Download as pdf or txt
Download as pdf or txt
You are on page 1of 108

CCIE

Number: 400-101
Passing Score: 1000
Time Limit: 120 min
File Version: 1.0

Source File Sample


QUESTION 1

Refer to the exhibit. Which two configurations on R2 could cause R1 to produce the given output? (Choose
two)

A. Router ospf 1 redistribute eigrp 23 metric-type 1 metric 110


B. Router ospf 1 redistribute eigrp 23 metric-type 1 metric 109
C. Router ospf 1 redistribute eigrp 23 metric-type 1 metric 109 subnets
D. Router ospf 1 redistribute eigrp 23 metric 110 subnets
E. Router ospf 1 redistribute eigrp 23 metric 110
F. Router ospf 1 redistribute eigrp 23 metric-type 1 metric 110 subnets

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2

Refer to the exhibit. You have configured R1 to connect to two different ISPs. Which allows remote users to
access host A through both ISPs. Which Cisco IOS security feature can you configure on R1 to drop
requests from the attacker to host A?

A. uRPF strict mode


B. port security
C. IP source guard
D. uRPF loose mode

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which option is the origin code when a route is redistributed into BGP?

A. IGP
B. External
C. EGP
D. Unknown
E. incomplete

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
How long will the root bridge continue to send configuration BPDUs to notify all bridges to age out their MAC
address tables?

A. Three tirmes the hello intervalam


B. The forward delay + max-age time
C. The max-age time
D. The forward delay

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
Which two methods can you use to limit the range for EIGRP queries? (Choose two)

A. Use an access list to deny the multicast address 224.0.0.1 outbound from select EIGRP neighbor and
permit everything else
B. Configure route tagging for all EIGRP routes
C. Summarize routes at the boundary routers of the EIGRP domain.
D. Configure unicast EIGRP on all routers m the EIGRP domain
E. Corfigure stub ratiters in the EIGRP doman
F. Use an access list to deny the multicast address 224.0.0.10 outbound from select EIGRP neighbors and
permit everything else

Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:

QUESTION 6
Which two options are purposes of MSDP SA filtering? (Choose two.)

A. to allow the filtering of PIM messages between peers


B. to allow all SA message to be processed by MSDP peers
C. improve the scalability of an MSDP multicast environment
D. to reduce the number of multicast address that are shared to MSDP peers
E. allow the filtenng of IGMP messages between peers
F. lo reduce the number of multicast address lhat are distributed to other devices m the same multicast
domain

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Which two factors contribute to traffic starvation when TCP and UDP flows are included in a single traffic
class?(Choose two.)

A. UDP flows continually lower their transmission rates when congestion is detected
B. TCP flows continually lower their transmission rates when congestion occurs on a link
C. TCP flows continually reduce the window size when congestion occurs on a link
D. UDP flows continually reduce the window size when congestion occurs on a link
E. TCP flows maintain a consistent transmission rate when congestion occurs on a link
F. UDP flows maintain a consistent transmission rate when congestion occurs on a link

Correct Answer: BF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
Which options is the implicit access rule for IPv6 ACLs?

A. permit all
B. permit neighbor discovery deny everything else
C. deny all
D. permit all ICMP deny everything else

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
For which feature is the address family "rtfilter‘ used?

A. Enhanced Route Refresh


B. MPLS VPN filtenng
C. Route Target Constraint
D. Unified MPLS

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10

Refer to the exhibit. What happens to a TCP packet that is received on interface GigabitEthemet
0/0/0.1000, which has DF bit set to 1, and packet has a valid destination?

A. The packet is not marched by roule-map foo and the DF bit is left as it was
B. The packet is matched by route-map foo and the DF bit is left as it was
C. The packet is matched by route-map foo and the DF bit is set to 0
D. The packet is not matched by route-map foo and the DF bit is set to 0

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
How can you protect a device from Dos attacks directed against its terminal and management ports?

A. Reserve a terminal or management port with a highly restrictive ACL


B. Enable AAA local authentication on the terminal and management ports
C. Configure the max-login-attempts command on the terminal and management ports
D. Configure TCP keepalives on the terminal and management ports

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Which three elements compose a network entity title? (Choose three.)

A. area ID
B. domain ID
C. system ID
D. NSAP selector
E. MAC address
F. IP address

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
Which two OSPF network type require the use of a DR and BDR? (Choose two)

A. non-broadcast networks
B. point-to-point networks
C. point-to-point norv-broadcast networks
D. broadcast networks
E. point-lo-mutopoml network

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
On an MPLS L3VPN, which two tasks are performed by the PE router? (Choose two.)

A. It exchanges VPNv4 routes with other PE routers


B. It typically exchanges iBGP routing updates with the CE device
C. It distributed labels and forwards labeled packets
D. It exchanges VPNv4 routes with CE devices
E. It forwards labeled packets between CE devices

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
Which three fields are part of a TCN BPDU? (Choose three.)

A. protocol ID
B. version
C. type
D. max-age
E. flags
F. message age

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
Which two statements about marking fields are true? (Choose two)

A. The IP Precedence field is in the iP header and is 4 bits long.


B. The Frame Relay DE field is in the IP header and is 1 bit lung
C. The 3 priority bits are in 802.1Q/P
D. The IP DSCP field is in the IP header and is 6 bits long
E. The ToS 6 bits are in the IP header

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 17
Under which two circumstances is IPsec transport mode appropriate ? (Choose two)

A. When both hosts are behind IPsec peers.


B. When the hosts are transmitting router management traffic
C. When only one host is behind an IPsec peer
D. When only IP header encryption is needed
E. When IPsec peers are the source and the destination of the traffic.
F. When onty IP header authentication is needed

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
Refer to the Exhibit. Which technology can allow Site A and Site B to run OSPF between sites ?

A. Pouit-to point circuit


B. BGP
C. GRE Tunnel
D. Cisco MPLS TE

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
With which ISs will an ISIS Level 1 IS exchange routing information?

A. Level 1 ISs
B. Level 1 ISs in the same area
C. Level 1 and Level 2 ISs
D. Level 2 ISs

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which two statements about IPv6 6to4 tunnels are true? (Choose two)

A. Sites use addresses from the 2002::/16 prefix


B. Sites use addresses from link-local scope
C. They are point-io-multipoint tunnels
D. They are point-to-point tunnels
E. They rely on GRE encapsulation

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which condition must be true to allow an access port to trust QoS markings on an incoming frame?

