New ENARSI Questions 7
New ENARSI Questions 7
Premium Member: You can practice these questions via this link:
+ Question 1 to 21
+ Question 22 to 28
+ Question 29 to 57
+ Question 58 to 78
+ Question 79 to 102
or practice all 102 questions of this part 7 at All ENARSI Questions – Part 7
Question 1
21:12:08.259: OSPF: Send DBD to 2.2.2.2 on Ethernet0/0 seq u opt 0x52 flag 0x7 len 32
21:12:08.339: OSPF: Rcv DBD from 2.2.2.2 on Ethernet0/0 seq 0x836 opt 0x52 flag 0x7 len
21:12:08.423: OSPF: Send DBD to 1.1.1.1 on Ethernet0/0 seq 0x836 opt 0x52 flag 0x7 len 32
21:12:08.511: OSPF: Rcv DBD from 1.1.1.1 on Ethernet0/0 seq 0x836 opt 0x52 flag 0x2 len
R1 cannot establish a neighbor relationship with R2. Which action resolves the issue?
A. Configure the ip ospf network broadcast command on the interfaces of R1 and R2.
B. Configure the ip ospf network point-to-point command on the interfaces of R1 and R2.
C. Configure the mtu ignore command on the interfaces of R1 and R2.
D. Configure the neighbor 2.2.2.2 command on R1 under the OSPF process.
Answer: C
Explanation
The problem occurs most frequently when attempting to run OSPF between a Cisco router
and another vendor’s router. The problem occurs when the maximum transmission unit
(MTU) settings for neighboring router interfaces don’t match. If the router with the higher
MTU sends a packet larger that the MTU set on the neighboring router, the neighboring
router ignores the packet.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/
13684-12.html
-> Therefore we can fix this issue with the “mtu ignore” command.
Question 2
A. The force keyword changes the router ID to the specified address without causing any
impact.
B. The loopback with the highest IP address is selected as the router ID.
C. The MPLS LDP router ID must match the IGP router ID.
D. If not configured, the operational physical interface is chosen as the router ID even if a
loopback is configured.
Answer: B
Question 3
R101# sh run
ip ssh version 2
line vty 0 4
password cisco
login local
rotary 1
An engineer must configure router R101 for SSH access on ports 2001 through 2011. After
the configuration, some expected ports were inaccessible. Which command resolves the
issue?
Answer: D
Explanation
The command “ip ssh port 2000 rotary 1” means that we want to change the listening port
for SSH from port 22 (default) to port 2000 with a rotary group of 1. This rotary group is then
applied to VTY lines (from 0 to 4) to map the SSH connection to these VTY lines. Now your
router will listen for SSH connections on these five VTY ports.
Next, the command “ip ssh port 2001 rotary 1 11” (11 here is the “High Rotary group
number”) means that the first SSH port is mapped to rotary 1 and the listening ports
increment up from there. Ports 2002, 2003, 2004, …, 2011 will map to rotary 2, 3, 4, …, 11
respectively.
But notice that there are only five VTY ports for 11 SSH connections so if all five VTY ports
are busy then the sixth SSH connection may fail.
Question 4
R3#show ip cef
0.0.0.0/0 no route
0.0.0.0/8 drop
0.0.0.0/32 receive
172.0.0.0/8 drop
172.16.4.254 GigabitEthernet0/3
224.0.0.0/4 drop
224.0.0.0/24 receive
240.0.0.0/4 drop
255.255.255.255/32 receive
Explanation
The any option enables a Loose Mode uRPF on the router. This mode allows the router to
reach the source address via any interface.
The rx option enables a Strict Mode uRPF on the router. This mode ensures that the router
reaches the source address only via the interface on which the packet was receive.
In this case the router was configured with uRPF in strict mode so we should change to loose
mode.
Question 5
Option A Option B
R4# R4#
router ospf 1 router ospf 1
area 0 area 7 stub no-summary area 0 nssa default-information-originate
network 10.5.1.0 0.0.0.3 area network 10.5.1.0 0.0.0.3 area 0
0 network 10.8.2.0 0.0.0.3 area 7
network 10.8.2.0 0.0.0.3 area R9#
7 router ospf 1
R9# area 7 nssa
router ospf 1 redistribute eigrp 10 subnets
area 7 stub network 10.8.2.0 0.0.0.3 area 7
redistribute eigrp 10 subnets
network 10.8.2.0 0.0.0.3 area
7
Option C Option D
R4# R4#
router ospf 1 router ospf 1
area 7 nssa area 7 nssa no-summary
network 10.5.1.0 0.0.0.3 area network 10.5.1.0 0.0.0.3 area 0
0 network 10.8.2.0 0.0.0.3 area 7
network 10.8.2.0 0.0.0.3 area R9#
7 router ospf 1
R9# area 7 nssa
router ospf 1 redistribute eigrp 10 subnets
area 7 nssa network 10.8.2.0 0.0.0.3 area 7
redistribute eigrp 10 subnets
network 10.8.2.0 0.0.0.3 area
7
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Explanation
To only permit LSA Types 1, 2 and 7 we have to configure area 7 into a Totally NSSA area:
To configure a totally NSSA area, configure the nssa command on all the routers attached to
the area and configure the nssa no-summary command on the ABR.
Question 6
if index 5(5)
IP MTU 1500
Building configuration...
interface GigabitEthernet0/3
duplex auto
speed auto
media-type rj45
end
An engineer implements uRPF to increase security and stop incoming spoofed IP packets.
Same asymmetrically routed packets are also blocked after the configuration. Which
command resolves the issue?
Answer: A
Question 7
A. When BFD declares a failure on the primary IGP path, the router on the peer router
chooses to use the secondary path.
B. BFD operates on the route processor module and impacts the route processor CPU
utilization.
C. BFD control packets are sent via UDP port 3784 to the destination router.
D. BFD echo packets are sent to the same source IP and different destination IP with TCP
port of 3786.
Answer: C
Explanation
BFD only detects failure, but the network administrator must explicitly specify which action
is performed next. It may be send an alarm message or use the secondary path -> Answer A
is not correct.
BFD control packets are encapsulated into UDP packets with port number 3784 for single-
hop detection or port number 4784 for multi-hop detection. (It can also be 3784 based on
the configuration task) -> Answer C is correct.
Question 8
Which two NLRI attributes are used by an MPLS Layer 3 VPN network to exchange VPNv4
routes between MPLS routers via MP-BGP? (Choose two)
A. VPNv4 Prefix
B. Next Hop
C. Extended-Community
D. IPv4 Prefix
E. RT
Answer: B D
Explanation
MP-BGP supports IPv4 unicast/multicast, IPv6 unicast/multicast and it has support for VPNv4
routes. To exchange VPNv4 routes, MP-BGP uses a new NLRI (Network Layer Reachability
Information) format that has the following attributes:
+ RD (Route Distinguisher)
+ IPv4 prefix
+ Next Hop
+ VPN Label
Reference: https://networklessons.com/mpls/mpls-layer-3-vpn-explained
Question 9
Answer: A
Explanation
The time on DNA Center looks good so the problem may come from the time on the switch.
By connecting to the NTP server, the switch can update its time and solve this problem.
Question 10
Which two features are required for MPLS forwarding on which types of routers? (Choose
two)
Answer: A B
Explanation
Question 11
Match clauses:
ip address (access-lists): 10
Set clauses:
tag 666
Match clauses:
Set clauses:
The router is redistributing a prefix 172.16.10.0/24 that should have been filtered. Which
action resolves the issue?
Explanation
From the output of the “show route-map” above, we can deduce the following route-map
was configured:
match ip address 10
With the last statement “route-map Redistribution_EIGRP permit 20”, all routes are
redistributed so we need to remove this line so that prefix 172.16.10.0/24 is filtered out.
Question 12
Which action allows the engineer to successfully copy running-config to the TFTP server?
Answer: A
Explanation
Maybe there is something wrong with this question as the IP address of the TFTP Server and
interface E0/1 of the Switch are not in the same subnet. But the best answer in this question
is answer A as other answers are surely not correct.
