is a Protocol attack?

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Full Access