A. The port must be configured with the mls qos cos command
B. The port must be configured with the mls qos trust dscp command
C. The switch must be configured globally with the vlan dot1q tag native command
D. The switch must be configured globally with the mls qos trust cos command

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 22
In a DMVPN solution, which component can the GRE tunnel source and destination generate
automatically?

A. pre-shared keys
B. crypto ACLs
C. QoS markings
D. policy maps

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
In which 802.1D port state are the root bridge, the root port, and the designated port(s) elected?

A. listening
B. Forwarding
C. learning
D. Disabled
E. Blocking

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
Which three sets of fields that can be included in a NetFlow export template? (Choose three.)

A. IGP
B. IPv4 main cache
C. ODR
D. BGP piC
E. PfR
F. MPLS labels

Correct Answer: BDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 25
Refer to the exhibit. If R4 is configured as shown,which EIGRP routers are present in the R1 routing table?

A. 4.4.4.4/32 and 10.2.4.0/24 only


B. 4.4.4.4/32 and 10.1.4.0/24 only
C. 4 4 4.4/32 10.2.4.0/24 and 2.2.2.2/32
D. 0.0.0.0/0 4.4.4.4/32, and 10.2.4.0/24
E. 0.0.0.0/0 and 4.4.4.4/32 only

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
What are two of the commands that you can enter to gracefully shut down OSPF and notify neighbors?
(Choose two)

A. router(config-if)# ip ospf graceful shutdown


B. router(conng -if)# ip ospf shutdown
C. router(config-router)# shutdown
D. router(config-router)# graceful shutdown
E. router(config)# ip notify

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which two options are two problems that can occur with this configuration? (Choose two)

A. The MPLS path from R1 to R5 becomes unreachable


B. R1 and R5 are unable to establish an LDP relationship
C. The label for the R5 loopback address is filtered from other MPLS router
D. MPLS traffic from R1 to R5 takes a suboptimal path

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 28

Refer to the exhibit Your network uses an MPLS VPN backbone with OSPF routing between all PE and CE
routers and on the 10Mb backup links between the CE routers. You notice that traffic from CE3 to CE2 and
CE4 is flowing over the backup links instead of the higher-bandwidth MPLS VPN backbone even when the
backbone is up. What change can you make to ensure that traffic uses the MPLS VPN backbone instead?

A. Configure a lower cost metnc on the provider network s OSPF-to-BGP redistnbution


B. Configure 1Gb sham links between PE3 and PE4 and between PE3 and PE2
C. Configure 1Gb sham links between PE2 and PE4
D. Configure internal BGP on PE2. PE3 and PE4

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Which action does route poisoning take that serves as a loop-prevention method?

A. It immediately sends routing updates with an unreachable metric to all devices


B. It prohibits a router from advertising back onto the interface from which it was learned
C. It advertises a route with an unreachable metnc back onto the interface from which it was learned
D. It poisons the route by tagging it uniquely within the network

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
What are two features that distance-vector routing protocols can use to address the count-to-infinity
problem? (Choose two.)

A. split horizon
B. adjacency dead timers
C. route tagging
D. tnggered updates
E. route poisoning

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
Refer to the exhibit. After you apply the given configurations to R1 and R2, which networks does R2
advertise to R1?

A. both 172.16.32.0/20 and 172.16.33.0/24


B. 172.16.32.0/20 only
C. 172.16.0.0/16 only
D. 172.16.33.0/24 only

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 32
Which IP SLA operation type uses IP to measure the round-trip time between a router and a device?

A. HTTP
B. ICMP Echo
C. ICMP Path Jitter
D. UDP Jitter for VolP

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
An IPv6 network has different MTUs on different segments, if the network is experiencing reliability issues,
which option is the most likely reason?

A. ICMPV6 is filtered
B. The Do Not Fragment bit is marked
C. HSRPv6 is configured incorrectly
D. The MTU size is greater than 1470 bytes.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
Which two statements about IGMP are true? (Choose two)

A. IGMPv1 supports group-specific queries


B. IGMPV3 uses 224.0.2.22 as destination address for reports
C. IGMPv2 supports IGMP quener election
D. IGKlPv2 supports explicit source signaling
E. IGMPv3 is the first version of IGMP to support a basic query-response mechanism.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
Which information does RA guard use to determine if an RA is allowed?

A. a trusted binding-table database generated from RS messages,


B. information output from IPV6 snooping
C. a trusted binding-table database generated from ND messages
D. manually configured trust sources

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
What would describe Cisco Virtual Topology System?

A. Package that contains an entire runtime environment


B. Web server hosting for NX-OS
C. An agent that resides on physical devices
D. Overlay provisioning and management solution

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 37
Refer to the exhibit Routers A and B are the edge devices at two different sites as shown.The two edge
devices use public addresses on their WAN interfaces, and both sites use RFC1918 for all other addresses
if routers A and B have established an IPsec tunnel.which statement about about the network environment
must be true?

A. Each site is capable of routing priycate address over the IPsec tunnel
B. Router A1 and router B1 are using NAT translation to allow pnvate-address traffic to traverse the tunnel
C. Router A and router B are using BGP to share routes between the two sites
D. The tunnel terminates or the ISP router

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Which statement about NAT64 is true?

A. NAT64 provdes address family translation and translates IPv4 to IPv6 and IPv6 to IPv4
B. NAT64 provides address family translation and can translate only IPv 6 to IPv4
C. NAT64 should be considered as a permanent solution
D. NATG4 requires the use of DNS64

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
What are the two variants of NTPv4? (Choose two.)

A. client/server
B. broadcast
C. multicast
D. asymmetric
E. unicast

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
Refer to the exhibit. Which two statements about this route table are true? (Choose two.)

A. The BGP routes are internal.


B. The OSPF roules with the E2 flag retan the same metric as they leave the router
C. The OSPF routes with the IA flag have their administrative distances incremented as they leave the
router
D. The BGP routes are extenal
E. The OSPF routes with the E2 flag have their metrics incremented as they leave the router

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
Which route types are redistributed from OSPF into BGP by default?

A. all route types


B. intra-area routes and inter-area routes
C. intra area routes only
D. external routes only
E. inter-area routes only

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
A network architect has tasked to migrate a customer's legacy infrastructure switches from Nexus 9000
platform. Which process will help him achieve this milestone?

A. Allow guests temporary access to the CL1 without logging in


B. Create a container providing separate execution space
C. Setup a Web-based interface for configuration management
D. Mange software upgrades via guest shell

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
QUESTION 43
Which statement about Embedded Packet Capture is true ?

