ccieRSv5 1 by CertDude - v2016 11 03
ccieRSv5 1 by CertDude - v2016 11 03
ccieRSv5 1 by CertDude - v2016 11 03
Number: 400-101
Passing Score: 800
Time Limit: 120 min
File Version: 5.1
By CertDude.
All the answers have been reviewed and corrected based on SPOTO & PL1219.
So thanks to the guys that shared those files.
And most of all, ultra Kudos to all the people that passed their exams and gave feedback <3
UPDATED the 3rd of November 2016 :
Added Q that showed up in exam & corrected some answers thanks to some feedbacks.
Exam A
QUESTION 1
A.
B.
C.
D.
E.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://supportforums.cisco.com/document/122121/ipv6-6to4-tunneling-configuration-example
6to4 Tunneling is one of the IPv6 translation mechanism which encapsulates the IPv6 packets into IPv4
which allows remote IPv6 networks to communicate across the IPv4 infrastructure(core network or
Internet). The main difference between the manual tunnels and automatic 6to4 tunnels is that the tunnel is
not point-to-point but it is point-to-multipoint.
In automatic 6to4 tunnels, the IPv4 infrastructure is treated as a virtual nonbroadcast multiaccess (NBMA)
link routers are not configured as point-to-point. The IPv4 address embedded in the IPv6 address is used
to find the other end of the automatic tunnel.
http://www.cisco.com/c/en/us/support/docs/ip/ip-version-6/25156-ipv6tunnel.html
These are the five methods of tunneling IPv6 traffic:
-Manual IPv6 tunnels
-Automatic IPv4-Compatible tunnels
-GRE
-Automatic 6to4 tunnels
-Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Tunnels
The primary difference in these tunneling techniques is the method in which the tunnel source and
destination are determined.
Note that internal routing protocols such as EIGRP and OSPFv3 cannot be used across 6to4 tunnels
because link-local IPv6 addresses (needed to form router adjacencies) are not supported across 6to4
tunnels. BGP, which supports adjacencies based on global IPv6 addresses, can be used instead.
Also note that despite its NBMA nature, 6to4 tunnels are still tunnels, requiring both an ingress and egress
IPv6 interface; they cannot be used to communicate directly between IPv4 and IPv6 hosts.
QUESTION 4
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/15-mt/nat-15-mt-book/ip6natpt.html
Network Address Translation (NAT)-Port Translation (PT) for Cisco software based on RFC 2766 and RFC
2765 is a migration tool that helps customers transition their IPv4 networks to IPv6 networks.
so, it Could be A: 6to4 tunnel or C: ISATAP Tunnel .... but:
https://supportforums.cisco.com/document/128126/ipv6-isatap-configuration-example
Intra-site Automatic Tunneling Addressing Protocol is an automatic tunneling mechanism which builds a
tunnel for carrying IPv6 traffic over IPv4 within an IPv4 network.
Like 6to4 tunnels, ISATAP uses the underlying IPv4 network as an NBMA link layer for IPv6 and
determines the destination on a per packet basis i.e. point-to-multipoint.It allows individual IPv4 or IPv6
dual-stack hosts within a site to communicate with other such hosts on the same virtual link, basically
creating an IPv6 network using the IPv4 infrastructure.
The main difference between automatic 6to4 tunnels and ISATAP tunnels is that the automatic 6to4 is Intersite tunnel that allows IPv6 traffic between different sites where as ISATAP as the name specifies is for
Intra-site which can be used for transporting IPv6 packets within a site, but not between sites.Another
aspect is the address prefix used in sites, 6to4 sites uses addresses from 2002::/16 prefix where as
ISATAP tunneling sites can use any IPv6 unicast address.
QUESTION 5
Which three options describe characteristics of a link state routing protocol? (Choose three)
A.
B.
C.
D.
E.
F.
Explanation/Reference:
QUESTION 6
Which statement is true about Fast Link Pulses in Ethernet?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Links to refer:
http://www.networkpcworld.com/how-autonegotiation-an-works-with-fast-link-pulse-flp/
http://etherealmind.com/ethernet-autonegotiation-works-why-how-standard-should-be-set/
https://supportforums.cisco.com/discussion/10827536/questions-about-flpfast-link-pulse-andautonegotiation
QUESTION 7
which two statements about MPLS VPNs are true? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which two operating modes does VPLS support? (Choose two.)
A.
B.
C.
D.
E.
F.
transport mode
strict mode
port mode
loose mode
VLAN mode
dynamic mode
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which two statements about device access control are true? (Choose two.)
A. The AUX port is displayed as type tty in the output of the show line command.
B. VTY lines are associated with physical interfaces on a network device.
C. MPP restricts device-management access to interfaces that are configured under the control plane host
configuration.
D. The enable password command sets an MD5 one-way encrypted password.
E. The console port supports hardware flow control
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Which BGP feature prevents a router from installing an iBGP learned route in its routing table
until the route is validated within the IGP?
A.
B.
C.
D.
confederation
aggregation
advertise-map
synchronization
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
Which two values comprise the VPN ID for an MPLS VPN? (Choose two.)
A.
B.
C.
D.
E.
an OUI
a VPN index
a route distinguisher
a 16-bit AS number
a 32-bit IP address
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Which two best practices does Cisco recommend to migrate a network from PVST+ to MST? (Choose
two.)
A. Start the migration at the edge nodes and work toward the root bridge.
B. Before starting the transition, configure one of the edge nodes with a lower priority so that it
becomes the root bridge after the transition.
C. Before starting the transition, ensure that at least two nodes act as the root bridge for all
VLANs in the network.
D. Start the migration at the root bridge and work toward the edge nodes.
E. Before starting the transition, configure one of the edge nodes with a higher priority so that it
becomes the root bridge after the transition.
F. Before starting the transition, ensure that one node is the root bridge for all VLANs in the
network.
Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/72844-MST.html
"You need to migrate the core first and work your way down to the access switches.:"
QUESTION 13
In an STP domain, which two statements are true for a nonroot switch, when it receives a configuration
BPDU from the root bridge with the TC bit set? (Choose two.)
A. It sets the MAC table aging time to max_age + forward_delay time.
B. It sets the MAC table aging time to forward_delay time.
C. It recalculates the STP topology upon receiving topology change notification from the root
switch.
D. It receives the topology change BPDU on both forwarding and blocking ports.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/12013-17.html#root
"The Principle of Operation section explains how this is practically implemented. Every bridge is then
notified and reduces the aging time to forward_delay (15 seconds by default) for a certain period of time
(max_age + forward_delay)."
QUESTION 14
Which two configuration options are available for PIM snooping? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
what are two requirements for NSF operation in an MPLS L3 VPN? (choose two)
A.
B.
C.
D.
E.
F.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
For which kind of MPLS deployment is the next-hop-self all keywork used on a BGP neighbor command?
A.
B.
C.
D.
E.
6VPE
MPLS Carrier's Carrier
Inter-AS MPLS VPN Option D
Inter-AS MPLS VPN Option
Unified MPLS
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which statement about the EIGRP RTO is true?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
In which type of EIGRP configuration is EIGRP IPv6 VRF-Lite available?
A.
B.
C.