Question 13
UserPC receives the IP address but does not register to the call manager. Which command in
ip dhcp pool VLAN200_USER_VOICE resolves the issue?
Answer: A
Explanation
Cisco phones IP addresses can be assigned manually or by using DHCP. Devices also require
access to a TFTP server that contains device configuration name files (.cnf file format), which
enables the device to communicate with Cisco Call Manager.
The command “option 150 ip TFTP_Server_IP_address” is used to tell the Cisco phones which
TFTP server to contact to get their configuration.
Question 14
Which action resolves the IP SLA for the UDP jitter problem between R4 and R3 Ethernet 0/1
IP addresses?
A. Delete and configure the ip sla 6500 command with R3 e0/1 IP address.
B. Configure the ip sla 6500 command with R3 e0/1 IP address.
C. Configure the ip sla responder command with R4 E0/1 IP address.
D. Delete and configure the ip sla responder command with R4 E0/1 IP address.
Answer: A
Explanation
From the output of R3 we can see that R3 has been configured with command “ip sla
responder”. Below is the output of the “show ip sla responder” before and after issuing the
command “ip sla responder”:
But we see on R4 the “udp-jitter 209.165.201.4 …” command was not correct as the
destination IP address should be 209.165.201.2 (E0/1 interface of R3). Because of this issue
we can see the “No connection” under the output of “sho ip sla su” (show ip sla summary) of
R4.
Although answer B is a bit unclear but it implied “fix the udp-jitter command with the
correct destination IP address of E0/1 interface of R3″.
Once sla is configured can not be changed, only delete and configured again -> Answer A is
the best choice.
Note: Answer C is not correct as the IP address in the command “ip sla responder …
ipaddress {ipaddress} port {port}” is only used to manually specify which IP address and Ports
you mean for the Responder to listen on. Therefore, the IP address used in this command
should belong to R3, not R4.
Question 15
Refer to the exhibit.
SW101#
SW101#ping 10.1.0.1
!!!!!
SW101#
SW101 could not transfer its startup configuration to a TFTP server. No ACL is configured on
the switch, and it can successfully ping the host. Which action resolves the issue?
Answer: D
Explanation
“Permission denied” means read access to the file and/or directory is not enabled. Maybe
the TFTP software was installed on the host but it has not been started.
Question 16
Option A Option B
! !
! !
address-family ipv6 !
! ipv6 cef
interface Loopbach100 !
interface GigabitEtherne1/0 !
address-family ipv6 !
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
We need to use the “ipv6 unicast-routing” for IPv6 to function and activate the IPv6
neighbor with command “neighbor 2001:DB8:1::1 activate” under “address-family ipv6”.
Question 17
A. RD
B. RT
C. extended-community
D. MPLS label
Answer: A
Explanation
The Route Distinguisher (RD) is to make sure that all prefixes are unique. The customer
prefix + RD together are a VPNv4 route.
Question 18
Router R2 VLAN 10 users cannot get dynamic IP addresses from R1. Which action resolves
the issue?
Explanation
The reason for the failure of DHCP assignment is “DHCPD: due to: POOL EXHAUSTED” which
means there is no IP addresses available in the DHCP pool so we should expand the address
scope of this VLAN.
Question 19
R1 lost its directly connected EIGRP peer 172.16.33.2 (SW1). Which configuration resolves
the issue?
Option A Option B
key 1 key 1
key-string Cisco key-string Cisco
! !
Option C Option D
key 1 key 1
! !
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
The last command “ip authentication key-chain eigrp 88 {key-chain}” requires a key-chain so
it must be “EIGRP” -> Only Option A and Option B are correct.
Question 20
How are CE advertised routes segmented from other CE routers on an MPLS PE router?
Answer: D
Explanation
This question is a bit unclear in the way it asks. Maybe this question wanted to ask how PE
router can identify which routes are from which CE. If so then the answer is PE router assigns
different VRFs for its CE-facing interfaces.
Question 21
A. Planning and modifications are required for the customer intranet before migrating to
Layer 3 VPN.
B. Scalable VPNs are created using connection-oriented, point-to-point, or multipoint overlay
connections.
C. QoS provides performance with policy and support for a best-effort service level in an
MPLS VPN.
D. Security is provided at the edge of the provider network through encryption.
Answer: C
Question 22
A. When a PE device forwards a packet received from a CE device across the provider
network, it labels the packet with the label learned from the source PE device.
B. When a destination PE device receives a labeled packet, it pops the label and uses it to
forward the packet to the correct CE device.
C. When an EIGRP internal route is redistributed into BGP by one PE and then back into
EIGRP by another PE, the originating router ID for the route is changed to the router ID of
the first PE.
D. When a VPN route is learned from a CE device and injected into IGP, a VPN route
distinguisher attribute is associated with it.
Answer: B
Question 23
ip flow-export version 9
Ethernet1/1
ip flow ingress
Ethernet1/2
ip flow ingress
failures
It was noticed that after NetFlow is configured in the router, the collector stopped receiving
flow information. Which action resolves the issue?
Answer: A
Explanation
This question stated that “after NetFlow is configured, the collector stopped receiving flow
information”. It means the router used to reach the collector -> Answer B is not correct.
We don’t know anything about Loopback1 interface so we should not change the source
from loopback2 to loopback1 -> Answer C is not correct.
The command “ip flow egress” is used to count traffic out of an interface. This command
cannot be the issue -> Answer D is not correct.
-> Only answer A is left.
From the line “Sourced(1) 172.16.1.1 (Unknown)”, we learn that loopback2 interface was
configured with IP 172.16.1.1. But it seems this interface no longer exists.
We also tried to recreate this error by removing the configured Loopback0 interface as
shown below and we got the same error output:
Question 24
Answer: B
Explanation
LDP enables peer label switch routers (LSRs) in an MPLS network to exchange label binding
information for supporting hop-by-hop forwarding in an MPLS network.
Question 25
Router R1:
router ospf 1
Router R2:
router ospf 2
R1 should receive 10.16.2.0/24 from R2. Which action resolves the issue?
Answer: C
Explanation
The command “area area-number filter-list prefix … in“: Prevent prefixes from entering this
area (in keyword here means “into”)
The command “area area-number filter-list prefix … out“: Prevent other areas that the ABR
is connected to receive the prefix.
Therefore in this question both R2 and R1 must allow 10.16.2.0/24 prefix so that R1 can
receive this prefix.
Current R1 configuration allows this prefix (with “permit 0.0.0.0/0”) so we don’t need to
change anything on R1. Only modification on R2 should be made. Between /22 and /23
surely /22 is the better choice as it covers wider range. But if you are careful then you can
calculate that 10.16.0.0/23 ranges from 10.16.0.0 to 10.16.1.255 which does not cover our
10.16.2.0 prefix while 10.16.0.0/22 ranges from 10.16.0.0 to 10.16.3.255 -> Answer C is
correct.
Question 26
Answer: C
Question 27
A. Configure the eigrp stub leak-map command under the EIGRP process on R1.
B. Configure the summary-address 192.168.0.0 255.255.0.0 100 command on R3.
C. Configure the eigrp stub command under the EIGRP process on R3.
D. Configure the eigrp stub command under the EIGRP process on R2.
Answer: C
Explanation
EIGRP stub automatically prevents suboptimal transit routing so it can help us in this
question. When R3 is configured with “eigrp stub” command, it only advertises directly
connected routes. Networks learned from R1 or R2 will not be advertised.
Question 28
Answer: D
Explanation
Suppose all the parameters are in default values. Let’s see what happened:
We need to configure OSPF AD to a higher value than 170 so that R3 chooses the EIGRP path
-> Answer D is correct.
Below lists the Administrative Distances of popular routing protocols for your reference:
Question 29
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
To limit access to the SNMP server, we can use ACL in the “snmp-server community”
command. The syntax is:
Question 30
Which collection contains the resources to obtain a list of fabric nodes through the vManage
API?