A. A capture point can be associated with multiple capture buffers.


B. Capture data is stored in the router's NVRAM.
C. Capture data is stored in the router's DRAM
D. It can capture unicast traffic only
E. The capture configuration is persisent when the router is restarted

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Which two statements about VTPv3 are true? (Choose two)

A. EXtended VLANs prevent VTPv3 switches from becoming VTPv2


B. VTPV3 must receive VTPv2 packets before it can send VTPv2 packets
C. VTPV3 accepts configuration information only from VTPv2 devices
D. VTPv3 sends VTPv2 pac kets when they are detected on a trunk port
E. VTPV3 regions can communicate in server mode only over a VTPv2 region

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45
Which three actions can you take to mitigate excessive unicast packet flooding?(Choose three)

A. Configure a switchport for trunking mode.


B. Enable spanning tree portfast.
C. Configure storm control.
D. Configure switchport blocking
E. Create a native VLAN.
F. Configure a switchport for protected mode.

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Refer to the exhibit.R1 is unable to ping the device at 10.3.3.3. Which two options are possible reasons for
the problem?(Choose two.)

A. The static route is configured as a host route.


B. The static route points to a broadcast interface without a next-hop.
C. IP CEF is disabled on the local router.
D. Proxy ARP is disabled on the next-hop router.
E. The dynamic routing protocol configuration is missing.
F. IP CEF is disabed on the remote router.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 47
Which Auto-RP command can you enter to map a multicast group to an RP?

A. multicast helper
B. autorp-listener
C. send-rp-announce
D. accept-register

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
Refer to the exhibit If the TACACS+ server is unreachable, which user will be able to use HTTP to configure
the router?

A. cisco
B. cisco2
C. cisco3
D. cisco4

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 49
Which two statements about native VLANs are true? (Choose two)

A. They require VTPv3


B. They are used to forward tagged traffic only
C. They are configured under the trunk interface
D. They are configured m VLAN database mode
E. They are used to forward both tagged and untagged traffic
F. They are used to forward untagged traffic only

Correct Answer: CF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50
Which feature must be enabled prior to enabling the IGMP Snooping Querier?

A. IGMP Snooping
B. SSM
C. PIN-SM
D. IP helper
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
What is the source MAC address of a BPDU frame that is sent out of a port?

A. the lowest MAC address on the switch


B. the highest MAC address on the switch
C. the MAC address of the individual port that is sending the BPDU
D. the same as the MAC address in the bridge ID

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52
Which network architecture does make use of 6L0WPAN?

A. CoAP
B. M2M
C. LoRa
D. SCADA

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which two statements about NBAR classification are true(Choose two.)

A. It can classify MPLS packet


B. It cannot distinguish UDP flows
C. It requires CEF to be enable on the router
D. . It is recommended for capacity planning
E. It can classify IP packets

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which BGP attribute is used to influence inbound traffic?

A. weight
B. origin
C. multi-exit discriminator
D. local preference

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
Which two BGP attributes are optional non-transitive attributes?(Choose two.)

A. AS path
B. local preference
C. MED
D. weight
E. cluster list

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
Which two statements about the passive-interface command EIGRP are true?(Choose two)

A. It configures the device to advertise only connected interfaces to neighbors with EIGRP.
B. It configures the interface to use unicast messages to establish EIGRP neighbor relationships.
C. It allows incoming routing updates to be received but disables outgoing routing updates.
D. It disabes processing of incoming hello messages
E. If it is enabled globally under EIGRP on the device, it can be disabled for indvidual interfaces to allow
those interfaces to remain active.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57
Which two conditions must be met by default to implement the BGP multipath feature?(Choose two)

A. The next-hop routers must be different.


B. MPLS must be enabled.
C. The next-hop routers must be the same.
D. All attributes must have the same values.
E. Route reflectors must be enabled.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
Which two features are incompatible with Loop Guard on a port?(Choose two.)

A. Root Guard
B. PortFast
C. UplinkFast
D. Bacwonefat
E. BPDU skew detection

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 59

Which IP packets will be accepted from EBGP neighbor 10.1.1.1?

A. IP packets with a TTL count in the header that is equal to or greater than 253
B. IP packets with a TTL count in the header that is equal to 253
C. IP packets with a TTL count in the header that is equal to or greater than 2
D. IP packets with a TTL count in the header that is equal to 2

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
Which two statements about 6to4 tunnels are true?(Choose two.)

A. They encapsulate IPv6 packets, which allows the packets to travel over IPv4 infrastructure.
B. They support point-to-multipoint traffic.
C. They support OSPF and EIGRP traffic.
D. They support point to point trafic.
E. They allow IPv4 packets to travel over IPv6 infrastructure without modification.
F. They generate an IPv6 prefix using a common IPv4 address.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
Which two statements about MLPPP are true?(Choose two.)

A. It can bundle up to six T-1 interfaces.


B. It supports fragmentation over multiple point-to-point links.
C. It requires a group number to bundle the interfaces.
D. The multlink interface number must match the group number.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which statement about a type 4 LSA in OSPF is true?

A. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to
the ASBR.
B. It is an LSA that is originated by an ASBR, that is flooded throughout the AS, and that describes a route
to the ASBR.
C. It is an LSA that is originated by an ASBR, that is flooded throughout the area, and that describes a
route to the ASBR.
D. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to
the ABR.
E. It is an LSA that is originated by an ABR, that is flooded throughout the area, and that describes a route
to the ASBR.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 63
What are two pieces of information that can be transmitted via Multiprotocol BGP? (Choose two)

A. MPLS VPN routes


B. Level 1/Level 2 routers set the overload-bit
C. multicast sources
D. IS-IS LSAs
E. Level 2 routers set the attached bit
F. OSPF routes

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
Which statement about OSPF mutiaccess segments is true?

A. The designated router is elected first.


B. The designated and backup designated routers are elected at the same time.
C. The router that sent the first hello message is elected first.
D. The backup designated router is elected first.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 65
Which feature can a router use to notify other routers that a RIP network has become unreachable?

A. route tagging
B. split horizon
C. route poisoning
D. weight

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
Which protocol allows for IP mobility in-between Data Centers?

A. LISP
B. FABRIC PATH
C. VXLAN
D. OTV

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
Which information is contained in an OSPF Type 7 Not-So-Stubby Area NSSA External LSA?