D.
stub
named mode
classic mode
passive
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which statement about shaped round robin queuing is true?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
A GRE tunnel is down with the error message %TUN-5-RECURDOWN:
Tunnel0 temporarily disabled due to recursive routing error.
Which two options describe possible causes of the error? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Which three statements about IS-IS are true? (Choose three.)
A. IS-IS can be used only in the service provider network.
B. IS-IS can be used to route both IP and CLNP.
C. IS-IS has three different levels of authentication: interface level, process level, and domain
level.
D. IS-IS is an IETF standard.
E. IS-IS has the capability to provide address summarization between areas.
F. IS-IS is a Cisco proprietary routing protocol.
Correct Answer: BDE
Section: (none)
Explanation
Explanation/Reference:
Originally an ISO Standard, IETF re-standardized it in RFC 1142 and then in 7142.
IS-IS has three different levels of authentication, but not those :
https://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to-intermediate-system-isis/13792-isis-authent.html
"Configure
Interface Authentication
Area Authentication
Domain Authentication "
QUESTION 22
Refer to the exhibit. Which two statements about the output are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Refer to the exhibit. Which statement is true?
A.
B.
C.
D.
R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20.
The default route 0.0.0.0/0 is available in the IPv4 routing table.
R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available.
R1 has preferred-path configured for the pseudowire.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Which two statements are true about an EPL? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Ethernet Private Line
Provisioned over next-generation SONET infrastructure
MAN and WAN connectivity for point-to-point high-speed transport
Speeds from 10-Mbps to full-rate Gigabit for local (intraLATA) and national (interLATA) applications as
available
Ideal for Remote Backup and Storage Area Neworking applications
Carrier grade, reliable, high-bandwidth data center connectivity for Business Continuity and Disaster
Recovery solutions
VLAN transparency allows you to control your routings with your equipment
Single-source provider with extensive nationwide presence
CONSIDER THIS IF:
Your business requires a secure, dedicated end-to-end LAN interconnectivity solution.
Ethernet Virtual Private Line (EVPL)
An all-fiber optic network service that connects subscriber locations at native LAN speeds, EVPL uses
point-to-point Ethernet virtual connections (EVCs) to define site-to-site connections.
Can be configured to support multiple EVCs to enable hub and spoke configuration
Supports a wide variety of EVC bandwidth options so you can incrementally scale bandwidth to meet
your growing network requirements
Easy desktop control over bandwidth via the Verizon Enterprise Center portal
EVCs are offered in 1Mbps increments from 1-10Mbps, 10Mbps increments from 10-100Mbps and
100Mbps increments from 100-1000Mbps
Scalability allows you to purchase and provision only what you need then scale bandwidth as you
network requirements grow
Point-to-point EVC offer predictable performance for customer applications
Ideal for voice, video, and real-time data
QUESTION 25
Which two statements are true about RSTP? (Choose two.)
A.
B.
C.
D.
E.
By default, RTSP uses a separate TCN BPDU when interoperating with 802.1D switches.
By default, RTSP does not use a separate TCN BPDU when interoperating with 802.1D switches.
If a designated port receives an inferior BPDU, it immediately triggers a reconfiguration.
By default, RTSP uses the topology change TC flag.
If a port receives a superior BPDU, it immediately replies with its own information, and no
reconfiguration is triggered.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Refer to the exhibit. Which two statements are true regarding prefix 10.1.0.0/24? (Choose two.)
A.
B.
C.
D.
The prefix is in policy, and Cisco PfR rerouted the traffic via 10.4.5.3 Et0/1 because of an OOP event.
Cisco PfR is monitoring the prefix via passive NetFlow mode only.
Cisco PfR is monitoring the prefix via active, fast, or active throughput IP SLA probe mode only.
The prefix is in policy, and Cisco PfR did not reroute the traffic via 10.4.5.3 Et0/1 because the traffic was
previously in policy.
E. Cisco PfR is monitoring the prefix via mode monitor, which provides both NetFlow and IP SLA
measurements.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link-layer
address of the neighbor is known?
A.
B.
C.
D.
neighbor solicitation
neighbor advertisement
router advertisement
router solicitation
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
IPv6 basics
QUESTION 28
Refer to the exhibit. With these configurations for R1 and R2, which statement about PPP authentication is
true?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Refer to the exhibit. Which two statements about this route table are true? (Choose two.)
Explanation/Reference:
QUESTION 30
What are two advantages to using Asynchronous mode instead of Demand mode for BFD? (Choose two.)
A.
B.
C.
D.
E.
Asynchronous mode requires half as many packets as Demand mode for failure detection.
Asynchronous mode can be used in place of the echo function.
Asynchronous mode supports a larger number of BFD sessions.
Asynchronous mode requires one fourth as many packets as Demand mode for failure detection.
Asynchronous mode's round-trip jitter is less than that of Demand mode.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Which multicast protocol uses source trees and RPF?
A.
B.
C.
D.
DVMRP
PIM sparse mode
CBT
mOSPF
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Distance Vector Multicast Routing Protocol (DVMRP)
"DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree
rooted at the source of the multicast packets. Multicast packets are initially flooded down this source tree."
" it advertises sources in DVMRP report messages much as it does on real networks. In addition, the
software caches DVMRP report messages it receives and uses them in its Reverse Path Forwarding (RPF)
calculation."
https://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfdvmrp.html
QUESTION 32
Refer to the exhibit. Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A.
B.
C.
D.
E.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Multicast addresses are quickly detected by the initial bit settings. A multicast address begins with the first 8
bits set to 1 (11111111). The corresponding IPv6 prefix notation is FF00::/8.
Following the initial 8 bits, there are 4 bits (labeled 0RPT) which are flag fields. The high-order flag is
reserved, and must be initialized to 0. If the R bit is set to 1, then the P and T bits must also be set to 1.
This indicates there is an embedded Rendezvous Point (RP) address in the multicast address.
So FF7E --> 7 = 0111 --> R-bit is set
QUESTION 33
Refer to the exhibit. R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach
R2. Which three options are possible reasons for this behavior? (Choose three.)
A.
B.
C.
D.
E.
F.
MPLS
GRE
LISP
IP-in-IP
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Refer to the exhibit. Your network is suffering excessive output drops.
Which two actions can you take to resolve the problem? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which two statements about Cisco Express Forwarding are true? (Choose two.)
A. Cisco Express Forwarding tables contain reachability information and adjacency tables contain
forwarding information.
B. Cisco Express Forwarding tables contain forwarding information and adjacency tables contain
reachability information.
C. Changing MAC header rewrite strings requires cache validation.
D. Adjacency tables and Cisco Express Forwarding tables can be built separately.
E. Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/isw-cef-15-mt-book/iswcef-overview.html
"This separation of the reachability information (in the Cisco Express Forwarding table) and the
MSTP switches can detect boundary ports when they receive RSTP version 2 BPDUs.
MSTP switches can detect boundary ports when they receive RSTP version 1 BPDUs.
RSTP switches can process MSTP version 3 BPDUs.
When all boundary switches are running RSTP, MST sends only version 0 configuration BPDUs.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Which two statements about the command distance bgp 90 60 120 are true? (Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Which three types of traffic are protected when you implement IPsec within an IPv6-in-IPv4 tunnel?
(Choose three.)
A.
B.
C.
D.
E.
F.