A. device management
B. administration
C. monitoring
D. device inventory
Answer: D
Explanation
The Cisco SD-WAN vManage API is a REST API for controlling, configuring, and monitoring
Cisco devices in an SD-WAN overlay network spanning multiple data centers. The API can be
used for equipment health monitoring, device configuration, such as attaching templates to
devices, device statistics queries, and access to alerts.
vManage APIs are grouped into different resource collections: Device Action, Device
Inventory, Configuration, Certificate Management, Administration, Monitoring, Real-Time
Monitoring
To display all devices in the overlay network that are connected to the vManage instance,
we use:
GET https://{vmanage-ip-address}/dataservice/device
Question 31
Answer: B
Explanation
After the redistribution, OSPF is preferred over External EIGRP (AD 170) and RIP (AD 120)
because it has lowest AD (110). Therefore, R1 sees R2 as the next hop while R2 sees R1 as
the next-hop for the route to 192.168.200.0.
then R2 will see 192.168.200.0/24 as an external OSPF route. Therefore R2 will ignore this
prefix which is advertised from EIGRP as OSPF route has a lower AD value than External
EIGRP route (please read this Cisco article for more detail). So R2 cannot advertise to R1
about this prefix any more -> No more routing loop.
Question 32
Answer: B
Explanation
From the last line of the debug output “Using server UNKNOWN”, we learn that the IP
address of the TACACS server is missing. The “show run” output at the right side also
confirms this as no IP address was configured under “tacacs server DC1_TACACS”. From the
figure we see the correct IP address of the TACACS server is 10.66.66.66, not 10.60.66.66.
Question 33
When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits
and is causing unnecessary traffic to pass through the interface. Which command must be
configured to resolve the issue?
A. access-class INTERNET in
B. ipv6 traffic-filter INTERNET in
C. ip access-group INTERNET in
D. ipv6 access-class INTERNET in
Answer: B
Explanation
The command “ipv6 access-class ipv6-access-list-name {in| out}” is used to apply ACL to line
interface.
Note: The command “ipv6 traffic-filter access-list-name { in | out }” to apply the access list
to incoming or outgoing traffic on the interface.
In this question we have to apply ACL to interface so we have to use the “ipv6 traffic-filter …”
command.
Question 34
Refer to the exhibit.
R1#sh run | begin router eigrp 100 R2#sh run | begin router eigrp 100
! !
redistribute eigrp 100 subnets redistribute eigrp 100 metric 100 subnets
! !
ip forward-protocol nd ip forward-protocol nd
! !
R6#
An engineer is troubleshooting suboptimal communication from the 192.168.5.32/28 subnet
to the 172.16.3.16/28 segment using the slowest links. Which configuration resolves the
suboptimal routing issue?
A. R2(config-router)#router ospf 1
R2(config-router)#default-metric 10
R1(config-router)#router ospf 1
R1(config-router)#default-metric 1
B. R2(config-router)#router ospf 1
R2(config-router)#default-metric 1
R1(config-router)#router ospf 1
R1(config-router)#default-metric 10
Answer: B
Explanation
Question 35
Protocol
down down
up
up
up
R3#
no ip http server
no ip http secure-server
ip tftp source-interface GigabitEthernet0/3
line con 0
line aux 0
line vty 0 4
login
R4#sh run
hostname R4
ip cef
interface GigabitEthernet0/0
ip access-group 120 in
interface GigabitEthernet0/1
The engineer is trying to transfer the new IOS file to the router R3 but is getting an error.
Which configuration achieves the file transfer?
Explanation
In this question we use TFTP to transfer file so we must allow UDP, not TCP. And the source
IP should be 172.16.1.17 (R3) because R3 has been configured with command “ip tftp
source-interface GigabitEthernet0/3” so it will use Gi0/3 IP address 172.16.1.17 as the
source address. The destination IP should be 172.16.2.19 (TFTP server).
Maybe the author forgot the ACL 120 should be removed totally first as there is no correct
answer when the ACL statement “access-list 120 deny udp any any eq tftp” is proceeded
before other statements. When we type new ACL statements, they will be appended to the
existing ACL statements.
But we have to choose one best answer. So the answer C is the best choice as it used correct
source address 172.16.1.17 and UDP, not TCP.
Question 36
A network engineer must configure an EIGRP stub router at a site that advertises only
connected and summary routes. Which configuration performs this task?
Answer: D
Explanation
The “eigrp stub” command advertises directly connected routes and summary routes by
default.
Question 37
---------------------------------------------------------------
ip sla 1
R101#
Jitter on the link between R101 and R201 was tested for voice traffic over port 16384
without the control communication on port 1967. Which command enables R201 to receive
RTT for the configured IP SLA?
A. ip sla responder tcp-connect port 1967
B. ip sla responder auto-register 1.1.1.1
C. ip sla responder udp-echo ipaddress 2.2.2.2 port 16384
D. ip sla responder udp-echo ipaddress 1.1.1.1 port 16384
Answer: C
Explanation
In the configuration of R101, we see the command “udp-jitter 2.2.2.2 16384 control
disable codec g711ulaw” was configured. The control disable keyword is used to send the
testing traffic without attempting the default control communication on UDP 1967. It will
use port 16384 instead as indicated in the above command.
But R201 was not configured as an IP SLA Responder so it rejected the connection and the
SLA test failed as shown in the output of “sh ip sla summary” command.
-> Therefore on R201 we must use the destination IP address of 2.2.2.2 and destination port
of 16384 to match with the configuration of R101 -> Answer C is correct.
Note: The IP address in the command “ip sla responder … ipaddress {ip-address} port {port-
number}” is only used to manually specify which IP address and Ports you mean for the
Responder to listen on. Therefore, the IP address used in this command should belong to the
local router.
Question 38
ip http server
ip http access-class 20
no ip http secure-server
ip http max-connections 2
end
Which configuration allows the operation level 1 team of 10 engineers to log in at least three
at a time to router R3 using network credentials over HTTP?
Question 39
During an unannounced link-maintenance window at the ISP, the DCI link went down, which
caused a significant service outage. What action must the network engineer take at the head
office to ensure Area-0 connectivity without intervention from the ISP?
Answer: B
Explanation
Question 40
A PC at a new branch office can access the IPv4 network from the head office and internet
segments, and it can reach the IPv6 App and DB servers in the head office as well. However,
the PC cannot reach IPv6 hosts on the internet segment. A network engineer observed that
the branch is not learning the internet IPv6 route via OSPF. Which two actions must the
engineer take to resolve the issue? (Choose two)
A. Add a default IPv6 static route on the branch router toward the head office router
B. Advertise the default-information originate command under the OSPFv3 IPv6 address-
family instance
C. Advertise the default-information originate command under the OSPFv3 routing instance
D. Add a default IPv6 static route on the head office router toward the internet
E. Redistribute the default IPv6 default static route into the OSPF routing protocol
Answer: A C
Explanation
To generate a default external route into an Open Shortest Path First (OSPF) for IPv6 routing
domain, use the default-information originate command in router configuration mode.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/command/ipv6-cr-
book/ipv6-d2.html
In this question, we need to use both options so that the solution can work. Or we can use a
single command “default-information originate always” instead.
Question 41
R1
match as-path 1
R1#show ip bgp
An engineer must filter prefixes that originate from AS65412. but it is not working correctly.
Which configuration must the engineer apply to R1 to resolve the issue?
B. no ip as-path access-list 1
ip as-path access-list 1 deny 65412_
ip as-path access-list 1 permit .*
C. no ip as-path access-list 1
ip as-path access-list 1 deny _65412$
ip as-path access-list 1 permit .*
D. route-map FILTER permit 10
match as-path 1
route-map FILTER permit 20
Answer: C
Explanation
This question wants to test your knowledge of regular expression in BGP AS-PATH. Here is a
quick guide to regular expression:
Modifier Purpose
But notice that “$ indicates the end of a string” means “the beginning of the AS PATH” (as
the AS PATHs are filled from right to left) so the command “ip as-path access-list 1 deny
_65412$” means “deny any route that originates from AS 65412”.
Expressio Meaning
n
.* Anything
A good example of BGP AS PATH regular expression that is same as this question can be
found at https://cs7networks.co.uk/2019/11/26/cisco-bgp-as-path-regex/
Question 42
ip sla 2
icmp-echo 10.1.1.1
timeout 3000
threshold 1000
frequency 5
The default route from R1 must be withdrawn from the routing table if R1 cannot ping
10.1.1.1, but it is not working correctly .Which configuration resolves the issue?
Option A Option B
ip sla 2 ip sla 2
frequency 5 frequency 5
! !
Option C Option D
ip sla 2 ip sla 2
frequency 5 frequency 5
! !
ip sla schedule 2 life forever start-time now ip sla schedule 2 life forever start-time now
! !
! !
ip route 0.0.0.0 0.0.0.0 10.1 1.1 track 2 250 ip route 0.0.0.0 0.0.0.0 10.1.1.1
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
Surely the answer must include the commands “ip sla schedule 2 life forever start-time now”
to start the tracking and the command “ip route 0.0.0.0 0.0.0.0 10.1 1.1 track 2” so Option B
and Option D are not correct.
Option C is not correct as it defined the track object 2 which wrongly tracks the IP SLA 200,
not IP SLA 2.
Question 43
An engineer is configuring an NHRP client router to advertise NBMA addresses that are valid
for 20 minutes to clients. Which configuration must the engineer apply to interface
gigabitethernet0/0/1 to meet the requirement?
Answer: A
Explanation
The “ip nhrp holdtime seconds” command changes the number of seconds that NHRP NBMA
addresses are advertised as valid in positive NHRP responses.. The default is to send NHRP
registrations every one-third the NHRP holdtime value (default = 2400 seconds (40
minutes)).
The optional “ip nhrp registration timeout value” command can be used to set the interval
for sending NHRP registration requests independently from the NHRP holdtime. Changes the
interval that NHRP NHCs send NHRP registration requests to configured NHRP NHSs.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nhrp/
configuration/xe-3s/nhrp-xe-3s-book/config-nhrp.html
Question 44
R1
no synchronization
bgp log-neighbor-changes
no auto-summary
Last read 00:00:00, last write 00:00:00, hold time is 180, keepalive interval is
60 seconds
!
For address family: IPv4 Unicast
The BGP neighbor is not coming up. Which action resolves the issue?
Answer: A
Explanation
With eBGP peering, by default the TTL value of BGP messages is 1 so the BGP neighbor
relationship can only be built on two physical interfaces in the same network. If we want to
change the source IP address of the BGP messages to a loopback interface then we also need
to increase the TTL value to at least 2 so that the BGP messages can reach the BGP peer. The
full required command in this question is “neighbor 192.168.200.6 ebgp-multihop 2”.
Question 45
Router#show logging
filtering disabled
filtering disabled
filtering disabled
link up)
filtering disabled
A network engineer notices that the syslog server has high utilization due to the high
number of log messages received from the network devices. This high volume of log
messages also makes it difficult to identify the important logs. Which configuration resolves
the issue?
Answer: D
Question 46
The EIGRP neighborship between the routers is up. However, the app servers are
unreachable from the client PC. Which action must the engineer take to resolve the issue?
A. Configure the default network 10.1.2.0 0.0.0.255 command in the EIGRP protocol on R2
only
B. Configure the network 10.1.1.0 command in the EIGRP protocol on R1 only
C. Configure the no auto-summary command in the EIGRP protocol on both routers
D. Configure the neighbor 10.1.2.0 FastEthernet 0/0 command in the EIGRP protocol on R2
only
Answer: C
Explanation
Question 47
Answer: D
Explanation
Normally LDP neighbors are found automatically by sending UDP Hello packets on Port 646
with the destination of multicast address 224.0.0.2 out of each LDP enabled interface.
Reference: https://networkers-online.com/p/what-is-ldp-extended-discovery
Question 48
threshold 1000
timeout 1000
frequency 10
ip sla 2
threshold 1000
timeout 1000
frequency 10
----------------------------------------------------------------
While troubleshooting an issue on the network, an engineer notices that a TCP Connect
operation failed on port 3000 between R101 and R201. Which command must be configured
on R201 to respond to the R101 IP SLA configurations with a control connection on UDP port
1967?
Answer: D
Explanation
In this question we use the default UDP port 1967 as requested -> Answer D is correct.
Question 49
D. interface GigabitEthernet0/0
ip access-group R2WAN out
Answer: B
Explanation
BOOTP is implemented using the User Datagram Protocol (UDP) for transport. Port number
67 is used by the server for receiving client requests, and port number 68 is used by the
client for receiving server responses.
In this question, the ACL is applied on the client side so it must allow DHCP messages sent
from DHCP server to DHCP client (port 68).
Question 50
R2#show ip protocols
Neighbor(s):
Address
10.10.10.2
10.10.20.3
Maximum path: 1
The 130.130.130.0/24 route shows in the R2 routing table but is getting filtering toward R3.
Which action resolves the issue?
Explanation
From the line “IGP synchronization is enabled” we learn that BGP synchronization is enabled.
BGP synchronization is an old rule from the days when we didn’t run IBGP on all routers
within a transit AS. In short, BGP will not advertise something that it learns from an IBGP
neighbor to an EBGP neighbor if the prefix can’t be validated in its IGP.
Question 51
What are the two major components of an MPLS-based VPN? (Choose two.)
Answer: A D
Explanation
A Multiprotocol Label Switching (MPLS)-based virtual private network (VPN) has three major
components:
+ VPN route target communities – A VPN route target community is a list of all members of
a VPN community. VPN route targets need to be configured for each VPN community
member.
+ Multiprotocol BGP (MP-BGP) peering of VPN community provider edge (PE) devices –
MP-BGP propagates virtual routing and forwarding (VRF) reachability information to all
members of a VPN community. MP-BGP peering must be configured on all PE devices within
a VPN community.
+ MPLS forwarding – MPLS transports all traffic between all VPN community members
across a VPN service-provider network.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/
release/17-3/configuration_guide/mpls/b_173_mpls_9500_cg/
configuring_mpls_layer_3_vpn.html
Question 52
R1 is not forming adjacency on a point-to-point interface. Which action resolves the issue?
Answer: D
Question 53
Answer: C
Explanation
Under the track object, you can specify delays so we have to configure delay under “track
700 ip sla 700” (not under “ip sla 700”).
delay down 30: “wait 30 seconds before switching traffic to a secondary connection”
up 20: “then revert to the primary link after waiting 20 seconds”
We should choose the answer with “down 30 up 20” than “down 20 up 30” as we should
prefer the primary link and only change to backup link after 30 seconds (rather than 20
seconds only).
Question 54
ip sla 10
icmp-echo 10.1.1.10
timeout 2000
threshold 2000
frequency 40
An engineer configured IP SLA to monitor a next hop on a router for reachability. When the
next hop is unreachable, the router is executing tracking and failing over another route, but
packet loss is experienced because the reachability is flapping. Which action resolves the
issue?
Answer: C
Question 55
Which Layer 3 VPN attribute allows different customers to connect to the same MPLS
network with overlapping IP ranges?
A. VRF
B. RT
C. MP-BGP
D. RD
Answer: D
Explanation
The Route Distinguisher (RD) is to make sure that all prefixes are unique. The customer
prefix + RD together are a VPNv4 route.
Question 56
Answer: D
Explanation
Unlike other dynamic routing protocols like OSPF, EIGRP…, with BGP we must declare the
correct subnet mask so that the prefix is installed into the routing table.
Question 57
Answer: D
Explanation
The Label Distribution Protocol (LDP) plays a crucial role in MPLS networks. Its primary
function is to distribute labels used for forwarding packets along Label Switched Paths (LSPs)
within an MPLS network. Here’s a breakdown of its role:
1. Label Distribution: LDP is responsible for distributing labels across the MPLS network.
When an LSR (Label Switching Router) needs to establish an LSP to forward packets for a
particular FEC (Forwarding Equivalence Class), it communicates with neighboring LSRs to
exchange label information.
2. Label Assignment: LDP assigns a unique label to each FEC. This label is used by routers in
the network to forward packets along the correct LSP. The assigned label is distributed to all
LSRs participating in the MPLS network, ensuring consistent forwarding behavior.
3. Label Mapping: LDP maintains a mapping table that associates FECs with corresponding
labels. This mapping information is crucial for LSRs to make forwarding decisions based on
the labels received in incoming packets.
4. Label Retention: LDP ensures that all routers in the MPLS network retain the label
mappings received from neighboring routers. This retention allows routers to efficiently
forward packets based on the labels without needing to repeatedly request label mappings.
5. Label Withdrawal: LDP provides mechanisms for withdrawing label mappings when they
are no longer needed or when network conditions change. This ensures that routers do not
use outdated label mappings for forwarding packets.
Question 58
Which two reasons would cause an LSP to break between two PE routers? (Choose two)
Answer: A D
Explanation
There are various reasons that the LSP fails to come up, as follows:
+ Configuration errors and implementation issues.
+ When an LDP hello adjacency or an LDP session with a peer is lost due to some error while
the IGP still points to that peer. IP forwarding of traffic continues on the IGP link associated
with the LDP peer rather than being shifted to another IGP link with which LDP is
synchronized -> Answer A is correct.
…
Reference: https://www.juniper.net/documentation/us/en/software/junos/is-is/topics/
concept/ldp-igp-synchronization.html
If label bindings are received from a downstream neighbor for prefixes (including subnet
mask) which do not appear in a router’s routing and CEF tables, these bindings will not be
used. In a similar manner, if a router advertises labels for a subnet/subnet mask pair, which
do not correspond to the routing updates also advertised by this router for the same
subnet/subnet mask pair, these labels will not be used by upstream neighbors and the Label
Switched Path (LSP) between these devices will fail. -> Answer D is correct.
Reference: https://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-
mpls/mpls/23565-troubleshoot-mpls-vpn.html
Question 59
A. unidirectional tunnel
B. secured bidirectional tunnel
C. hop-by-hop tunnel
D. bidirectional tunnel
Answer: A
Explanation
MPLS tunnels are unidirectional, which means we need one tunnel in each direction to send
traffic.
Question 60
What is the function of penultimate hop popping?
A. The last P router in the path pops off the transport label before traffic is forwarded
toward the PE.
B. The second to last P router in the path pops off the VPN label before traffic is forwarded
to the last P router.
C. The transport label is popped off at the egress LSR, and unlabeled traffic is forwarded
toward the CE.
D. The VPN label is popped off at the egress LSR, and unlabeled traffic is forwarded toward
the CE.
Answer: A
Explanation
PHP is penultimate hop popping which means remove the label one hop before its
destination. It refers to the process whereby the outermost label of an MPLS tagged packet
is removed by a Label Switch Router (LSR) before the packet is passed to an adjacent Label
Edge Router.
A. 3 seconds
B. 2 seconds
C. 1 second
D. less than a second
Answer: D
Explanation
Question 62
A. Add ipv6 dhcp server MY_POOL under the interface ethernet 0/0 on R1.
B. Remove FE80::A8BB:CCFF:FE00:5000 assigned by the IPv6 DHCP server.
C. Add ipv6 dhcp server MY_POOL under the interface ethernet 0/0 on H1.
D. Configure FF02::1:2 to discover all IPv6 DHCP clients.
Answer: A
Explanation
We need to add the command “ipv6 dhcp server …” to tell the interface which pool it needs
to use.
A. router ospf 1
redistribute rip metric 16
B. router rip
redistribute ospf 1 metric 14
C. router ospf 1
redistribute rip metric 14
D. router rip
redistribute ospf 1 metric 16
Answer: B
Explanation
From the “show run” output of R1, we see that OSPF is redistributed into RIP with metric of
15 (with command “redistribute ospf 1 metric 15”). This is the maximum usable metric for
RIP. RIP will discard any route with metric with 16 or higher. Therefore we can see R3 still
received redistributed routes from OSPF while R4 did not receive any routes because the
metric now is 16.
Therefore we need to lower metric value when redistributing from OSPF to RIP.
Question 64
Option A Option B
R2 R2
Option C Option D
R1 R1
default-information originate
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
OSPF prefers E1 routes over E2 routes so R1 will be preferred when we redistribute static
routes with “metric-type 1” -> Option C is correct.
Option A & Option D are not correct as they make R2 have smaller metric than R1.
Option B is not correct as tagging a route does not affect the routing decision.
Question 65
Which IPv6 security feature blocks all traffic from an IPv6 host when initially connecting to a
switch port except for traffic to gain an IPv6 address and discover IPv6 neighbors?
A. IPv6 RA Guard
B. IPv6 DHCP Guard
C. IPv6 Source Guard
D. IPv6 Destination Guard
Answer: C
Explanation
IPv6 Source Guard (SG) is a security feature that filters the IPv6 traffic on Layer 2 ports that
are not trusted. SG helps a switch or router deny access to traffic from an address that is not
stored in the binding table of the IPv6 Snooping feature.
Initially, SG blocks all IPv6 traffic on the target except for Dynamic Host Configuration
Protocol (DHCP) or Neighbor Discovery Protocol (NDP) packets that are used for IPv6
Snooping processes.
Reference: https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/15S/configuration/
guide/7600_15_0s_book/IPv6_Security.html
Question 66
Refer to the exhibit.
An IPv6 ACL is applied to restrict PC1 from communicating with PC2 and allow all other
traffic. Which configuration resolves the issue?
A. R3(config-ipv6-acl)#no sequence 20
R3(config-ipv6-acl)#deny ipv6 host 2001:DB8:0:10::3B host 2001:DB8:A:A::19 sequence 10
B. R3(ccnfig-ipv6-acl)#no sequence 30
R3(config-ipv6-acl)#deny ipv6 host 2001:DB8:0:10::3B host 2001:DB8:A:A::19 sequence 10
C. R3(config-lpv6-acl)#no sequence 20
R3(config-ipv6-acl)#deny ipv6 host 2001:DB8:0:10::3B any sequence 10
D. R3(config-ipv6-acl)#no sequence 30
R3(config-ipv6-acl)#deny ipv6 host 2001:DB8:0:10::3B any sequence 10
Answer: B
Question 67
Option A Option B
R19# R19#
R6# R6#
Option C Option D
R19# R19#
R6# R6#
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
“accept only type 1, 2, and 3 LSAs” means stub area -> Option B and Option D are not
correct.
To configure a stub area, you need to enter the “area {area-id} stub” command on the ABR
and all routers internal to that area -> Only Option A is correct.
Question 68
Which tag is used by the PE router to forward the packet to the correct customer?
A. extended-community
B. RD
C. RT
D. VNI
Answer: B
Question 69
Answer: A
Explanation
IPv6 Source Guard (SG) is a security feature that filters the IPv6 traffic on Layer 2 ports that
are not trusted. SG helps a switch or router deny access to traffic from an address that is not
stored in the binding table of the IPv6 Snooping feature.
Initially, SG blocks all IPv6 traffic on the target except for Dynamic Host Configuration
Protocol (DHCP) or Neighbor Discovery Protocol (NDP) packets that are used for IPv6
Snooping processes.
Reference: https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/15S/configuration/
guide/7600_15_0s_book/IPv6_Security.html
Question 70
R1
!
ip dhcp pool Branch 2
default-router 192.168.40.1
dns-server 192.168.1.40
Branch 2 hosts cannot receive dynamic IP addresses. Which action resolves the issue?
A. Configure the ip helper command on the interface GigabitEthernet 0/2 of the R2 router.
B. Configure the ip helper command on the interface GigabitEthernet 0/0 of the DHCP
router.
C. Configure the ip helper command on the Layer 2 switch SW2 interfaces.
D. Configure the ip helper command on the interface GigabitEthernet 0/2 of the DHCP
router.
Answer: A
Question 71
SW3#sh run
interface GigabitEthernet0/0
interface Vlan5
ip address 10.5.5.1 255.255.255.0
interface Vlan6
end
*Feb 10 00:34:30.979: DHCP_SNOOPING_SW: bridge packet send packet to cpu port: Vlan5
*Feb 10 00:36:16.244: DHCP_SNOOPING_SW: bridge packet send packet to cpu port: Vlan6
HostA and HostB cannot receive IP addresses from the DHCP server. The switches are
configured with the DHCP snooping. Which configuration on SW3 resolves the issue?
Answer: D
Explanation
Not sure why the command “no ip dhcp snooping information option” (which is used to turn
off DHCP Option 82) can solve this issue but the owner of the same question in this Cisco
forum link confirmed it can solve his problem.
Question 72
Drag and drop the terminology from the left onto the corresponding definitions on the right.
Answer:
+ set of packets with similar characteristics that might be bound to the same MPLS label:
Forwarding Equivalence Class (FEC)
+ data-carrying mechanism that is independent of any data link layer protocol: Multiprotocol
Label Switching (MPLS)
+ router that functions as the ingress and/or egress router to the MPLS domain: Provider
Edge (PE)
+ route through an MPLS network, defined by a signaling protocol such as LDP or BGP: Label
Switched Path (LSP)
+ mechanism by which two routers exchange label mapping information: Label Distribution
Protocol (LDP)
Explanation
Reference: https://www.vc4.com/blog/unpacking-mpls-a-technical-overview-of-multi-
protocol-label-switching/
Label Distribution Protocol (LDP) —A mechanism by which two Label Switch Routers (LSR)
exchange label mapping information. This protocol is defined by the IETF ( RFC 5036).
Provider Edge (PE) —The LER that functions as the ingress and/or egress routers to the MPLS
domain.
Label Switched Path (LSP) —A route through an MPLS network, defined by a signaling
protocol such as LDP or the Border Gateway Protocol (BGP). The path is set up based on
criteria in the forwarding equivalence class (FEC).
Forwarding Equivalence Class (FEC) —A set of packets with similar characteristics that might
be bound to the same MPLS label. An FEC tends to correspond to a label switched path (LSP);
however, an LSP might be used for multiple FECs.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/nx-os/mpls/
configuration/guide/mpls_cg/mp_mpls_overview.html
Question 73
Users report web connectivity problems on the server (10.1.1.10). Which IP SLA
configuration captures the failure details through the network to resolve the issue?
Option A Option B
ip sla 5 ip sla 5
frequency 60 frequency 60
Option C Option D
ip sla 5 ip sla 5
frequency 1 frequency 1
timeout 3 timeout 3
Answer: A
Question 74
router ospf 1
The default route is not advertised to the neighboring router. Which action resolves the
issue?
A. Configure the network 0.0.0.0 255.255.255.255 area 0 command under OSPF
B. Configure the default-information originate command under OSPF
C. Configure the redistribute static metric 200 subnets command under OSPF
D. Configure OSPF on the Dialer0 interface
Answer: B
Question 75
Answer: B E
Question 76
Drag and drop the IPv6 first hop security device roles from the left onto the corresponding
descriptions on the right.
Answer:
+ Receives valid and rogue router advertisements and all router solicitation: monitor
+ Receives router solicitation and sends router advertisements: router
+ Receives router advertisements from valid routers, and no router solicitation are received:
host
+ Received router advertisements are trusted and are flooded to synchronize states: switch
Explanation
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2022/pdf/
BRKENT-3002.pdf
Question 77
*Mar 10 20:13:58.156: TAC+:: received bad AUTHEN packet: length = 6, expected 43974
An engineer must troubleshoot an issue affecting the communication from router R2 to the
TACACS server. Which configuration resolves the issue?
Answer: B
Explanation
From the last line of the output “Invalid AUTHEN packet (check keys)”, we can deduce the
key is not matched. So we need to change the key on R2.
Question 78
A. snmp-server tftp-server-list 66
B. copy running-config tftp://10.66.66.66/r1-confg
C. snmp-server tftp server-list 20
D. copy running-config tftp://10.66.66.66/c: r1-confg
Answer: A
Explanation
ACL 20 in the statement “snmp-server tftp-server-list 20” is blocking the SNMP server so we
should change to ACL 66.
Question 79
R1(config-if)#description ISP1
R1(config-if)#ip verify unicast source reachable-via any allow-default
R1(config-if)#description ISP2
R1 is multihomed to ISP1 and ISP2. uRPF strict mode has been configured on both interfaces
uplinked to the ISPs. Traffic destined to the Internet over ISP1 returns to R1 via ISP2 and is
immediately dropped.
Which configuration changes address this issue and allow return traffic from the other ISP?
Answer: B
Explanation
Unicast Reverse Path Forwarding (uRPF) examines the source IP address of incoming
packets. If it matches with the interface used to reach this source IP then the packets are
allowed to enter (strict mode).
The syntax of configuring uRPF in interface mode is:
The any option enables a Loose Mode uRPF on the router. This mode allows the router to
reach the source address via any interface.
The rx option enables a Strict Mode uRPF on the router. This mode ensures that the router
reaches the source address only via the interface on which the packet was receive.
Therefore in this question, we need to change uRPF from strict mode to loose mode on
interface fa0/1. And maybe R1 sends traffic to ISP2 by default route then we should include
the keyword “allow-default”.
Note: To allow return traffic back via the default route from any IP address, use the “allow-
default” keyword.
Question 80
Answer: D
Explanation
IPv6 snooping allows network devices to identify and inspect RA messages sent by devices
on the network. Therefore IPv6 RA Guard relies on IPv6 snooping to function correctly. Once
RA messages are identified via snooping, IPv6 RA Guard applies policies to allow or block
these messages based on configured rules.
Question 81
R3#
3 * * * !
ip forward-protocol nd
no ip http server
no ip http secure-server
match ip address 10
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
From the output of R4, we notice that R4 is redistributing a static route for the destination
172.16.2.48/28 with the command “ip route 172.16.2.48 255.255.255.240 172.16.2.34”. This
subnet is same as the “Outside EIGRP Routes 172.16.2.48/28” from R2 so we need to block
the advertisement from R4 for this subnet.
On R4, this subnet is set with tag 200 so we can use a route-map to “deny” when we see this
tag -> Option B is correct.
Option A is not correct as “match route-type level-2” is used for OSPF type 2 only (O E2) but
this route is External EIGRP (D EX)
Option C is not correct as it only permits 172.16.2.48/28 from R4 with tag 200.
Option D is not correct as it only permits “internal” route while our route is external (D EX).
Question 82
Option A Option B
router ospfv3 1
router-id 1.1.1.1
exit-address-family
Option C Option D
interface Serial0/0/0
router-id 1.1.1.1
exit-address-family
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
From the output of “sh ospfv3 interface brief”, we notice that OSPFv3 was only enabled on
S0/0/1, not S0/0/0 so we have to turn on OSPFv3 on S0/0/1 -> Option C is not correct as it
only enabled IPv6 on S0/0/0.
In three Options left, Option B is the best choice as it enables OSPFv3 on both Gi0/0/0 &
S0/0/0.
Option A only enables OSPFv3 on S0/0/0 while Option D only enables OSPFv3 on S0/0/0.
Question 83
Answer: B E
Explanation
There are several advantages to implementing BFD over reduced timer mechanisms for
routing protocols:
+ BFD on the CPU operates under interrupt like CEF switched traffic. EIGRP, IS-IS and OSPF
protocol hellos are handled in the process switching path. This provides BFD greater
scalability and reliability over protocol hellos. (-> Answer B and answer E are correct)
+ Although reducing the EIGRP, IS-IS, and OSPF timers can result in minimum detection timer
of one to two seconds, BFD can provide failure detection in less than one second.
+ Because BFD is not tied to any particular routing protocol, it can be used as a generic and
consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.
+ Because some parts of BFD can be distributed to the data plane, it can be less CPU-
intensive (-> Answer A is not correct) than the reduced EIGRP, IS-IS, and OSPF timers, which
exist wholly at the control plane.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bfd/
configuration/xe-3s/irb-xe-3s-book/irb-bi-fwd-det.html
Question 84
R1
interface loopback1
no ip address
ipv6 enable
interface loopback2
no ip address
ipv6 enable
ipv6 ospf 1 area 0
interface GigabitEthernet0/0
no ip address
ipv6 enable
Routers R1 and R2 exchange routes to each other’s loopback through OSPF. Telnet traffic
must be blocked from R2 Lo0 to R1 Lo2. Which configuration resolves the issue?
Option A Option B
R1 R1
no ip address no ip address
! !
no ip address no ip address
! !
no ip address no ip address
Option C Option D
R1 R1
no ip address no ip address
ipv6 address 100A:0:100C::1/64 ipv6 address 100A:0:100C::1/64
! !
no ip address no ip address
interface GigabitEthernet0/0 !
! !
sequence 20 deny tcp host 100B:1:310B::1 sequence 20 deny tcp host 100B:1:310B::1
host 200A:0:210C::1 eq telnet host 200A:0:210C::1 eq telnet
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
In order to assign an IPv6 ACL to an interface, use this command in interface configuration
mode: ipv6 traffic-filter access-list-name {in | out}
IPv6 ACLs are applied to lines using the command ipv6 access-class.
Option A is not correct as the IPv6 access-list DENY_TELNET_Lo2 is not applied to any
interface.
Option C and Option D are not correct as the “ipv6 access-class” command cannot be
applied to an interface. It can only be applied to a line (console, vty…).
Question 85
After an engineer configured a new Cisco router as a DHCP server, users reported two
primary issues:
+ Devices in the HR subnet have intermittent connectivity problems.
+ Workstations in the LEGAL subnet cannot obtain IP addresses.
Which configurations must the engineer apply to ROUTER_1 to restore connectivity for the
affected devices?
Option A Option B
! !
Option C Option D
! !
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
Option A is not correct as it did not exclude any IP addresses in HR department. Therefore
the IP addresses of the default gateway of this subnet (192.168.5.10) can be assigned to a
user, which may cause intermittent connectivity problems.
Option D is not correct as the command “ip helper-address 192.168.93.100” is using wrong
IP address. It should be 192.168.39.100 instead (but we are not sure if it is only a typo).
Moreover the command “ip dhcp excluded-address 192.168.5.1 192.168.5.1” could not
cover 192.168.5.10, which is the default gateway of this subnet.
Question 86
An engineer must configure encrypted packets for a single router OSPF neighborship. Which
configuration meets this requirement?
Option A Option B
Option C Option D
interface Ethernet0/2
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
Router(config)#int fa0/0
Router(config-if)#ip ospf authentication message-digest
Router(config-if)#ip ospf message-digest-key 1 md5 networktut@123
2) Area authentication: Authentication for area can enable using “area {area-number}
authentication” command. For example:
Router(config)#interface fa0/0
Router(config-if)#ip ospf message-digest-key 1 md5 networktut@123 // “1” here is the key
number
Router(config-if)#exit
Router(config)#router ospf 100
Router(config-router)#area 2 authentication message-digest
Question 87
R6#sh ip bgp
t secondary path,
bgp log-neighbor-changes
R6#
Customer B has decided not to receive any routes from R1 that originated outside the AS
100. Which AS path access list must the engineer choose to meet this requirement?
Answer: B
Explanation
This question wants to test your knowledge of regular expression in BGP AS-PATH. Here is a
quick guide to regular expression:
Modifier Purpose
But notice that “$ indicates the end of a string” means “the beginning of the AS PATH” (as
the AS PATHs are filled from right to left) so the command “ip as-path access-list 1 permit
_100$” means “permit any route that ends with AS 100”.
+ The command “ip as-path access-list 1 permit _100$” permits AS paths that end with the
AS 100, where 100 is the last AS in the path.
+ The command “ip as-path access-list 1 permit ^100$” permits AS paths that contain only
the AS number 100 (originated in AS 100)
!
router bgp 600
match as-path 1
Question 88
R4
end
---------------------------------------------------------
R4#show clock
R4#debug ip packet
IP packet debugging is on
Access List(44), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2d21h: IP: s=10.2.2.1 (Ethernet0/1), d=224.0.0.5, len 80, input feature,
packet consumed, MCI Check(101), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk
FALSE
An engineer is troubleshooting an issue using the debug ip packet command and notices
that no time stamps are shown on R4 to establish the event time. Which configuration
resolves this issue by showing time stamps regardless of the time zone in R4 logs?
Answer: A
Explanation
This is a debug message, not a logging message so we must use “service timestamps debug
…” command. And we don’t want to include to local time of R4 so we don’t use “localtime”
keyword here.
The command service timestamps debug datetime msec show-timezone configures the
format of the timestamp that is included in debug messages. Here’s a detailed breakdown of
what each part of the command does:
+ service timestamps debug: specifies that timestamps should be included in debug output.
+ datetime: indicates that the timestamp should include the date and time.
+ msec: specifies that the timestamp should include milliseconds for precise timing
information.
+ show-timezone: indicates that the timestamp should include the timezone information.
Question 89
Refer to the exhibit.
The engineer is reviewing the logs on the DENVER router and notices that this error message
repeats constantly:
Answer: B
Explanation
Peering succeeds only if both routers are configured for authentication and have the same
password. If a router has a password configured for a neighbor, but the neighbor router
does not, then the following message is displayed on the console while the routers attempt
to establish a BGP session between them:
%TCP-6-BADAUTH: No MD5 digest from [peer’s IP address](port) to [local router’s IP
address](179)
In an IPv6 network, the network administrator restricted remote access of the core router to
a single user. The administrator configured the IPv6 access list and applied it on the WAN
interface of the core router. The administrator also wanted to investigate who else is trying
to access the router and added a permit host entry with log statement in the access list but
could not find any details. Which action does the network administrator take to resolve the
issue?
A. Apply the access list on line vty using the ipv6 access-class out command.
B. Apply the access list on the WAN interface using the ipv6 traffic-filter out command
C. Apply the access list on line vty using the ipv6 access-class in command.
D. Apply the access list on all interfaces using the ipv6 access-class in command.
Answer: C
Explanation
The network administrator is trying to restrict remote access (likely SSH or Telnet) to the
router. To control access to the router’s VTY (virtual terminal) lines, the access list should be
applied to the VTY lines rather than the WAN interface. The ipv6 access-class in command
applies the access list on inbound connections to the VTY lines, which is where remote
management access occurs. This will allow the administrator to monitor and restrict who can
remotely access the router, and log any unauthorized access attempts as intended.
Question 91
How many labels are present in an MPLS Layer 3 packet traversing through the network
without traffic engineering?
A. 1
B. 2
C. 3
D. 4
Answer: A
Explanation
In an MPLS Layer 3 VPN network without traffic engineering, each MPLS packet typically
carries a single label as it traverses the network. This label is used to forward the packet
through the MPLS network, where routers (referred to as Label Switch Routers or LSRs) read
and swap labels to direct the packet along the established path.
Question 92
An engineer must establish optimal routing between the app servers connected at the
SPOKE routers. Which configurations are required on each router to create a distributed
mapping database between SPOKE1 and SPOKE2 to achieve optimal routing so the traffic is
forwarded directly from the App1 server to the App2 server?
Option A Option B
R0# R0#
R1# R1#
R2# R2 #
Option C Option D
R0# R0#
R1# R1#
R2# R2#
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
We need to use DMVPN, not DVMRP tunnel so Option B and Option D are not correct.
To allow direct Spoke-to-Spoke communication, we can use DMVPN Phase II or Phase III. In
this question, the administrator wants to use Phase III (with “shortcut” and “redirect”
keywords). We configure ip nhrp redirect in hub and ip nhrp shortcut in spokes -> Only
Option A is correct.
Note: A Distance Vector Multicast Routing Protocol (DVMRP) tunnel in a Cisco router is used
to transmit multicast traffic over networks that do not natively support multicast routing.
Question 93
Refer to exhibit.
R1(config-ext-nacl)# end
A network engineer is facing issues between OSPF neighbors changing states frequently. The
engineer enabled an ACL for CoPP and applied it at the control plane interface but got
unexpected results. Which action resolves the issue?
Answer: D
Explanation
The log and log-input keywords in an ACL cause the router to generate a log message for
every matching packet, which can increase CPU load, especially with frequently exchanged
control plane traffic like OSPF. This added CPU load can lead to delays or even dropped
packets in processing OSPF packets, which in turn causes OSPF neighbors to change states
frequently.
By removing the log and log-input keywords, the router’s CPU will not be burdened with
excessive logging, helping to stabilize the OSPF neighbor relationship.
Question 94
While examining log messages from a router, an administrator sees this error message:
“Mar 13 11:32:42.453: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.10.10.1
(Ethernet0/1) is down: K-value mismatch.
Both routers are using default values. Which action resolves this issue?
Answer: D
Explanation
The error message indicates an EIGRP K-value mismatch. K-values are the metrics EIGRP
uses to calculate the best path, and for EIGRP neighbors to establish an adjacency, their K-
values must match. Even if both routers have default configurations, the K-values between
them may not be the same, depend on IOS versions. Therefore it is better to explicitly
declare five K-values with “metric weights” command.
Note: The syntax of metric weights is: “metric weights TOS K1 K2 K3 K4 K5″
Question 95
Auto Duplex, Auto speed, link type is auto, media type is RJ45
Answer: B
Explanation
The output from the interface shows a high number of input errors and runts, which are
small packets that fall below the minimum packet size. This issue often points to a physical
layer problem, such as a faulty cable or bad connections.
Question 96
Hello-interval is 5, Hold-time is 15
Split-horizon is enabled
Topology-ids on interface - 0
SW303 connects to a CSR via VLAN 10. The CSR is also an EIGRP neighbor to SW303. After
enabling BFD on the CSR and SW303, an engineer notices the absence of stats related to BFD
on SW303. Which action resolves the issue?
A. Configure the bfd interval 500 min_rx 500 multiplier 5 command on a physical interface
B. Configure the bfd all-interfaces command under EIGRP for AS 88
C. Configure the bfd interface vlan 10 command under EIGRP for AS 88
D. Configure the bfd l2cos 0 command
Answer: B
Explanation
Using bfd all-interfaces under EIGRP will enable BFD on all interfaces that are participating in
EIGRP for AS 88. This is necessary for EIGRP to establish BFD sessions on all interfaces within
the AS, including VLAN interfaces.
Question 97
A switch has been configured to provide DHCP relay on VLAN100 to a server with an IP
address of 10.1.1.1. The DHCP server is sending syslog reports of multiple TFTP requests that
also originate from the switch. As a result, the server CPU exceeded a configured threshold.
Which action does the network administrator recommend to bring the server CPU threshold
down?
Answer: C
Explanation
The command ip forward-protocol udp is used to specify which UDP protocols are forwarded
by the switch. By default, the switch forwards several UDP protocols, including TFTP (port
69), which can generate additional, unnecessary traffic if not needed.
Since TFTP (UDP port 69) is not required for DHCP operations and is causing excessive traffic,
the recommended action is to disable forwarding for this specific protocol with the
command no ip forward-protocol udp 69. This prevents the switch from forwarding TFTP
requests, reducing the load on the DHCP server’s CPU.
Question 98
router eigrp 1
match tag 6
set tag 8
Explanation
Answer A is not correct as OSPF and EIGRP IDs do not have any relationship, so they do not
need to be matched.
Answer C is not correct as there’s no indication that external type-1 routes are preferred or
necessary in this configuration
Answer D is not correct as tag is just optional and used for reference only.
Answer B is not correct as we already had a “default-metric 20000 2000 255 1 1500” for all
routes redistributed into EIGRP.
Although there is no correct answer in this question but if we have to choose one, then
answer B may have any effect on redistributed routes.
Question 99
R5#
remote host, open active delayed 12988ms (20000ms max, 60% jitter)
Last read 00:01:18, last write 00:01:18, hold time is 15, keepalive
interval is 3 seconds
A customer reported a failure and intermittent disconnection between two office buildings,
site X and site Y. The network team finds that site X and site Y are exchanging email
application traffic with the data center network. Which configuration resolves the issue
between site X and site Y?
Answer: B
Explanation
From the output of “show ip bgp neighbors 10.10.10.5”, we learned that BGP is stuck in
“Active” state as there was no response from 10.10.10.5. Therefore the most likely cause of
this problem is R5 was configured with the command “neighbor 10.10.10.2 remote-as
65101” under BGP. Therefore R2 must use its loopback 0 interface to establish BGP neighbor
relationship with R5.
Note: If a BGP router receives a TCP connection request from a source IP address that is not
configured as BGP neighbor, the router rejects the request.
Question 100
R1 Configuration:
interface FastEthernet0/0
network 10.0.0.0
R2 Configuration:
interface FastEthernet0/0
interface FastEthernet1/0
network 10.0.0.0
router ospf 1
R1# sh ip route
The R2 OSPF route 10.2.2.0/24 shows in the R1 EIGRP routing table without route
redistribution performed between OSPF and EIGRP routing protocols. Which configuration is
required on router R2 to resolve the issue?
Explanation
Answer A will not change the result as both networks will still advertise in EIGRP.
Using “passive-interface FastEthernet1/0” in EIGRP will only suppress the sending of Hellos
out of this interface, while still advertising that interface’s subnet to our EIGRP neighbors ->
Answer D is not correct.
Only answer B is the best choice. By specific FastEthernet0/0 network in EIGRP 100, we will
prevent Fa0/1 network from being advertising. The exact command used to solve this
problem should be: “network 10.1.1.0 0.0.0.255” under EIGRP 100.
Question 101
Option A Option B
R7 R7
Option C Option D
R1 R1
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
The BGP routes 77.77.78.0/24, 77.77.79.0/24 and 77.77.80.0/24 are showing the origin code
as “?” (incomplete), rather than “i” (IGP). This typically occurs when routes are redistributed
into BGP without specifying the origin. By default, routes injected into BGP through
redistribution are marked as “incomplete,” indicated by the “?” origin code.
To ensure that these routes show an origin of “i” (IGP), you need to set the origin attribute
to “IGP” in the route map on the router where the routes are injected into BGP—in this
case, R7.
Question 102
Known via "eigrp 100", distance 90, metric 35840, type internal
Known via "eigrp 100", distance 90, metric 33280, type internal
Option A Option B
R4# R2#
! !
R4# R2#
! !
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
From the “sh run | i route” output, we learn that both R2 and R4 have the static route Null0
to Server 1 (10.71.2.100/32 on R2 and 10.71.2.0/23 on R4). These Null0 routes cause packets
destined for Server 1 to be discarded, which is why users cannot reach the server.
Although R4 has a static route to Null0 to Server 1 but from the last line of the output of
“R4#sh ip route 10.71.2.100” (* 10.3.111.2, from 10.3.111.2, 00:01:14 ago, via
FastEthernet1/1), we learn that R4 choose R2 (10.3.111.2) to reach Server 1 based on
longest prefix match rule. This is because R2 has longer prefix 10.71.2.0/24 than the static
route Null0 10.71.2.0/23 -> We don’t need to remove the static route Null0 on R4, we only
need to do it on R2 with “no ip route 10.71.2.100 255.255.255.255 Null0 name SERVER1”
command -> Option B is correct.
About the “distance” command, maybe it is there just to convince us Option D is better than
Option B.