A. The paths and costs to all OSPF NSSA areas that are external to the current area.
B. The path and costs to reach other stub area border routers in the OSPF routing domain
C. The address of routers that connect the current area to other areas and the cost to reach those routers
D. External network address, mask, and cost to reach each network that is external to the OSPF domain
and only within the NSSA
E. The external network address, mask, and cost to reach networks that are external to the OSPF NSSA.
inclucfing the default route

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
Which option is part of the DevOps Virtuous Cycle?

A. Improved Scalability
B. Increased Latency
C. Slower Releases
D. Low Quality

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
Which circumstance can cause interface overruns?

A. fragmentation
B. out-of-order packets
C. microbursts
D. asymmetric routing

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70

Refer to the exhibit If neighbor 192.168.13.3 goes down, how does R1 handle traffic for the
192.168.100.0/24 route?

A. Itremoves the route without querying other neighbors.


B. It uses the path through 192.168.12.2.
C. It queries neighbor 192.168.12.2 only for an alternate route.
D. It queries all neighbors for a new route.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 71
Refer to the exhibit.Your organization has two offices,site 1 and Site 2.which are connected by a provider
backbone ,as shown.Where must you configure an attachment circuit to allow the two sites to connect over
a Layer 2 network using L2TPv3?

A. PE Site 1 Fa1/0 and PE Site 2 Fa0/0


B. CE Site 1 Fa0/0 and CE Site 2 Fa0/0
C. PE Site 1 Se0/0 and PE Site 2 Se0/0
D. CE Site 1 Fa0/0 and PE Site 2 Se0/0

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 72
On which three options can Cisco PfR base its trafic routing?(Choose three.)

A. Time of day
B. An access list with permit or deny statements
C. Load-balancing requirements
D. Network performane
E. User-defined link capacity thresholds
F. Router IOS version

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 73
What does NX-API use as its transport?

A. SFTP
B. FTP
C. SSH
D. SCP
E. HTTP/HTTPS

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:
QUESTION 74
Which two statements about HDLC are true?(Choose two.)

A. It resides on the network layer.


B. It is incompatble with full duplexlinks.
C. The physical layer clocks and synchronizes communication between links.
D. Its frames are non-synchronous.
E. It can insert an delete bits in the frame to prevent the delimiter flag's bit pattern from appearing within
data fields.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75
Which two options are interface requirements for turbo flooding?(Choose two.)

A. The interface is Ethernet.


B. The interface is configured for ARPA encapsulation.
C. The interface is PPP.
D. The interfaceis confiogured for GRE encapsldton
E. The interface is configured for 802.1Q encapsulation.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 76
Which technology does OSPFv3 use to authenticate packets?

A. SHA256
B. 3DES
C. AES
D. IPsec

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
Which two statements about VPLS are true?(Choose two.)

A. Split horizon is used on PE devices to prevent loops.


B. Spanning tree is extended from CE to CE.
C. IP is used to switch Ethernet frames between sites.
D. PE routers dymamicaly associate to peers.
E. VPLS extends a Layer 2 broadcast domain.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78
What are IPv6 addresses of the form FC00::/7 known as?

A. unique local addresses


B. transition addresses for 6to4
C. link-local addresses
D. multicast RP addresses

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 79

Refer to the exhibit.Which QoS mechanism is in use to prioritize voice traffic?

A. priority queuing
B. fair queuing
C. CBWFQ
D. Low-latency queuing
E. Custom queuing

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80

Which two staterments about PIM snooping are true?(Choose two.)


A. Traffic for groups operating in dense mode is forwarded to the downstream routes.
B. Auto-RP traffic is not affected by PIM Snooping and is always flooded.
C. Prune messages are forwarded to the router listed in the messages payload.
D. Prune messages are flooded on all switch ports.
E. Join messages are flooded on all switch port.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 81
Which two staterments about the Add Path Support in EIGRP feature are true?(Choose two)?

A. It is supported in both classic EIGRP and EIGRP named mode configurations.


B. It allows a DMVPN hub to advertise as many as five best paths.
C. The next-hop-self command should be disabled to prevent interference with the add-paths command.
D. It uses the variance command to alter the metrics of routes.
E. It is supported with both DMVPN and GETVPN.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 82
An NSSA area has two ABRs connected to Area 0.Which statement is true?

A. Both ABRs translate Type-7 LSAs to Type-5 LSAs.


B. The ABR with the highest router ID translates Type-7 LSAs to Type-5 LSAs.
C. No LSA translation is needed.
D. Both ABRs forward Type-5 LSAs from the NSSA area to backbone area.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 83
Which two options describe the effect of configuring an interface as passive under OSPF?(Choose two)?

A. An adjacency cannot be established,and the interface is not included in the routing protocol update.
B. The interface processes OSPF hello packets but does not send hello packets.
C. An adjacency cannot be established,and the interface is included in the routing protocol update.
D. The interface processes OSPF hello packets and also sends hello packets.
E. An adjacency can be establishe,and the interface is not included in the routing protocol update.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:
QUESTION 84
After you configure split horizon on an EIGRP hub-and-spoke network. You notice that some routes are
missing on the spoke routers. Which two actions can you take to correct the problem?
(Choose two)

A. Increase the Hello and Hold timers on the connections between the routers
B. Configure unicast neighbor statements on both the hub and the spokes
C. Disable split horizon on the spoke router interfaces only
D. Disable split horizon on the hub router interface only
E. Configure the summary address command on the hub router
F. Define a separate subinterface on the hub router for each spoke

Correct Answer: DF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 85
Which two functions of a VTEP enables the stretch of a broadcast domain over a DCI?(Choose two.)

A. Send encapsulated VxLAN traffic across an IP network


B. Enable RSTP in the VxLAN overlay
C. Check a VM MAC Address in the Overlay and map it to an IP address
D. Route native VxLAN traffic
E. Encapsulate VM traffic within an IP header

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 86
Which two statements about IGMP filtering are true?(Choose two.)

A. It supports general IGMP queriers.


B. It can be configured on SVIs and on a per-port basis.
C. It supports IGMPv3 join messages.
D. Multicast profiles can be configured to fiter multicastjoins.
E. By default, an interface can join a maximum of 4 IGMP groups.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 87
Which two protocols exclude the source and destination IP addresses from the application data stream?
(Choose two.)

A. SNMP
B. SMTP
C. SSH
D. NTP
E. TFTP

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 88

Refer to the exhibit. Which statement about the output is true?

A. The overload bit is set by R5 for IPv6 only


B. The overload bit is set by R4 for IPv4 andIPv6
C. The overoad bit is set by R4 for IPv6 onty
D. The overload bit is set by R5 for IPv4 and IPV6
E. The overload bit is not set for any topology under router IS-IS on R5
F. The overload bit is not set for any topology under router IS-IS onR4

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 89
Company A have two remote sites, which are connected to a common ISP by BGP. At each site, company
A is using the same autonomous system number. Which BGP feature can you implement to enable rotuting
betweenthe two sites?