QUESTION 40
Which statement about NAT64 is true?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
Which statement about NAT64 is true?
A.
B.
C.
D.
NAT64 provides address family translation and translates IPv4 to IPv6 and IPv6 to IPv4.
NAT64 provides address family translation and can translate only IPv6 to IPv4.
NAT64 should be considered as a permanent solution.
NAT64 requires the use of DNS64.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Which three statements about the differences between Cisco IOS and IOS-XE functionality are true?
(Choose three.)
A.
B.
C.
D.
E.
F.
Only IOS-XE Software can host applications outside of the IOS context.
Only the IOS-XE Services Plane has multiple cores.
Only the IOS-XE Data Plane has multiple cores.
Only the IOS-XE Control Plane has multiple cores.
Only IOS-XE module management integrates with packet processing.
Only IOS-XE configuration and control is integrated with the kernel.
QUESTION 43
Which IP SLA operation type uses IP to measure the round-trip time between a router and a device?
A.
B.
C.
D.
HTTP
ICMP Echo
ICMP Path Jitter
UDP Jitter for VoIP
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
Which three address family types does EIGRP support? (Choose three.)
A.
B.
C.
D.
E.
F.
IPv4 unicast
IPv4 multicast
IPv6 unicast
IPv6 multicast
IPv4 anycast
IPv6 anycast
A.
B.
C.
D.
E.
SIP
HTTP
FTP
SMTP
POP3
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
An NSSA area has two ABRs connected to Area 0. Which statement is true?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which three options are characteristics of a Type 10 LSA? (Choose three.)
A.
B.
C.
D.
E.
F.
Explanation
Explanation/Reference:
QUESTION 49
What is the VLAN ID range of VLANs that are eligible for pruning?
A.
B.
C.
D.
2 through 1001
1 through 1005
1 through 4096
2 through 1005
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
Which two statements about MLD are true? (Choose two.)
A.
B.
C.
D.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Ethernet Private Line
Provisioned over next-generation SONET infrastructure
MAN and WAN connectivity for point-to-point high-speed transport
Speeds from 10-Mbps to full-rate Gigabit for local (intraLATA) and national (interLATA) applications as
available
Ideal for Remote Backup and Storage Area Neworking applications
Carrier grade, reliable, high-bandwidth data center connectivity for Business Continuity and Disaster
Recovery solutions
VLAN transparency allows you to control your routings with your equipment
Single-source provider with extensive nationwide presence
CONSIDER THIS IF:
Your business requires a secure, dedicated end-to-end LAN interconnectivity solution.
Ethernet Virtual Private Line (EVPL)
An all-fiber optic network service that connects subscriber locations at native LAN speeds, EVPL uses
point-to-point Ethernet virtual connections (EVCs) to define site-to-site connections.
Can be configured to support multiple EVCs to enable hub and spoke configuration
Supports a wide variety of EVC bandwidth options so you can incrementally scale bandwidth to meet
your growing network requirements
Easy desktop control over bandwidth via the Verizon Enterprise Center portal
EVCs are offered in 1Mbps increments from 1-10Mbps, 10Mbps increments from 10-100Mbps and
100Mbps increments from 100-1000Mbps
Scalability allows you to purchase and provision only what you need then scale bandwidth as you
network requirements grow
Point-to-point EVC offer predictable performance for customer applications
Ideal for voice, video, and real-time data
QUESTION 52
Which two options are mandatory components of a multiprotocol BGP VPN-IPv4
address? (Choose two.)
A.
B.
C.
D.
E.
F.
a system ID
a route target
a route distinguisher
an MPLS label
an area ID
an IPv4 address
Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
Refer to the exhibit.Which statement about the R1 configuration is true?
A.
B.
C.
D.
E.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Which two statements about port ACLs are true? (Choose two.)
A.
B.
C.
D.
Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch.
Port ACLs support both outbound and inbound traffic filtering.
When it is applied to trunk ports, the port ACL filters only native VLAN traffic.
When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or
non-IP Layer 2 information The port ACL (PACL) feature provides the ability to perform access control on
specific Layer 2 ports.
A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN.
Port ACLs perform access control on all traffic entering the specified Layer 2 port, including voice and data
VLANs that may be configured on the port. Port ACLs are applied only on the ingress traffic.
ReferencE. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/
sy_swcg/port_acls.html
QUESTION 55
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
A.
B.
C.
D.
E.
F.
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which two options are valid IPv6 extension header types ? (Choose two)
A.
B.
C.
D.
E.
Flow label
Encapsulation security Payload
Version
Traffic Class
Mobility
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8054d37d.html
QUESTION 58
Which information does RA guard use to determine if an RA is allowed?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60
Which two statements about RIPng are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
Which two statements about Cisco IOS software and Cisco IOS-XE software are true? (Choose two)
A.
B.
C.
D.
E.
The process IOSd on Cisco IOS-XE software runs all routing protocols.
Cisco IOS-XE software is based on a monolithic architecture.
Cisco IOS software allows processes to use different CPU cores.
Cisco IOS-XE software uses a hardened BSD version as the base OS.
Cisco IOS-XE software utilizes a separate control and forwarding plane.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Which three statements about dot1Q trunking are true? (Choose three)
A.
B.
C.
D.
E.
Correct Answer: DF
Section: (none)
Explanation
Explanation/Reference:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-2mt/sec-ipsec-virttunnl.html
"IKE Security Association
The Internet Key Exchange (IKE) security association (SA) is bound to the VTI. Therefore the same IKE SA
cannot be used for a crypto map.
IPv4 and IPv6 Packets
This feature supports SVTIs that are configured to encapsulate IPv4 packets or IPv6 packets, but IPv4
packets cannot carry IPv6 packets, and IPv6 packets cannot carry IPv4 packets."
QUESTION 64
Which two statements about extended ping data patterns are true?
A.
B.
C.
D.
E.
F.
They can determine whether the wavelength received in the transceiver is correct.
They can test for routing protocol issues.
They can test the link for line code mismatches.
They can test the internal repeater for power issues.
They can test for STS/SDH errors.
They can be used with MPLS to ping an LSP end to end.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
Refer to the exhibit. why is the neighbor relationship between R2and R4 shown as ES-IS ?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
BRKRST-2327 -> Slide n27
QUESTION 66
Which mechanism does get vpn use to preserve ip header information?
A.
B.
C.
D.
GRE
MPLS
IPsec transport mode
IPsec tunnel mode
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Tunnel mode encrypt all the packet, including header, so it preserves it from modifications.
QUESTION 67
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
A.
B.
C.
D.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
A.
B.
C.
D.
E.
F.
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
A.
B.
C.
D.
E.
F.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
A.
B.
C.
D.
E.
F.
A.
B.
C.
D.
E.
F.
ERMS
EPL
ERS
MPLS
EMS
EWS
QUESTION 74
A.
B.
C.
D.
5
90
170
200
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
A.
B.
C.
D.
E.
CLI
script
applet
none
syslog
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
A.
B.
C.
D.
E.
F.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
A.
B.
C.
D.
E.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-packet-marking/10100priorityvsbw.html
The built-in policer can only be provided by the "priority" command :
QUESTION 82
A.
B.
C.
D.
E.
F.
Correct Answer: BDF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83
A.
B.
C.
D.
E.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84
handled ?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
A.
B.
C.
D.
E.
F.
Correct Answer: AF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
A.
B.
C.
D.
E.
F.
Correct Answer: CF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
A.
B.
C.
D.
E.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
A.
B.
C.
D.
E.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92
A.
B.
C.
D.
E.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://en.wikipedia.org/wiki/Spanning_Tree_Protocol
"MSTP includes all of its spanning tree information in a single BPDU format. Not only does this reduce the
number of BPDUs required on a LAN to communicate spanning tree information for each VLAN, but it also
ensures backward compatibility with RSTP (and in effect, classic STP too)."
QUESTION 93
A.
B.
C.
D.
E.
F.
active
asynchronous
passive
established
demand
synchronous
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 94
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
A.
B.
C.
D.
E.
F.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Apportioned dual-tier
QUESTION 96
A.
B.
C.
D.
OSPFv3
OSPF
IS-IS
MP-BGP
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 97
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
A.
B.
C.
D.
E.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 99
A.
B.
C.
D.
E.
F.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
https://tools.ietf.org/html/rfc3315#page-19
QUESTION 100
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 101
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://supportforums.cisco.com/document/71756/redistributing-internal-bgp-routes-ospf
QUESTION 102
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
https://en.wikipedia.org/wiki/Path_MTU_Discovery
"IPv6 routers do not support fragmentation or the Don't Fragment option. For IPv6, Path MTU
Discovery works by initially assuming the path MTU is the same as the MTU on the link layer interface
where the traffic originates. Then, similar to IPv4, any device along the path whose MTU is smaller than the
packet will drop the packet and send back an ICMPv6 Packet Too Big (Type 2) message containing its
MTU, allowing the source host to reduce its Path MTU appropriately. The process is repeated until the MTU
is small enough to traverse the entire path without fragmentation.[3]"
QUESTION 103
A.
B.
C.
D.
E.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
https://tools.ietf.org/html/rfc1433
"A router with an interface to two IP networks via the same link level
interface could observe that the two IP networks share the same link
level network, and could advertise that information to hosts (via
ICMP Redirects) and routers (via dynamic routing protocols)."
QUESTION 104
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Which type of ACL can be applied only to Layer 2 ports ?
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
A.
B.
C.
D.
E.
F.
Correct Answer: AF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
A.
B.
C.
D.
E.
F.
Correct Answer: ACE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 108
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
A.
B.
C.
D.
E.
no logging trap
no logging monitor
no logging buffer
no logging console
no logging count
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/rps.html#wp1036139
"A prerequisite of Auto-RP is that all interfaces must be configured in sparse-dense mode using the ip pim
sparse-dense-mode interface configuration command."
QUESTION 111
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
A.
2002::1/16 prefix
B.
C.
2002::1/16 prefix
D.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850book/nm-snmp-snmpv3.html
QUESTION 115
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
A.
B.
C.
D.
E.
F.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 117
Which statement is true about LLDP?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/en/US/technologies/tk652/tk701/technologies_white_paper0900aecd804cd46d.html
QUESTION 118
The OSPF adjacency between two routers cannot be established. What is the root cause of the problem?
A.
B.
C.
D.
E.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119
Which two statements about AAA authentication are true? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 120
What are two of the commands that you can enter to gracefully shut down OSPF and notify neighbors?
(Choose two)
A.
B.
C.
D.
E.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 121
A packet from network 10.0.1.0/24 destined for network 10.0.2.0/24 arrives at R1 on interface Gi0/0, but the
router drops the packet instead of transmitting it out interface Gi0/1. Which feature that is configured on R1
can cause this problem?
A.
B.
C.
D.
UDLC
split horizon
uRPF
spanning tree
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 122
Which two statements about DMVPN with NHRP are true? (Choose two)
A. NHRP shortens the configuration of the hub router.
B.
C.
D.
E.
NHRP dynamically provides information about the spoke routers to the hub.
NHRP disables multicast
The hub router uses NHRP to initiate the GRE tunnel with spokes.
The spoke routers act as the NHRP servers.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 123
A.
B.
C.
D.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124
Which two statements about VPLS are true? (Choose two)
A.
B.
C.
D.
E.
F.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 125
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126
Which two services are used to transport Layer 2 frames across a packet-switched network? (Choose two.)
A.
B.
C.
D.
Frame Relay
ATM
AToM
L2TPv3
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 127
When is it useful to disable split horizon on an EIGRP interface?
A. Disable it when you want to provide additional backup paths in your network.
B. Disable it when you want to send routes that are learned from another routing protocol to
peer on the same interface
C. Disable it when you need to send updates to peers on the interface on which the updates
were received.
D. It is never advisable to disable split horizon on an EIGRP interface.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 128
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
TL;DR :
The best answer should be :
"It sets the maximum amount of data that a host accepts in an individual datagram"
But it doesn't exist...
~~
https://tools.ietf.org/html/rfc879#section-3
QUESTION 129
Which three statements about automatic 6to4 tunneling are true?(choose three)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/routmap.html
"Filtering Based on Route Tag
Users can assign tags to external routes when they are redistributed to OSPF. Then the user can deny or
permit those routes in the OSPF domain by identifying that tag in the route-map and distribute-list in
commands.
Filtering Based on Route Type
In OSPF, the external routes could be Type 1 or Type 2. Users can create route maps to match either Type
1 or Type 2 and then use the distribute-list in command to filter certain prefixes. Also, route maps can
identify internal routes (interarea and intra-area) and then those routes can be filtered.
Filtering Based on Route Source
When a match is done on the route source, the route source represents the OSPF Router ID of the LSA
originator of the LSA in which the prefix is advertised.
Filtering Based on Interface
When a match is done on the interface, the interface represents the outgoing interface for the route that
OSPF is trying to install in the routing table.
Filtering Based on Next-Hop
When a match is done on the next hop, the next hop represents the next hop for the route that OSPF is
trying to install in the routing table. "
QUESTION 131
Which two statements about asymmetric routing are true? (Choose two)
A.
B.
C.
D.
E.
It can cause packet loss over stateful ICMP and UDP connections.
It can cause packet loss when a stateful firewall is in use.
It can cause TCP connections to close.
It can cause packet loss when NAT is in use.
It is uncommon in large networks.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 132
Which two statements about IS-IS metrics are true?(choose two)
A.
B.
C.
D.
E.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 133
Which two pieces of information are returned by the show ipv6 mld snooping querier command?
(Choose Two
A.
B.
C.
D.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 134
Which three statements about microbursts are true choose three)
A.
B.
C.
D.
E.
F.
They can occur when chunks of data are sent in quick succession
They occur only with UDP traffic
They appear as input errors on an interface counter
D. They appear as ignores and overruns on device buffers
They can be monitored by IOS software
They appear as misses and failures on device buffers
720 minutes
240 minutes
60 minutes
480 minutes
120 minutes
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 136
Which Cisco IOS XE component provides separation between the control plane and the data plane?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 137
If the web server has been configured to listen only to TCP port 8080 for all HTTP requests , which
command
can you enter to how internet users to access the web server on HTTP port 80?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 138
Which three statements about Ansible are true? (Choose three.)
A.
B.
C.
D.
E.
F.