A. communities
B. peer groups
C. allowas in
D. AS path prepending

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

QUESTION 90
Which two statements about 6to4 tunnels are true?(Choose two.)?

A. There is no requirements for dual-stack(IPv4 and IPv6) on the border routers


B. The IPv4 infrastructure acts as a virtual NBMA link.
C. They allow isolated IPv6 domains to connect over an IPv4 network.
D. They support pointto-point automatic tunnels.
E. They require routers to be configured in pairs.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 91
What OSPF interface configuration command can be used to suppress unnecessary flooding every 30
minutes of LSAs in stable topologies?

A. ip ospf database max-age


B. ip ospf do-not-age
C. ip ospf triggered
D. ip ospf flood-reduction

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 92
Refer to the exhibit.What conclusion can you draw from the given ping output?

A. The ping operation sent packets ranging from 505 to 1500 bytes in size.
B. The Verbose option was set in the IP header.
C. The packet life was exceeded in 5 percent of the operations.
D. Fragmentation failed during the ping operation.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 93
What is a major difference between Unidirectional Link Detection(UDLD. and Bidirectional Forwarding
Detection(BFD)?

A. UDLD operates at Layer 3 and detects the falure of the Layer 3 connectivity between two routers. BFD
operates at Layer 3 and detects forwarding path failures over multiple Layer2
hops between two routers.
B. UDLD operates at Layer 2 and detects failure of physical links. BFD operates at Layer 3 and detects
failure of forwarding paths, which may transit multiple Layer2 hops, between two routers.
C. UDLD operates at Layer 2 and detects failure of physical links BFD operates at Layer 2 and detects
falure of a directlink between two routers or switches.
D. UDLD operates at Layer 3 and detects failure of physical links between adjacent routers. BFD operates
at Layer 3 and detects failure of a forwarding path, which may transit multiple Layer 2 hops, between
two routers

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 94

Refer to the exhibit.After observing that an OSPF neighbor relationship failed to form, you executed a
debug that returned the given output.Which configuration issue prevented the OSPF neighbor relationship
from forming?

A. The stub flag is set on the neighboring device


B. The hello and hold timers are mismatched
C. The devices are on different subnets
D. The area lDs are mismatched

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 95
What are three of the key fields that define a unique NetFlow flow?(Choose three.)

A. Input logical interface


B. Canonical Format ldentifier
C. Source MAC address
D. Layer 3 protocol type
E. Cyclic Redundancy Check
F. Type of service

Correct Answer: ADF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 96
Which step of the egress QoS mechanism includes shaped round robin?
A. Classification
B. Scheduling
C. Queuing
D. Dropping
E. Marking

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 97
Which two statement about the EIGRP Over the Top feature are true?(Choose two.)

A. EIGRP routers traffic between the PE devices.


B. Traffic is LISP-encapsulated on the control plan
C. The neighbor command must be configured with LISP encapsulation on each CE device
D. The network statement must be configured on each PE device to connect separate EIGRP sites.
E. Trafic is LISP-encapsulated on the data plan

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 98
Which two statements about the passive-interface command EIGRP are true?(Choose two)

A. It configures the device to advertise only connected interfaces to neighbors with EIGRP.
B. It configures the interface to use unicast messages to establish EIGRP neighbor relationships.
C. It allows incoming routing updates to be received but disables outgoing routing updates.
D. It disables processing of incoming hello messages.
E. If it is enabled globally under EIGRP on the device, it can be disabled for individual interfaces to allow
those interfaces to remain active.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 99
Which DHCP message type does the DHCP server send to client to confirm its allocated IP address?

A. DHCPDISCOVER
B. DHCPOFFER
C. DHCPREQUEST
D. DHCPACK

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
QUESTION 100
How does an IPv6 host automatically generate a global address?

A. It prepends its interface identifier to the network prefixes contained in Router Advertisement messages.
B. It appends its interface identifier to the network prefixes contained in Router Advertisement messages.
C. It appends its interface identifier to the network prefixes contained in Router Solicitation messages.
D. It prepends its interface identifier to the network prefixes contained in Router Solicitation messages.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 101

Refer to the exhibit Which statement about the 192.168.100.0/24 destination network is true?

A. The Reported Distance for the Successor is 128256


B. The Reported Distance for the Feasible Successor is 409600.
C. The metric installed into the route table is 128256.
D. The metric installed into the route table is 435200.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 102

Refer to the exhibit. Which EIGRP routes will appear in the routing table of R2?
A. 2001:12::1/64
B. 2001:112::/64,2001:12:1/128
C. 2001:112::/64,2001:12:1/64
D. 2001:12::1/128

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 103
Which command can you enter to disable logging for VTY lines?

A. no logging monitor
B. no logging count
C. no logging buffer
D. no logging console
E. no logging trap

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 104
Which two main considerations for building a routing table?(Choose two.)

A. Prefix length
B. Distribute-list
C. Interface speed
D. Bandwidth
E. Administrative distance

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 105
Which feature must be enabled to support IGMP snooping on VLAN that is operating without a multicast
router?

A. PIM snooping
B. Auto-RP
C. The IGMP snooping querier
D. MLD

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
QUESTION 106
Which three pieces of information are carried on OSPF type-3 LSAs?(Choose three)

A. metric
B. authentication type
C. forwarding address
D. IP subnet
E. extermal routetag
F. subnet mask

Correct Answer: ADF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 107
Which two staterments about CEF polarization are true?(Choose two)?

A. The AND operation is performed on the higher-order bits of the source and destination IP address
B. A single link is chosen for all flows
C. The AND operation is performed on the lower-order bits of the source and destination IP address
D. After the XOR process,the flow is processed in the distribution Layer with a different hashing algorithm
E. It can be prevented by alternating the hashing inputs
F. When enabled,it allows all links to be used efficiently for diferent traffic flows

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 108
Which two features or conditions on a network can cause unicast flooding?(Choose two.)?

A. Asymmetric routing
B. Microbursts
C. UDLD
D. TCAM overflow
E. uRPF
F. jitter

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 109
Which two staterments about static routing are true?(Choose two)

A. It is highly scalable as networks grow.


B. It requires less bandwidth and fewer CPU cycles than dynamic routing protocols
C. It reduces configuration errors.
D. It can be implemented more quickly than dynamic rouing
E. It provides better security than dynamic routing.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 110
Which two statements about STP are true?(Choose two.)