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 140
Which description of Infrastructure as a Service is true?
A.
B.
C.
D.
a cloud service that delivers on-demand resources like networking and storage.
a cloud service that delivers on-demand internet connection between sites
a cloud service that delivers on-demand software services on a subscription
a cloud service that delivers on-demand internet connection between sites
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 141
A.
B.
C.
D.
E.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 142
Refer to exhibit. Which AS paths are matched by this access list?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 143
Which IPv6 first hop security feature blocks traffic sourced form ipv6 address that are outside the prefix
gleaned from router advertised ?
A. IPv6 source guard
B. IPv6 DHCP guard
C. IPv6 RA guard
Refer to the exhibit . Which two statements about the 192.168.23.0/24 prefix are true?(Choose two.)
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 145
Which data modeling language is commonly used by NETCONF?
A.
B.
C.
D.
HTML
XML
YANG
REST
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 146
Enterprise Identifier
LISP ID
Resource Location
Device ID
Routing Locator
Endpoint Identifier
Correct Answer: EF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 148
Which two statements about route summarization are true?(Choose two.)
A. EIGRP can summarize routes at the classful network boundary
B. EIGRP and RIPv2 route summarize are configured with the ip summary-address command under the
route..
C. It can be disabled in RIP,RIPv2 and EIGRP
D. It require a common set of high-order bits for all component routes
E. RIPv2 can summarize-routes beyond the classful network boundary
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 149
Which two options are benefits of moving the application development workload to the cloud?(Choose two.)
A.
B.
C.
D.
E.
The application availability is not affected by the loss of a single virtual machine.
The workload can be moved or replicated easily.
It provides you full control over the software packages and vendor used.
High availability and redundancy is handled by the hypervisor
It provides a more secure environment.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 150
Refer to the exhibit. If you apply this configuration to a device on your network. which class map cannot
match
traffic?
A.
B.
C.
D.
E.
CM-EXAMPLE-3
CM-EXAMPLE-4
CM-EXAMPLE-1
CM-EXAMPLE-5
CM-EXAMPLE-2
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 151
Which statement about passive interfaces is true?
A. The interface with the IS-IS passive interface configuration sends the IP address of that interface in the
link-state protocol data units
B. The interface with the EIGRP passive interface configuration ignores routes after the exchange of hello
packets.
C. The interface with the OSPF passive interface configuration appears as a not-so-stubby network.
D. Passive interface can be configured on the interface for IS-IS.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 152
Refer to the exhibit. How can you configure this network this network so that customers can transparently
extend their networks through the provider?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 153
Refer to the exhibit. All routers are running EIGRP and the network has converged. R3 to R4 are configured
as EIGRP stub.
If the link between R1 and R3 goes down, which statement is true ?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 154
Which option is the common primary use case for tools such as Puppet, Chef, Ansible and Salt?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 155
Which two characteristics of an IoT network are true ? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 156
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 157
Which two statements about IS-IS authentication are true ?(Choose two.)
A.
B.
C.
D.
E.
Level 2 LSPs transmit the password encrypted inside the IS-IS PDU.
Area and domain authentication must be configured together.
Passwords can be configured on a per-interface basis.
If LSP authentication is in use, unauthorized devices can form neighbor adjacencies.
Lever 1 LSPs use the domain password.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to-intermediate-system-isis/13792-isis-authent.html#intfaceauth
"Configure
Interface Authentication
When you configure IS-IS authentication on an interface, you can enable the password for Level 1, Level 2,
or both Level 1/Level 2 routing."
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml#wp39187
"IS-IS authentication is configured independently for adjacency establishment (hello) and for LSP
authentication. The next sections describe both cases. If only LSP authentication is used, an
unauthorized neighbor can still form an adjacency, but LSP packets cannot be exchanged. The ISIS
database will not contain any entries for this neighbor."
QUESTION 158
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book/ip6-isatapxe.html
"Sending of IPv6 router advertisements is disabled by default on tunnel interfaces."
QUESTION 159
Which interior gateway protocol is based on open standards, uses a shortest-path first algorithm , provides
native protocols, and operates at the data link layer?
A. IS-IS
B. EIGRP
C. BGP
D. OSPF
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 160
Which two options are potential impacts of microbursts? (Choose two.)
A.
B.
C.
D.
E.
F.
invalid checksum
tail drops
packet loss
unicast flooding
asymmetric routing
unnecessary broadcast traffic
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 161
Refer to the exhibit. Which two statements about this CoS mapping are true? (Choose two.)
A.
B.
C.
D.
E.
It maps the first queue and first threshold to CoS2 and CoS3 .
It maps the second queue and first threshold to CoS 2.
It maps the second queue and first threshold to CoS 3.
It maps CoS values to the transmit queue threshold.
It maps the second threshold to CoS 2 and CoS 3.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/qos/command/reference/qos_book/qos_s4.html
"To map CoS values to drop thresholds for a queue, use the wrr-queue cos-map command in interface
configuration mode. To return to the default settings, use the no form of this command.
wrr-queue cos-map queue-id threshold-id cos-1 ... cos-n "
QUESTION 162
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163
What is the main difference between GETVPN and traditional IPsec encryption techniques?
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/
deployment_guide_c07_554713.html
"Unlike traditional IPSec encryption solutions, GET VPN uses the concept of group SA"
QUESTION 164
(Choose Two)
A.
B.
C.
D.
E.
Connected
Summary
Static
Redistributed
External
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/eigrpstb.html#wp1035925
"
In the following example, the eigrp stub command is used to configure the router as a stub that advertises
connected and summary routes:
router eigrp 1
network 10.0.0.0
eigrp stub
In the following example, the eigrp stub command is issued with the connected and static keywords to
configure the router as a stub that advertises connected and static routes (sending summary routes will not
be permitted):
router eigrp 1
network 10.0.0.0
eigrp stub connected static
In the following example, the eigrp stub command is issued with the receive-only keyword to configure the
router as a receive-only neighbor (Connected, summary, and static routes will not be sent):
router eigrp 1
network 10.0.0.0 eigrp
eigrp stub receive-only"
QUESTION 165
Refer to the exhibit.
This network is undergoing a migration from PVST+ to MST.
S1 is the MST0 root bridge and S2 is the MST0 secondary root.
Which statement about traffic from S3 is true ?
A. Interface Gi0/0 is blocked on S3 for VLAN40 and VLAN50 unless it is configured for load balancing with
PVST+.
B. Interface Gi0/0 is blocked on S3 for VLAN40 and VLAN50 and load balancing fails until S3 is migrated
to MST.
C. Interface Gi0/1 is blocked on S3 for VLAN40 and VLAN50 and load balancing fails until S3 is migrated
to MST.
D. Vlan traffic automatically load balances between G0/0 and G0/1 on S3 using PVST+
E. PVST+ inherits the load-balancing configuration from MST.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 166
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 167
Refer to the exhibit. Which two effects of this configuration are true? (Choose two.)
A.
B.
C.
D.
E.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 168
Which IS-IS process is responsible for flooding local link information to adjacent routers ?
A.
B.
C.
D.
Decision
Receive
Forward
Update
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 169
Refer to the exhibit . When R2 attempted to copy a file the TFTP server , it received this error message .
Which action can you take to correct the problem?
A.
B.
C.
D.
E.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 170
Refer to the exhibit .If R1 generated this response to the show debug command, which statement about its
debug its debug output is true?
A. As soon as interface Fa0/0 becomes active, it generate debug output because one condition has been
met.
B. When debug output is generated, only the user cisco is permitted to view it.
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://www.pearsonitcertification.com/articles/article.aspx?p=1868079
Route Poisoning
Route poisoning occurs when a RIP device learns that a route to a destination has failed. When this
happens RIP will advertise the failed destination out ALL of its interfaces with a metric of 16 (which is
considered unreachable); this tells all of its neighbors that it no longer has a route to that specific network.
RIP Timers
There are a number of different timers that are used by RIP to maintain operations: update, invalid, flush,
and holddown timers. The update timer is used to identify when RIP sends out scheduled updates; by
default this is 30 seconds, as referred to above. The invalid timer is used by RIP to determine the
validity of a routing entry. By default, if no update has been received about a specific route for 180
seconds, it will be considered invalid and marked with a metric of 16 (see Route Poisoning above).
QUESTION 172
A.
B.
C.
D.
E.
F.
Local
EAPoL
Open
TACACS+
No authentication
RADIUS
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 173
A.
B.
C.
D.
E.
F.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 174
Refer to the exhibit.
Which statement describes how a router with this configuration treats packets if the devices at 172.16.12.5
and 192.168.3.2 are unreachable ?
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 175
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/
deployment_guide_c07_554713.html
There are two types of keys that the GM will receive from the KS: the Key Encryption Key (KEK) and the
Traffic Encryption Key (TEK). The TEK becomes part of the IPSec SA with which the group members within
the same group encrypt the data. KEK is used to secure rekey messages between the key server and
the group members.
QUESTION 176
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
https://mellowd.co.uk/ccie/?p=5487
"When running both IPv4 and IPv6 at the same time, IS-IS can be run in single-topology or multi-topolgy
mode. In single topology, all your IS-IS links need to have both v4 and v6 addresses as the SPF tree is
run indenpently of prefix information. If the SPF tree is calculated to use a link without a v6 address,
IPv6 traffic will be blackholed over that link."
QUESTION 177
A.
B.
C.
D.
E.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 178
A.
B.
C.
D.
E.
F.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
OTP = "Over the Top"
It's based on LISP.
QUESTION 179
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 180
A.
B.
C.
D.
E.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Tricky question.
Technically, LFIB is also in the data plane, but MPLS must be enabled...
If not, FIB & Adjacency Table are located in the data plane (and even in the line cards when dCEF is
enabled).
QUESTION 181
A.
B.
C.
D.
E.
F.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 182
Refer to the exhibit.
R1 and R2 advertise 10.50.1.0/24 to R3 and R4 as shown.
R1 is the primary path.
Which path does traffic take from the data center to the file server?
(assuming the DC is behind R4...)
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
R4 -> R2 -> fileServer
and
fileServer -> R1 -> R3 -> R4
QUESTION 183
A.
B.
C.
D.
E.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 184
A.
B.
C.
D.
512
256
128
64
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Super tricky, it depends on the platform AND the release...
Thanks Cisco....
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_mqc/configuration/xe-3s/qos-mqc-xe-3s-book/qosapply.html
"The number of QoS policy maps and class maps supported varies by platform and release."
https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-policing/22833-qos-faq.html
"Q. How many classes does a Quality of Service (QoS) policy support?
A. In Cisco IOS versions earlier than 12.2 you could define a maximum of only 256 classes, and you could
define up to 256 classes within each policy if the same classes are reused for different policies. If you have
two policies, the total number of classes from both policies should not exceed 256. If a policy includes
Class-Based Weighted Fair Queueing (CBWFQ) (meaning it contains a bandwidth [or priority] statement
within any of the classes), the total number of classes supported is 64.
In Cisco IOS versions 12.2(12),12.2(12)T, and 12.2(12)S, this limitation of 256 global class-maps was
changed, and it is now possible to configure up to 1024 global class-maps and to use 256 class-maps
inside the same policy-map."
QUESTION 185
Which two statements about the max-age time in IS-IS are true ?(Choose two)
A.
B.
C.
D.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml
"The LSP remaining lifetime counts down from 1200 seconds (20 minutes) to 0."
QUESTION 186
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 187
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 188
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 189
Which three options must be configured when deploying OSPFv3 for authentication? (Choose three)
A.
B.
C.
D.
E.
F.
G.
H.
encryption algorithm
authentication key
IPsec transform-set
authentication method
encryption key
crypto map
IPsec peer
Security parameter index
QUESTION 190
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 191
A.
B.
C.
D.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 192
Refer to the exhibit.
When you apply these configurations to R1 and R2, which two effects occur? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
PAP fails but CHAP works as soon as the "username..." are correctly configured.
I simulated it on gns3 and it's ok.
QUESTION 193
A.
B.
C.
D.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/
snooppim.html
"the switch learns which multicast router ports need to receive the multicast traffic within a specific VLAN by
listening to the PIM hello messages, PIM join and prune messages, and bidirectional PIM designated
forwarder-election messages."
QUESTION 194
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 195
Refer to the exhibit
Which action can you take to prevent loops and suboptimal routing on this network?
A.
B.
C.
D.
E.
F.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 196
Which regular expression will match prefixes from the AS 200 that directly connected to our AS?
A.
B.
C.
D.
E.
^$
^200)
_200$
^200_
_200_
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Technically, C and E are correct too BUT they don't match ONLY those prefixes.
QUESTION 197
A.
B.
C.
D.
E.
F.
Correct Answer: BDE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 198
You are implementing new addressing with EIGRP routing and must use secondary addresses, which are
missing from the routing table.
Which action is the most efficient solution to the problem?
A.
B.
C.
D.
Disable split-horizon inside the EIGRP process on the router with the secondary addresses
Use a different routing protocol and redistribute the routes between EIGRP and the new protocol.
Disable split-horizon on the interface with secondary address.
Add additional router interface and move the secondary addresses to the new interface.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 199
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 200
A.
B.
C.
D.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 201
Refer to the exhibit.
Switch A is connected to two MST domains for the first time.
This error is observed on Switch A :
%SPANTREE-2-PVSTIM_FAIL: Blocking designated port Fa0/1: Inconsistent superior PVST BPDU
received on VLAN 10
How can this error be resolved?
A.
B.
C.
D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 202
A.
B.
C.
D.
E.
F.
Correct Answer: DEF
Section: (none)
Explanation
Explanation/Reference:
QUESTION 203
A.
B.
C.
D.
E.
In a PIM-DM network, routers that have no upstream neighbors prune back unwanted traffic
PIM-DM initially floods multicast traffic throughout the network.
PIM-DM supports only shared trees.
PIM-DM uses a pull model to deliver multicast traffic.
PIM-DM cannot be used to build a shared distribution tree.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 204
Which two parameters does the Tunnel Mode Auto Selection feature select automatically? (Choose two)
A.
B.
C.
D.