A. Rapid PVST+and MST can be active on a device simultaneously.


B. MST supports up to four MST instances, including instance 0.
C. To support load-balancing across redundant paths, the VLAN-to-instance mapping must match on all
switches in each path.
D. MST configurations are propagated throughout the VTP domain.
E. Only one version of STP can be active on the device at one time.

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 111
Which two statements about DHCP operations are true?Choose two)

A. The client uses TTL to discover a DHCP server and obtain a leased IP address.
B. When the DHCP relay agent receives a DHCP message,it generates a new DHCP message to transmit.
C. The DHCP relay agent can insert option 82 with additional information about the client identity.
D. The client uses option 125 in a DHCPDISCOVER message to discover the DHCP server.
E. The DHCP server inserts option 150 when it sends a DHCPOFFER message.

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 112
Which two statements about route redistribution default metrics are true?(Choose two.)

A. When an IGP is redistributed into IS-IS, it has a default metric metric of 115.
B. When BGP is redistributed into OSPF, it has a default metric of 1.
C. When an IGP is redistributed into OSPF, it has a default metric of 110.
D. When an IGP is redistributed into RIP, it has a default metric of 1.
E. When EIGRP is redistributed into OSPF as E2, it has a default metric of 20.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:
QUESTION 113
Which two statements about VPLS are true?(Choose two)?

A. The service provider provisions CE devices.


B. It transmits broadcast traffic more efficiently than Ethernet switches.
C. It uses broadcast replication to transmit Ethernet packets with multicast MAC addresses.
D. It enables CE devices to operate as part of an L3 VPN.
E. It enables CE devices on diferent networks to operate as if they were in the same LAN.
F. It enables PE and CE devices to operate as if they were routing neighbors.

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 114
Which two staterments about Management Plane Protection are true?(Choose two.)

A. It supports the SNMP, SSH, TFTP, and HTTP management protocols.


B. It supports in-band and out-of-band management interfaces.
C. It is enabled by default, but it allows all management protocols to pass freely through allinterfaces until it
is configured.
D. It can handle management trafic when IP Cisco Express Forwarding is disabled.
E. It provides granular control over the management protocols that are allowed on an interface.
F. It works only on out-of-band management interfaces.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 115
What command can you enter to configure NBAR to recognize VNC trafic?

A. ip nbar port-map VNC hex OXAA Ox1B


B. ip nbar custom-map VNC tcp-udp 5900 5901
C. ip nbar port-to-application seq 5 VNC tcp 5900 5901
D. ip nbar application-map NC udp 59005901
E. ip nbar port-map VNC tcp 5900 5901

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 116
Which prefix list matches and permits al RFC 1918 network 10.0.0.0 routes that have masks of /16
through /24?

A. ip prefix-list foo seq 10 permit 10.0.0.0/16 le 24


B. ip prefix-list foo seq 10 permit 10.0.0.0/8 ge 15 le 25
C. ip prefix-list foo seq 10 permit 10.0.0.0/16 ge 15 le 25
D. ip prefix-list foo seq 10 permit 10.0.0.0/8 ge 16 le 24

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 117
Which routing protocol supports only IP networks?

A. EIGRP
B. ISIS
C. BGP
D. OSPF

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 118
Which two options are restrictions of BGP Outbound Route Filtering?(Choose two.)

A. It can be used only with eBGP.


B. Multicast is not supported.
C. It can be used only with IPv4 multicast.
D. It requires access list to match routes
E. It can be used only with iBGP.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 119

Refer to the exhibit.Which tag is applied to route 10.10.50.0/24?


A. 10
B. 20
C. 30
D. 40

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 120
When is it useful to disable split horizon on an EIGRP interface?

A. Disable it when you want to provide additional backup paths in your network.
B. Disable it when you want to send routes that are learned from another routing protocol to peer on the
same interface.
C. Disable it when you need to send updates to peers on the interface on which the updates were received.
D. It is never acdvisatble to disable split horizon on an EIGRP inteface.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 121
Which feature monitors and reports events and can take corrective action in response to events it
observes?

A. NetFlow
B. IP Accounting
C. EEM
D. Syslog

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 122
Which two statements about route summarization are true?(Choose two.)

A. RIP, IGRP, and EIGRP can automatically summarize routing information at network address
boundaries.
B. EIGRP can automatically summarize external routes.7
C. The area range command can aggregate addresses on the ASBR.
D. The summary-address command under the router process configures manual summarization on RIPv2
devices.
E. The ip classless command enables classful protocols to select a default route to an unknown subnet on
a network with other known subnets.

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 123
In which way does the Bridge Assurance mechanism modify the default spanning-tree behavior in an effort
to prevent bridging loops?

A. Received BPDUs are looped back toward the sender to ensure that the link is bidirectional.
B. If BPDUs are no longer received on a port, the switch immediately sends out a TCN BPDU.
C. Extended topology information is encoded into all BPDUs.
D. BPDUs are sent bidirecional on alacive networkports, including blocked and alternate ports

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 124

Refer to the exhibit.Which kind of ICMPv6 packet is shown in the output?

A. neighbor advertisement
B. neighbor solicitation
C. router discovery
D. time exceeded
E. router advertisement

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 125
Refer to the exhibit.Which option describes the purpose of the as-set argument of the aggregate-address
command?

A. It provides an AS path in the aggregate advertisement that contains only the local AS number.
B. It provides a predefined AS path in the aggregate advertisement that is used to indicate an aggregate
prefix.
C. It provides an AS path in the aggregate advertisement that includes the AS numbers of the component
members.
D. It provides a list of AS numbers top which the aggregate is advertised.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 126
Which two loop-prevention mechanisms are implemented in BGP?(Choose two.)

A. A route with its own AS in the AS_PATH is dropped automaticaly if the route reenters its own AS.
B. A route with its own cluster ID in the CLUSTER_LIST is dropped automatically when the route reenters
its own AS.
C. The command bgp allowas-in enables a route with its own AS_PATH to be dropped when it reenters its
own AS.
D. The command bgp bestpath as-path ignore enables the strict checking of AS_PATH so that they drop
routes with their own AS in the AS_PATH.
E. The command bgp bestpath med missing-as-worst assigns the smallest possible MED, which directly
prevents a loop.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 127
Which two statements about 6PE are true?(choose two)

A. iBGP peering between the PE routers should be done using an IPv6 address.
B. It does not require MPLS between the PE routers.
C. It requires a VRF on the IPv6 interface
D. It requires BGP to exchange labeled IPv6 unicast between PE routers
E. Uses an IPv4-mapped IPv6 address as the IPv4 next-hop on PE router

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 128
Which option is the result if two adjacent routers are configured for OSPF with different process IDs?

A. The routers are unable to establish an adjacency.


B. The routers establish an adjacency, but route exchange fails.
C. The routers establish an adjacency and exchange routes, but the routes are unreachable.
D. The routers establish an adjacency and exchange routes, and the routes are reachable.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 129
Which two statements about Cisco IOS XE are true?(Choose two)

A. Separate images are required for platform-dependent code.


B. Its functions run as multiple separate processes in the OS.
C. It uses a service blade outside Cisco IOS XE to integrate and run applications.
D. It is deployed in a Linux-based environment
E. The FED feature provides separation between the control plane and the data plane.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 130
Which two events occur when a packet is decapsulated in a GRE tunnel?(Choose two.)

A. The destination Pv4 address in the IPv4 payload is used to forward the packet.
B. The TTL of the payload packet is decremented.
C. The source IPv4 address in the IPv4 payload is used to forward the packet.
D. The TTL of the payload packet is incremented.
E. The version field in the GRE header is incremented.
F. The GRE keepalive mechanism is reset

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 131
Which three criteria are used for stackwise election of a master switch?(Choose three.)

A. VLAN revision number


B. longest uptime
C. highest MAC address
D. user select priority
E. IOS version number
F. lowest MAC address

Correct Answer: BDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 132
What are the minimum requirements for Cisco PfR to provide routing contro?

A. one master controller, two border routers, two internal interfaces, and two external interfaces.
B. one master controller, one border router, one internal interface, and two external interfaces.
C. one master controller, two border router, one internal interface, and one external interface.
D. one master controller, one border router, two internal interfaces, and one external interface,
E. two master controllers, one border router, one internal interface, and one external interface.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 133
Which two statements about Cisco Express Forwarding are true(Choose two.)?

A. Changing MAC Header rewrite strings requires cache validation.


B. Cisco Express Forwarding tables contain reachability information and adjacency tables contain
forwarding information.
C. Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
D. Cisco Forwarding tables contain forwarding information and adjacency tables contain reachabilty
information
E. adjacency tables and Cisco Express Forwarding tables can be built separately.

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 134
When you deploy DMVPN, what is the purpose of the command crypto isakmp key ciscotest address
0.0.0.0 0.0.0.0?

A. It is configured on hub and spoke router to establish peering


B. It is configured on hub to set the pre-shared key for the spoke routers
C. It is configured on the spokes to indicate the hub router
D. tis configured onthe ntemet PE routers to alow trafic to traverse the lSP core

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

QUESTION 135

Refer to the exhibit.You have configured R1 to connect to two different ISPs.Which Cisco IOS security
feature can you configure on R1 to reduce the risk of malicous IP spoofing while allowing traffic from Host A
through both ISPs?

A. uRPF strict mode


B. IP source guard
C. uRPF loose mode
D. port security

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 136
What is the reason to send EIGRP SIA reply to a peer?

A. to respond to an SIA query that the router is still waiting on replies from its peers
B. to respond to a reply reporting that the prefix has gone stuck-in-active
C. to respond to a query reporting that the prefix has gone stuck-in-active
D. to respond to an SIA query with the alternative path requested

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 137
Which two statements about SSM are true?(Choose two)

A. It is designed to support many-to-many applications within a PIM domain.


B. It requires IGMPv3 for source filering.
C. It uses(,G) multicast routing entries to make forwarding decisions.
D. It can work in conjunction with the ISM service.
E. It uses the group address range 233.0.0.0-233.255.255.255 by default

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:

QUESTION 138
Which two statements are true about control plane policing?(Choose two.)?

A. Control plane policing will affect only traffic that is destined to the route processor.
B. Access lists that are used in policies for control plane policing must not use the log keyword
C. Access lists that use the deny rule in control plane policing do not progress to the next class.
D. The log keyword can be used but the log-input keyword must not be used in policing.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 139
Which three session tables does NAT64 maintain?(Choose three.)

A. 6rd
B. TCP
C. 464XLAT
D. ICMP Query
E. SIP
F. UDP

Correct Answer: BDF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 140
What are two diferences between IPV6 ISATAP tunneling and IPv6 6to4 tunneling?(Choose two)

A. Only ISATAP tunneling transfers unicast IPv6 packets between sites.


B. Only 6to4 tunneling requires 2002::/16 addresses.
C. Only ISATAP tunneling can transfer IPv6 multicast packets.
D. Only ISATAP tunneling transfers unicast IPv6 packets within a site.
E. Only 6to4 tunneling transfers unicast IPv6 packets within a site.

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 141
Which technology can be used to secure the edge of an STP domain?

A. root guard
B. BPDU guard
C. UplinkFast
D. BPDU filer
Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 142
Which two options are the two main phases of PPPoE?(Choose two.)

A. Active Discovery Phase


B. IKE Phase
C. Main Mode Phase
D. PPP Session Phase
E. Aggressive Mode Phase
F. Negotiation Phase

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 143
When do summary black holes occur in EIGRP?

A. when the summary is removed due to the last component disappearing


B. when a summary is created for security purposes to draw undesired traffic to a termination point
C. when a summary is advertised that contains components that the advertising router cannot reach
D. when components of the summary are present at multiple summary points

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 144
When you implerment redistribution on your network, which feature can you enable to prevent suboptimal
routing?

A. VRFs
B. NBAR
C. authentication
D. route tagging

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 145
Which two statements about OSPFv3 are true?(Choose two.)

A. It supports unicast address families for IPv4 and IPv6.


B. It supports unicast address families for IPv6 only.
C. It supports only one address family per instance.
D. It supports the use of a cluster ID for loop prevention.
E. It supports multicast address families for IPv4 and IPv6.
F. It supports multicast address families for IPv6 only.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 146
Which two options are requirements to implement 6VPE?(Choose two.)

A. MPLS between PEs


B. 6-in-4 tunnels between PEs
C. MP-BGP VPNv6 exchange
D. MP-BGP IPv6+label exchange
E. Any Transport over MPLS
F. IPv4/IPv6 dual-stack in core

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 147
Which two statements about IPv6 fragmentation are true?(Choose two.)

A. Any router on the path can fragment an IPv6 packet.


B. The last hop router reassembles fragmented IPv6 packets.
C. The minimum MTU for an IPv6 packet is 576 bytes.
D. The minimum MTU for anlPv6 packetis 1280bytes.
E. The router closest to the packet source inserts a Fragmentation Header into the packets.
F. Only the source node can fragment an IPv6 packet

Correct Answer: DF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 148
Which technology allows a device to filer routes into and out of an MPLS VPN?

A. route targets
B. CEF
C. LDP
D. roule distinguishers

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

QUESTION 149

Refer to the exhibit Based on the output shown, how are the OSPFv3 address-families configured this
router?

A. The iPv4 address-family is configured for both area 0 and area 1


B. The IPv4 address-family is configured for area 1,IPv6 for area 0
C. The IPv4 address family is configured for area 0 IPv6 for area 1
D. The IPv6 address-family is configured for both area 0 and area 1

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 150

Refer to the exhibit.Which statement about the R1 configuration is true?

A. It permits host 10.1.1.2 to establish a Telnet connection to R1.


B. It limits rermote hosts to two SSH connection attempts.
C. SSH connections to R1 will log out after a 5-minute idle interval.
D. Hosts that reside on network 10.0.0.0/8 can SSH to R1.
E. The R1 timeout for outgoing SSH connection attempts is 30 seconds.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 151
Which two statements about MLPPP are true?(Choose two.)

A. It supports bundling up to 16 serial links.


B. The virtual interface is used to connect to the peer system.
C. It supports packet fragmentation.
D. It requires the administrator to configure load balancing across links in the bundle.
E. It supports only synchronous interfaces.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 152
Which two staterments about redistribution are true?(Choose two.)

A. EIGRP requires the route to have a default metric defined.


B. EIGRP and OSPF use their router IDs to prevent loops.
C. When OSPF is redistributed into IS-IS, the default metric must be configured under the IS-IS process.
D. When traffic is redistributed into OSPF, the subnets command is needed to redistribute classful
subnets.
E. The default seed metric for OSPF redistributed routes is 30.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 153
Which two options are valid IPv6 extension header types?(Choose two)

A. Flow Label
B. Encapsulating security Payload
C. Version
D. Traffic Class
E. Mobility

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 154
In a simple MPLS L3VPN.which two tasks are performed by a PE router(Choose two)?

A. It establishes pseudowires with other PEs


B. It exchanges VPNv4 or VPNv6 routes with CE devices
C. It assigns labels to routes in individual VPNs.
D. It fowards labeled packet to CE devices
E. It exchanges VPNv4 or VPNv6 routes with other PE routers

Correct Answer: CE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 155
Which flag in a configuration BPDU instructs all switches to shorten their bridge table aging process from
the defaut 300 seconds to the current forward delay value?

A. priority bit
B. topology change bit
C. max-age bit
D. topology change acknowledgment bit

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 156
Which BGP feature enables you to install a backup path in the forwarding table?

A. soft reconfiguration
B. route refresh
C. prefix independent convergence
D. synchronization

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 157
Which statement about SSHv2 is true?

A. Routers acting as SSH clients can operate without RSA keys.


B. SSHv2 supports port forwarding and compression.
C. The RSA key pair size must be at least 512.
D. You must configure a default gateway before you enable SSHv2.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 158
What are two effects of migration a network from PVST+to MST(Choose two.)?
A. BPDU filter is automatically enabled.
B. BPDU guard is automatically disabled.
C. PortFast is automatically disabled.
D. UplinkFast is autoptabcaMy disabled
E. Root guard is automatically enabled.
F. BackboneFast is automatically disabled.

Correct Answer: DF
Section: (none)
Explanation

Explanation/Reference:

QUESTION 159
How can you prevent routing loops when performing mutual redistribution between two OSPF domains on
multiple routes?

A. No action is required, OSPF prevents routing loops by design.


B. Prevent routes from being redistributed into their original OSPF domain.
C. Redistribute only external routes between the OSPF domains.
D. Make sure that the redistributing routes are members of Area 0 in both OSPF domains.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 160
In which two modes do IPv6-in-IPv4 tunnels operate? (Choose two.)

A. tunnel mode
B. transport mode
C. 6to4 mode
D. 4to6 mode
E. ISATAP mode

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 161
Which IP SLA operation requires Cisco endpoints?

A. UDP Jitter for VoIP


B. ICMP Path Echo
C. ICMP Echo
D. UDP Jitter

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
QUESTION 162
Which statement about the EIGRP SRTT is true?

A. It is the average time that it takes for a reliable packet to be acknowledged.


B. It is six time the RT
C. It is the time that it takes for an update to be received by a peer.
D. It is the time it takes to receive a reply to a query.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 163
In which order of magnitude (time) is delay/latency measured when you use wide metrics in EIGRP?

A. tens of microseconds
B. picoseconds
C. mamoseconds
D. microseconds

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 164
Which GET VPN component maintains security policies?

A. group member
B. CE
C. P
D. key server
E. PE
F. GDOI

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 165
Which two staterments about the IS-IS cost metric are true?(Choose two.)

A. The cost is calculated automaticlly based on the delay only B. It is the only IS-IS metric supported on
Cisco devices
B. A default cost of 1 is automatically assigned to all interfaces
C. The cost is calculated maticlly based on the interface bandwidth and delay
D. A default cost of 10 is automatically assigned to all interfaces
E. The cost is calculated automaticlly based on the interface bandwidth only
Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 166
Which parameter is a functionality of Micro segmentation in the Data Centre?

A. Enhanced security for east-west traffic


B. Packet filtering for North-South traffic.
C. Inter-operation transparently with a wide variety of Layer 1 to Layer 7 devices.
D. Interoperate transparently with a wide variety of hypervisors.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 167
Which two values must match before an IS-IS adjacency can be formed between routers?(Choose two.)

A. LSP packets size


B. MTU size
C. Interface speed
D. IS type
E. ATT bit

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 168
Which two discovery mechanism does LDP support?(Choose two.)

A. strict
B. extended
C. loose
D. tergeted
E. basic

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 169
1

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 170

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 171

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 172

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 173

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 174
Select and Place:

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 175

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 176

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 177

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 178

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 179

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 180

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 181

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 182

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 183

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 184

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 185
Select and Place:

Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 186

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 187

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 188

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 189

Select and Place:


Correct Answer:

Section: (none)
Explanation

Explanation/Reference:

QUESTION 190

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 191

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 192

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 193

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 194

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

QUESTION 195

Select and Place:


Correct Answer:
Section: (none)
Explanation

Explanation/Reference:

You might also like