E.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpnsw-ipsec-xe-3s-book/sec-ipsec-virt-tunnl.html
"The Tunnel Mode Auto Selection feature eases the configuration and spares you about knowing the
responders details. This feature automatically applies the tunneling protocol (GRE or IPsec) and
transport protocol (IPv4 or IPv6) "
QUESTION 205
A. It uses the worst metric vectors of all component routes in the topology table.
B. It uses the best metric vectors of all component routes in the topology table.
C. It uses the best composite metric of any component route in the topology table
D. It uses the worst composite metric of any component route in the topology table
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 206
A.
B.
C.
D.
E.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 207
A. In a BIDIR-PIM network, the RPF interface can be the interface that is used reach the PIM rendezvous
or the interface that is used to reach the source.
B. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the source.
C. There is no RPF interface concept in BIDIR-PIM networks
D. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the PIM
rendezvous point.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 208
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 209
A.
B.
C.
D.
E.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 211
A. When BGP traffic is redistributed into OSPF eBGP and iBGP routes are advertised.
B. When EIGRP routes on a CE are redistributed through a PE into BGP, the Cost Community POI is set
automatically.
C. When EIGRP traffic is redistributed into BGP, a default metric is required.
D. When BGP traffic is redistribute into OSPF the metric is set to 1 unless the metric is defined.
E. iBGP routes automatically redistribute into IGP if the routes are in the routing table.
F. When OSPF traffic is redistributed into BGP internal and external routes are redistributed.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2s/feature/guide/fsbgpcce.html
"This POI is applied automatically to EIGRP routes that are redistributed into BGP."
QUESTION 212
For which two conditions is Cisco Express Forwarding recursion disabled by default when the BGP Prefix
independent Convergence functionality is enabled? (Choose two)
A.
B.
C.
D.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 213
With BGP always-compare-med enabled, which BGP entry is installed in the RIB?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 214
A.
B.
C.
D.
E.
F.
Solicit
Renew
Advertise
DHCP Discover
DHCP Ack
DHCP Offer
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 216
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 217
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 218
A. R2
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 219
A.
B.
C.
D.
E.
F.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 220
A.
B.
C.
D.
E.
F.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 221
A.
B.
C.
D.
EF
None
AF21
CS4
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 222
A.
B.
C.
D.
E.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 223
A.
B.
C.
D.
E.
0
2
8
10
16
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 224
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 225
A.
B.
C.
D.
E.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 226
A.
B.
C.
D.
E. Its application and protocols use addresses 233.0.0.0 233.255.255.255.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfssm.html
QUESTION 227
Which command can you enter to configure a Cisco router running 0.0.0.0 0.0.0.0 172.31.15.1 within the
OSPF process?
A.
B.
C.
D.
default-information originate
redistribute static subnets
redistribute static metric 1 subnets
redistribute static
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 228
Refer to the exhibit. If this network is in the process of being migrated from EIGRP to OSPF, and all routers
are now running both protocols, which action must you perform to complete the migration?
A.
B.
C.
D.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 229
A. BPDU guard can be used to prevent an invalid BPDU from propagating through the network.
B. BPDU guard can be used to prevent an access port from participating in the spanning tree in the service
provider environment.
C. The global configuration command spanning-tree portfast bpduguard default shuts down interface that
are in the PortFast-operational state when a BPDU is received on that port.
D. BPDU guard can be used to protect the root port.
E. The interface configuration command spanning-tree portfast bpduguard enable shuts down only
interface with PortFast enabled when a BPDU is received.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 230
Which trunking configuration between two Cisco switches can cause a security risk?
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 231
Refer to the exhibit. What is the effect on the network when you apply these configuration to R1 and R2?
A.
B.
C.
D.
Asymmetric routing occurs because the bandwidth and delay K value settings are mismatched.
The interface bandwidth and delay settings adjust automatically to match the new metric settings
The neighbor adjacency between R1 and R2 temporarily resets and then reestablishes itself
R1 and R2 fail to form a neighbor adjacency.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 232
Which statement is true about IGMP?
A. Multicast source send IGMP messages to their first-hop router, which then generates a PIM join
message
that is then sent to the RP.
B. Multicast receivers send IGMP message to signal their interest traffic multicast groups.
C. IGMP message are encapsulated in PIM register message and send to the RP.
D. Multicast receivers send IGMP message to their first-hop router, which then forwards the IGMP
message to
the RP.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 233
Which two improvements do SIA-Query and SIA-Reply messages add to EIGRP? (Choose two)
A. Stuck-in-active conditions are solves faster.
B. They prevent a route from going into the stuck-in-active state.
C. They help in the localization of the real failure in the network.
A.
B.
C.
D.
E.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
R1 can't be the DR because the state is not FULL/DROTHER.
QUESTION 235
Refer to the exhibit.
Which three statements about the R1 configuration are true? (Choose three)
A.
B.
C.
D.
E.
F.
The virtual circuit identifier is 4006 and the virtual circuit is down
This circuit is using MPLS VC type 4.
The local label for the circuit is 1611.
The virtual circuit identifier is 1611 and the virtual circuit is down.
The targeted LDP session to the remote peer is up.
The local label for the circuit is 4006.
A.
B.
C.
D.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/116511-technote-tableversion00.html
There is the exact exemple in this page (same IPs)
And at the end :
"If you enter the clear ip bgp out command for a BGP peer, that router resends its BGP prefixes to that
peer. This does not cause a change in the best path on the receiving BGP peer. Hence, there is no change
in the Table Version on that peer.
When you run the debug ip bgp updates on the receiving router, you see:
BGP(0): 10.1.3.4 rcvd UPDATE w/ attr: nexthop 10.1.3.4, origin i, metric 0, merged path 4, AS_PATH
BGP(0): 10.1.3.4 rcvd 10.100.1.1/32...duplicate ignored
"
QUESTION 237
Refer to the exhibit.
The Main 1 and Branch 1 switches are connected directly over over an MPLS pseudowire, and both run
UDLD.
After Router B1 reloads because of a power failure, the pseudowire is restored.
However the Branch 1 switch is unable to reach the Main 1 switch.
Which two actions can you take to restore connectivity and prevent problem from recurring? (Choose two)
A.
B.
C.
D.
Cisco Express Forwarding use a FIB to make IP destination prefix-based switching decisions.
The FIB is used to population the Cisco Express Forwarding table.
There can be only FIB but multiple Cisco Express Forwarding tables on IOS devices.
The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for
processing before they are sent to the FIB.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 239
Which measure does IS-IS use to avoid sending traffic with a wrong MTU configuration?
A. MTU value is communicated in IS-IS Sequence Number PDUs (SNP), and IS-IS adjacency is not
established if an MTU mismatch is detected.
B. IS-IS uses does not protect from MTU mismatch.
C. IS-IS uses padding of hello packets to full MTU.
D. IS-IS uses path MTU discovery as specified in RFC 1063.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/support/docs/ip/integrated-intermediate-system-to-intermediate-system-isis/47201-isis-mtu.html
"Intermediate System-to-Intermediate System (IS-IS) hellos are padded to the full maximum transmission
unit (MTU) size. The benefit of padding IS-IS Hellos (IIHs) to the full MTU is that it allows for early detection
of errors due to transmission problems with large frames or due to mismatched MTUs on adjacent
interfaces."
QUESTION 240
Refer to the exhibit. Which BGP feature is being used?
A. graceful shutdown
B. graceful restart
C. PIC
D. fast session deactivation
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://blog.ipspace.net/2007/11/bgp-fast-session-deactivation.html
QUESTION 241
A.
B.
C.
D.
Users can enter user EXEC mode without a user name using password cisco4
Users in user EXEC mode can enter privileged EXEC mode without a user name or password.
Users can enter privileged EXEC mode using user name cisco1 and password cisco2
Users in user EXEC mode can enter privileged EXEC mode without a user name using password
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
C permit the user that is not logged yet to enter user exec mode.
B permit the user that is already logged in to enter privileged mode.
As we don't know if the user is already logged in, or not, B seems to be the correct answer.
QUESTION 242
Which two statements about the STP dispute function are true? (Choose two)
A.
B.
C.
D.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/
spantree.html
"When a designated port detects a conflict, it keeps its role, but reverts to a discarding (blocking) state
because disrupting connectivity in case of inconsistency is preferable to opening a bridging loop. "
Using the dispute mechanism included in the IEEE 802.1D-2004 RSTP standard, the switch checks the
consistency of the port role and state in the received BPDUs to detect unidirectional link failures that could
cause bridging loops.
QUESTION 243
Which statement about the NHRP network ID is true ?
A.
B.
C.
D.
It is sent from the hub to the spoke to identify the hub as a member of the same NHRP domain
It is sent from the spoke to the hub to identify the spoke as member of the same NHRP domain
It is locally significant ID used to define the NHRP domain for an interface.
It is sent between spokes to identify the spokes as members of the same as NHRP domain.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 244
What is the function of the command ip pim autorp listener?
A.
B.
C.
D.
It allows the mapping agents to accept autorp information from the PIM rendezvous point.
It allows a BSR to accept autorp information and translate it into BSR messages.
It allows the routers to flood the autorp information in a sparse-mode-only network.
It allows a border PIM spare-mode router to accept autorp information from another autonomous
system.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult2.html
"To cause IP multicast traffic for the two Auto-RP groups 224.0.1.39 and 224.0.1.40 to be Protocol
Independent Multicast (PIM) dense mode flooded across interfaces operating in PIM sparse mode, use the
ip pim autorp listener command in global configuration mode."
QUESTION 245
Which three statements about EVCs are true? (Choose three.)
A.
B.
C.
D.
E.
redundant IPsec tunnels between group members and the key server
allowing traffic to be discarded until a group member registers successfully.
GDOI protocol configuration between group members and the key server.
local exceptions in the traffic classification ACL.
redundant multicast replication streaming through the use of a bypass tunnel.
configuration of multiple key servers to work cooperatively.
The default hello interval is 10 seconds and the default hold timer is 30 seconds.
Both IS-IS routers need to have the same capabilities in the hello packet in order to form neighbors.
The hello interval can be changed on a per-interface basis with the command isis hello-multiplier.
Both routers need to have the same hello intervals and hello timers in order to form IS-IS neighbors.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/
fiprrp_r/1rfisis.html#wp1017772
QUESTION 248
A.
B.
C.
D.
E.
F.
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 250
A.
B.
C.
D.
E.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 251
Which command sets the maximum segment size for a TCP packet initiated from a router?
A.
B.
C.
D.
ip tcp window-size
ip tcp mss
ip mtu
ip tcp adjust-mss
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://packetlife.net/blog/2008/nov/5/mtu-manipulation/
"Terminating Traffic
Terminating traffic refers to TCP packets which originate from or are destined for the local router (for
example, SSH or BGP). In this context, the router itself is considered the TCP client and/or server. The
local MSS can be configured with the ip tcp mss command under global configuration:
Router(config)# ip tcp mss ?
<68-10000> MSS
"
QUESTION 252
A.
B.
C.
D.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/
access_aaa.html#wp1084748
QUESTION 253
A.
B.
C.
D.
E.
F.
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2mt/ipv6-15-2mt-book/ip6ntpv4.html
QUESTION 254
A.
B.
C.
D.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 255
A. BFD is independent of the routing protocol, so it can be used as a generic failure detection mechanism
for EIGRP.
B. Some parts of BFD can be distributed to the data plane, so it can be less CPU-intensive than reduced
timers, which exist wholly at the control plane.
C. Reduced EIGRP timers have an absolut minimum detection timer of 1-2 seconds; BFD can provide
sub-second failure detection
D. BFD is tied to specific routing protocols and can be used for generic fault detection for the OSPF,
EIGRP and BGP routing protocol
E. BFD is dependent on the EIGRP routing protocol, so it can be used as a specific failure detection
mechanism
F. BFD resides on the control plane,so it is less CPU-intensive than if it resided on the date plane
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 256
A.
B.
C.
D.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 257
A. Link groups enable Cisco PfR Fast Reroute when NetFlow is enabled on the external interfaces of the
border routers.
B. Link groups define a strict or loose hop-by-hop path preference.
C. Link groups are required only when Cisco PfR is configured to load-balance all traffic.
D. Link groups set a preference for primary and fallback (backup) external exit interfaces.
E. Link groups are enabled automatically when Cisco PfR is in Fast Reroute mode.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios/pfr/configuration/guide/15_1/pfr_15_1_book/pfr-linkgroup.html#wp1054308
QUESTION 258
A.
B.
C.
D.
E.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
http://netcerts.net/bgp-path-attributes-and-the-decision-process/
QUESTION 259
A.
B.
C.
D.
E.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 260
A.
B.
C.
D.
110
no setting
the default value
80
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 261
A.
B.
C.
D.
E.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6route-ospfv3-auth-ipsec.html
QUESTION 262
A.
B.
C.
D.
E.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
https://supportforums.cisco.com/document/24156/router-log-timestamp-entries-are-different-system-clockwhen-ntp-configure
QUESTION 263
Which two statements about Cisco Express Forwarding are true? (Choose two)
A. The FIB table and the adjacency table reside on the line cards when distributed Cisco Express
Forwarding
is enabled.
B. Layer 2 next-hop address information is maintained in the adjacency table.
C. The FIB table and the adjacency table reside on the line cards when Cisco Express Forwarding is
enabled.
D. Layer 2 next-hop address information is maintained in the FIB table.
E. The FIB table resides on the route processor and the adjacency table resides on the line cards when
Cisco Express Forwarding is enabled.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 264
Which command would you implement to verify both source IP & source MAC address ?
A.
B.
C.
D.
switchport port-security
ip verify source
ip verify source track
ip verify source port-security
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
https://supportforums.cisco.com/discussion/11358496/ip-arp-inspection-vs-ip-verify-source
"ip verify source port-security is used for DAI which verifys ip and mac address via the dhcp snooping
table"
D&Ds
QUESTION 1
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Drag each IPv6 extension header on the left to its corresponding description on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Drag and drop each BGP feature on the left to the corresponding function it performs on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Drag each traceroute text character on the left to its meaning on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Drag and drop each step in the performance-monitoring configuration process on the left to the correct
order on the right
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Drag and drop the OTV component on the left to the function it performs on the right.
(Not sure if it is actually in this exam or in CCIE DC..)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Drag and drop the NAT operations on the left into the correct sequential order on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Drag and Drop
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
Drag and drop each NAT64 description from the left onto the corresponding NAT64 type on the right.
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
Extended ping IP header
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference: