ENARSI+v1 1+ (300-410) +Practice+Exam
ENARSI+v1 1+ (300-410) +Practice+Exam
Questions
1. Which of the following sources of route information has the highest (i.e. the least
believable) administrative distance?
A. RIP
B. External EIGRP
C. OSPF
D. Internal EIGRP
A. 20
B. 1
C. Infinity
D. 0
3. Which of the following is not an option for assigning a metric to a routing protocol?
A. Set a default metric for all routing sources being injected into a routing protocol.
B. Set a metric using a Route Map.
C. Specify a metric as part of the “redistribute” command.
D. Specify a metric with a Route Tag.
4. You wish to redistribute all routes within AS 1 into AS 2 with the exception of
192.168.1.0/24. Which of the following approaches can you use to selectively filter that
route?
A. Create an ACL to match the 192.168.1.0/24 network, and reference that ACL under a
“route map deny” statement.
B. Use the “filter-list 192.168.1.0/24” option as part of the “redistribute” command.
C. Create an ACL to match the 192.168.1.0/24 network, and reference that network in a
“distribute list” command.
D. Use the “distribute-list 192.168.1.0/24” option as part of the “redistribute” command.
A. create tag 10
B. match tag 10
C. tag mode 10
D. set tag 10
8. What configuration structure does PBR use to match traffic and specify behavior for that
traffic?
A. policy-map
B. route-map
C. class-map
D. access-class
11. Which of the following protocols does EIGRP use to ensure delivery of routing updates?
A. STP
B. Dijkstra
C. RTP
D. DUAL
A. 5 seconds
B. 10 seconds
C. 15 seconds
D. 20 seconds
13. By default, EIGRP uses which of the following parameters to calculate its metric?
14. What is the name given to an EIGRP backup route that has met the Feasibility Condition?
A. Feasible Successor Route
B. Successor Route
C. Standby Route
D. DUAL Route
16. If an EIGRP router loses its Successor Route to a destination network and it has no Feasible
Successor Route, what message does the router send out in an attempt to find an alternate
path to the network?
A. Hello
B. Query
C. Open
D. Discover
18. What can be used in an EIGRP Stub Router configuration to allow selected routes to be
advertised by the Stub Router?
A. Leak Map
B. Policy Map
C. Class Map
D. Service Policy
A. The backup path’s metric equals, but is not less than, the product of the Variance and the
metric of the Successor Route.
B. The backup path does not meet the Feasibility Condition.
C. The Variance value is greater than 4.
D. The backup path uses an interface with a different Hello Timer than the interface used by
the Successor Route.
21. What interface configuration mode command is issued to tell an interface to participate in
an EIGRP for IPv6 routing process for Autonomous System (AS) 1?
22. Under what Named EIGRP configuration mode would you configure the Variance option?
23. Which of the following routing protocols support the SHA hashing algorithm?
25. By default, if you set an OSPF interface’s Hello timer to 10 seconds, what will be the value
of the Dead timer?
A. 5 seconds
B. 20 seconds
C. 30 seconds
D. 40 seconds
26. What is the default Reference Bandwidth used by OSPF to calculate Cost?
A. 100 kbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
27. What is the default OSPF Network Type of a non-Frame Relay OSPF interface?
A. Point-to-Point
B. Point-to-Multipoint
C. NBMA
D. Broadcast
28. What LSA Type is used to inject networks from a separate autonomous system (AS) into an
OSPF Stub or Totally Stubby Area?
A. Type 3
B. Type 4
C. Type 5
D. Type 7
A. reference-bandwidth [bandwidth_amount]
B. interface-cost [bandwidth_amount]
C. auto-metric reference-bandwidth [bandwidth_amount]
D. auto-cost reference-bandwidth [bandwidth_amount]
30. What types of packets are sent over an OSPF Virtual Link?
A. Data packets
B. OSPF packets
C. GRE packets
D. Data, OSPF, and GRE packets
31. What Cisco IOS command is used to perform OSPF route summarization on an ABR?
A. area range
B. prefix-list
C. summary-address
D. distribute-list
32. What OSPFv3 LSA Type is used to advertise an area’s Link Local address?
A. Type 4
B. Type 7
C. Type 8
D. Type 9
33. What command is used to create an OSPFv3 routing process with the Address Families
configuration approach?
A. TCP 179
B. TCP 443
C. TCP 137
D. TCP 161
36. In which state does a BGP-enabled router wait for the receipt of a Keepalive message in
order to completely establish the BGP session?
A. Active
B. Idle
C. OpenSent
D. OpenConfirm
37. Which BGP command allows us to change interface source address used when establishing
a neighbor adjacency?
A. update-interface
B. session-source
C. update-source
D. set-source
38. Which category of BGP attributes must be present in all updates and are passed on to
other BGP peers?
A. Well-known discretionary
B. Well-known mandatory
C. Optional transitive
D. Optional nontransitive
39. Which command allows us to disable the default BGP synchronization feature found in
older Cisco IOS versions?
A. no suppress
B. no local preference
C. no metric-type internal
D. no synchronization
A. Route reflectors
B. VPNv4
C. Address families
D. L2VPN
41. Which BGP feature allows us to reduce the number of BGP updates created, lowering
resource usage on BGP-enabled devices?
A. Peer group
B. Multihop
C. Route reflector
D. Summarization
42. What is the default time-to-live (TTL) value used with external BGP (eBGP)?
A. 0
B. 5
C. 2
D. 1
43. Which BGP mechanism allows all internal BGP (iBGP) neighbors within an autonomous
system to learn about all available routes without creating loops in the network, and
without using a full-mesh configuration?
A. MP-BGP
B. Communities
C. Route reflectors
D. Filtering
44. Which optional keyword is used to suppress prefixes and present only an aggregate
address in the BGP update?
A. no-summary
B. summary-only
C. aggregate-address
D. suppress-update
A. no-prepend
B. replace-as
C. allowas-in
D. local-as
46. Which protocol is used to automatically generate and exchange labels between
multiprotocol label switching (MPLS) routers?
A. LFIB
B. LIB
C. LDP
D. LSR
47. Which structure within an MPLS Layer 3 VPN configuration determines which Virtual
Routing and Forwarding (VRF) instance a VPNv4 route will be imported into?
A. Route Distinguisher
B. Route Target
C. Next Hop
D. VPN Label
48. Which of the following is NOT a valid format for a VPN Route Distinguisher in a VRF
configuration?
A. ASN:nn
B. IP-address:nn
C. MAC:nn
D. 4BASN:nn
49. Which protocol is used to dynamically scale a network through use with Dynamic
Multipoint VPNs?
A. NHRP
B. NBMA
C. NHC
D. DNS
51. Which command will require the TY line connections to authenticate a user with the local
database of the router?
52. Which command allows us to configure a router to use a loopback address as the source
for TACACS+ communication?
A. 1812
B. 1813
C. 1642
D. 1643
54. Which Cisco IOS command will display the hours during which a time-based ACL named
AFTER-WORK is configured to be active?
56. Which Unicast Reverse Path Forwarding (uRPF) mode verifies that a packet source IP
arrives on the same interface the router would use to reach the IP address?
A. Verbose Mode
B. Loose Mode
C. Strict Mode
D. Asymmetric Mode
57. Which structure within a Control Plane Policing (CoPP) configuration is used to define the
action which should be taken against policed traffic?
A. Policy Map
B. ACL
C. Class Map
D. Service Policy
58. The IPv6 RA Guard feature filters out which type of router advertisements in an IPv6
network?
A. Broadcast
B. Multicast
C. Unicast
D. Frame Relay
A. Only on interface
B. Only a VLAN
C. On either an interface or a VLAN
D. Only globally
A. STP
B. LDP
C. NDP
D. ARP
61. Which feature allows us to filter inbound traffic on L2 switch ports that are not found in the
IPv6 binding table?
A. IPv6 RA Guard
B. DHCPv6 Guard
C. IPv6 ND Inspection
D. IPv6 Source Guard
62. Which command will allow an administrator to connect to a Cisco device’s VTY line only
over port 22?
63. When switching a router configuration from SSHv1 to SSHv2, which command is necessary
in order to provide secure access?
64. Which well-known port number is commonly used to move files and images between a
Cisco router and a TFTP server?
A. TCP 69
B. UDP 69
C. TCP 121
D. UDP 121
A. SNMPv1
B. SNMPv1.5
C. SNMPv2c
D. SNMPv3
66. When Cisco IOS command configures a remote user to receive traps using communication
configured for authentication without privacy?
67. Which Syslog command will configure a Cisco device for logging at the Warning level, and
also those levels considered to be more severe?
68. What is the general rule of thumb when using Cisco debug commands?
69. Which Cisco IOS command allows us to specifically turn off conditional debugging that has
been put in place for the GigabitEthernet 0/1 interface of a router?
71. Under what condition would the DHCP Relay Agent feature be required in order to make
sure our network hosts are able to obtain an IP address through DHCP?
A. The host and DHCP server are in the same broadcast domain.
B. The hosts and DHCP server are in different broadcast domains.
C. The hosts and DHCP server are directly connected.
D. The hosts and DHCP server are not directly connected.
72. Below is a section of an IP SLA configuration that does not appear to be working properly.
What should be done in order to correct the issue with the IP SLA probe?
***
Operation timeout (milliseconds): 5000
Type of operation to perform: udp-jitter
Target address/Source address: 10.1.1.50/0.0.0.0
Target port/Source port: 16500/0
Codec Packet size: 32
Control Packets: enabled
Schedule:
Operation frequency (seconds): 5
Next scheduled start time: Pending trigger
Group scheduled: FALSE
Life (seconds): Forever
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
***
A. NetFlow v4
B. NetFlow v7
C. NetFlow v5
D. NetFlow v9
75. Which version of NetFlow would be preferred in a network using multicast media
applications where ingress and egress monitoring is desired?
A. NetFlow v9
B. NetFlow v7
C. NetFlow v5
D. NetFlow v4
76. Which version of NetFlow allows us to use multiple flow monitors and exporters
simultaneously on the same traffic?
A. NetFlow v9
B. NetFlow v10
C. IPFIX
D. Flexible NetFlow
77. Which section of Cisco DNA Center is dedicated to proactive issue detection?
A. Design
B. Assurance
C. Policy
D. Provision
78. Which tool within Cisco DNA Center Assurance allows us to collect network topology and
routing data from discovered devices?
A. Analytics
B. Contextual Insight
C. Path Trace
D. Network Health
1. Which of the following sources of route information has the highest (i.e. the least
believable) administrative distance?
A. RIP
B. External EIGRP
C. OSPF
D. Internal EIGRP
Answer: B
Explanation: The administrative distance (AD) of RIP is 120. The AD of External EIGRP (i.e.
routes injected into EIGRP from a different autonomous system) is 170. OSPF’s AD is 110, and
Internal EIGRP (i.e. routes learned within an EIGRP autonomous system) has an AD of 90.
A. 20
B. 1
C. Infinity
D. 0
Answer: C
Explanation: A seed metric is assigned to a redistributed route by default if you don’t configure
a different metric for your redistributed route. The seed metric for OSPF is 20, while the seed
metric of RIP and EIGRP is Infinity.
3. Which of the following is not an option for assigning a metric to a routing protocol?
A. Set a default metric for all routing sources being injected into a routing protocol.
B. Set a metric using a Route Map.
C. Specify a metric as part of the “redistribute” command.
D. Specify a metric with a Route Tag.
Answer: D
Explanation: All of the options are valid for setting a metric for a routing protocol other than
“Specify a metric with a Route Tag.” A Tag can be assigned to a route, but it acts as a label
rather than a metric.
4. You wish to redistribute all routes within AS 1 into AS 2 with the exception of
192.168.1.0/24. Which of the following approaches can you use to selectively filter that
route?
A. Create an ACL to match the 192.168.1.0/24 network, and reference that ACL under a
“route map deny” statement.
B. Use the “filter-list 192.168.1.0/24” option as part of the “redistribute” command.
C. Create an ACL to match the 192.168.1.0/24 network, and reference that network in a
“distribute list” command.
D. Use the “distribute-list 192.168.1.0/24” option as part of the “redistribute” command.
Answer: A
Explanation: A common way to filter a route from being redistributed is to match the network
with an ACL. Then, that ACL can be referenced as part of a “route map deny” statement. For
example, let’s say you enter the “access-list 1 permit 192.168.1.0 0.0.0.255” command to
create an ACL with a number of 1. Then, you can create a route map with a command such as
“route-map DEMO deny 10”. Then, in route-map configuration mode, you can reference ACL 1
with the command “match ip address 1”. However, to allow other routes to be redistributed,
you should follow-up the initial “route-map” command with another “route-map” command
having a higher sequence number, permitting all other routes, such as “route-map permit 20”.
5. What route-map configuration mode command is used to set a route tag to a value of 10?
A. create tag 10
B. match tag 10
C. tag mode 10
D. set tag 10
Answer: D
Explanation: You can set a tag on a route with the route-map configuration mode command
“set tag 10”. Then, you can use the route-map configuration mode command “match tag 10” to
recognize (and possibly deny) routes that are marked with a tag of 10.
Answer: B
Explanation: Unlike redistributing IPv4 routes, when redistributing IPv6 routes, the
“redistribute” command does not include connected routes on interfaces enabled for the
redistributed protocol. However, you could instruct the “redistribute” command to redistribute
those routes with the “redistribute [routing_source] connected-interfaces” command.
Answer: C
Explanation: Although “Local PBR” can be applied in a router’s global configuration mode, PBR
is applied on a router’s ingress interface.
8. What configuration structure does PBR use to match traffic and specify behavior for that
traffic?
A. policy-map
B. route-map
C. class-map
D. access-class
Answer: B
Answer: D
Explanation: With Virtual Routing and Forwarding (VRF), each virtual router maintains its own
unique IP routing table. Therefore, different virtual routers running on the same physical router
can run different routing protocols. Also, by default, virtual routers cannot see routes in the
physical router’s IP routing table. However, it is possible to configure “leak maps” to allow
specific routers in the physical router’s IP routing table to appear in the IP routing table of a
virtual router.
10. In a VRF configuration, you wish view the IP routing table of a virtual router with a VRF
instance name of “TENANT-A”. What command would you use?
Answer: A
Explanation: The “show ip route vrf TENANT-A” command is the appropriate command to view
the IP routing table of the VRF instanced named “TENANT-A.”
A. STP
B. Dijkstra
C. RTP
D. DUAL
Answer: C
Explanation: EIGRP uses the Reliable Transport Protocol (RTP) to ensure delivery of routing
updates to its neighbors. However, RTP is not used to confirm receipt of Hello messages.
Spanning Tree Protocol (STP) is used to prevent a Layer 2 topological loop. The Dijkstra
Algorithm is used by OSPF to select the shortest path to a destination network. The Diffusing
Update Algorithm (DUAL) is used by EIGRP to select Successor and Feasible Successor routes.
A. 5 seconds
B. 10 seconds
C. 15 seconds
D. 20 seconds
Answer: C
Explanation: On a LAN interface, EIGRP’s default Hello Time is 5 seconds, and its default Hold
Time is 15 seconds.
13. By default, EIGRP uses which of the following parameters to calculate its metric?
Answer: B
Explanation: By default, EIGRP uses Bandwidth and Delay to calculate its metric. However,
EIGRP’s K-values can be adjusted for its metric calculation causing the calculation to also
include Reliability and Load. Although Maximum Transmission Unit (MTU) size does not factor
into EIGRP’s metric calculation directly, MTU size can be used as a tie breaker between two
routes with equal metrics.
14. What is the name given to an EIGRP backup route that has met the Feasibility Condition?
A. Feasible Successor Route
B. Successor Route
C. Standby Route
D. DUAL Route
Answer: A
Explanation: An EIGRP Successor Route is the preferred route to a destination network, while
an EIGRP Feasible Successor Route is a backup route that has met the Feasibility condition.
15. EIGRP’s Feasibility Condition requires a Feasible Successor’s Reported Distance to be less
than what?
Answer: D
Explanation: EIGRP’s Feasibility Condition requires a Feasible Successor’s Reported Distance
(RD) to be less than the Feasible Distance (FD) of the Successor Route (i.e. the preferred route).
16. If an EIGRP router loses its Successor Route to a destination network and it has no Feasible
Successor Route, what message does the router send out in an attempt to find an alternate
path to the network?
A. Hello
B. Query
C. Open
D. Discover
Answer: B
Explanation: EIGRP sends out a Query message in an attempt to find an alternate route to a
network if it loses its Successor Route to that network and it has no Feasible Successor Route. In
Answer: C
Explanation: EIGRP neighbors do not need matching Variance values. Also, OSPF uses Process
IDs, EIGRP does not. Instead, EIGRP must have matching Autonomous System (AS) numbers.
Finally, while having matching Hello and Hold Timers is considered a best practice, it is not
required for EIGRP. However, OSPF does require matching timer values.
18. What can be used in an EIGRP Stub Router configuration to allow selected routes to be
advertised by the Stub Router?
A. Leak Map
B. Policy Map
C. Class Map
D. Service Policy
Answer: A
Explanation: A Route Map can be configured to identify specific routes. Then, that Route Map
can be reference by a Leak Map in a Stub Router configuration to allow selected routes (i.e. the
routes specified by the Route Map) to be advertised by the Stub Router.
A. The backup path’s metric equals, but is not less than, the product of the Variance and the
metric of the Successor Route.
B. The backup path does not meet the Feasibility Condition.
C. The Variance value is greater than 4.
D. The backup path uses an interface with a different Hello Timer than the interface used by
the Successor Route.
Answer: B
Explanation: EIGRP’s Variance feature will load balance across one or more backup paths if
those backup paths have a metric that is equal to or less than the product of the Variance value
and the metric (i.e. the Feasible Distance) of the Successor Route. However, a backup path will
not be used for load balancing if it did not meet the Feasibility Condition.
Answer: D
Explanation: EIGRP’s Auto Summarization feature causes EIGRP to advertise classful networks,
rather than the subnets within those classful networks. This feature is enabled in router
configuration mode with the “auto-summary” command.
21. What interface configuration mode command is issued to tell an interface to participate in
an EIGRP for IPv6 routing process for Autonomous System (AS) 1?
Answer: C
22. Under what Named EIGRP configuration mode would you configure the Variance option?
Answer: A
Explanation: With Named EIGRP, you can configure topology-wide features such as Route
Redistribution and Variance under Address-Family-Topology configuration mode.
23. Which of the following routing protocols support the SHA hashing algorithm?
Answer: C
Explanation: While Named EIGRP supports both the MD5 and SHA hashing algorithms, EIGRP
for IPv4 and EIGRP for IPv6 only support the MD5 hashing algorithm.
24. What is the effect of setting a router’s OSPF routing process to a Priority of 0?
Answer: C
Explanation: On an OSPF network segment that elects a Designated Router (DR) and Backup
Designated Router (BDR), the router on the network segment with the highest Priority is
25. By default, if you set an OSPF interface’s Hello timer to 10 seconds, what will be the value
of the Dead timer?
A. 5 seconds
B. 20 seconds
C. 30 seconds
D. 40 seconds
Answer: D
Explanation: By default, an OSPF interface’s Dead timer is four times the Hello timer. Therefore,
if an OSPF interface’s Hello timer is 10 seconds, its Dead timer would be 40 seconds (i.e. 10 * 4
= 40).
26. What is the default Reference Bandwidth used by OSPF to calculate Cost?
A. 100 kbps
B. 100 Mbps
C. 1 Gbps
D. 10 Gbps
Answer: B
Explanation: OSPF calculates the Cost of an interface by dividing the interface’s speed by OSPF’s
Reference Bandwidth. The default Reference Bandwidth used by OSPF is 100 Mbps. Since Cost
must be an integer, interfaces speeds of 100 Mbps or greater all have a cost of 1 by default.
Therefore, a best practice recommendation is to set OSPF’s Reference Bandwidth to at least the
bandwidth amount of the highest speed interface being used by OSPF.
27. What is the default OSPF Network Type of a non-Frame Relay OSPF interface?
A. Point-to-Point
B. Point-to-Multipoint
C. NBMA
D. Broadcast
28. What LSA Type is used to inject networks from a separate autonomous system (AS) into an
OSPF Stub or Totally Stubby Area?
A. Type 3
B. Type 4
C. Type 5
D. Type 7
Answer: D
Explanation: Type 5 LSAs are typically used to inject networks from a separate AS into OSPF.
However, an OSPF Stub or Totally Stubby Area cannot have Type 5 LSAs. As a result, Type 7 LSAs
are used to inject those networks.
29. What Cisco IOS command is used to change the default reference-bandwidth of an OSPF-
speaking router?
A. reference-bandwidth [bandwidth_amount]
B. interface-cost [bandwidth_amount]
C. auto-metric reference-bandwidth [bandwidth_amount]
D. auto-cost reference-bandwidth [bandwidth_amount]
Answer: D
Explanation: OSPF’s default Reference Bandwidth is 100 Mbps. Therefore, this value should
typically be changed to a higher value, in order to calculate different Cost values for interface
speeds greater than 100 Mbps. To set a non-default Reference Bandwidth, in router
configuration mode you can used the command: auto-cost reference-bandwidth
[bandwidth_amount], where the unit of measure for bandwidth_amount is Mbps.
A. Data packets
B. OSPF packets
C. GRE packets
D. Data, OSPF, and GRE packets
Answer: B
Explanation: An OSPF Virtual Link can be used to logically connect a discontiguous OSPF Area to
a Backbone Area. While an OSPF Virtual Link is a type of tunnel, it is not a GRE tunnel, and no
GRE packets are sent. Only OSPF packets are logically sent over the Virtual Link, with the Data
packets traveling over physical links.
31. What Cisco IOS command is used to perform OSPF route summarization on an ABR?
A. area range
B. prefix-list
C. summary-address
D. distribute-list
Answer: A
Explanation: Unlike EIGRP, which can perform route summarization on any router, OSPF can
only perform route summarization on an Area Border Router (ABR) or an Autonomous System
Boundary Router (ASBR). The command used to perform OSPF route summarization on an ABR
is the “area range” command, and the command used to perform OSPF route summarization on
an ASBR is the “summary-address” command.
32. What OSPFv3 LSA Type is used to advertise an area’s Link Local address?
A. Type 4
B. Type 7
C. Type 8
D. Type 9
Answer: C
Explanation: OSPFv3 adds a couple of LSA types to those seen with OSPFv2. Specifically, Type 8
and Type 9 LSA types are added. A Type 8 LSA (a.k.a. a “Link LSA”) is used to advertise Link Local
33. What command is used to create an OSPFv3 routing process with the Address Families
configuration approach?
Answer: A
Explanation: The “ipv6 router ospf [process_id]” command is used to create an OSPFv3 routing
process using the Traditional Configuration approach. However, the “router ospfv3
[process_id]” command is used to create an OSPFv3 routing process using the Address Families
configuration approach.
34. Which of the following is a hashing option for OSPFv3 Address Families authentication?
A. DES
B. Plain Text
C. AES
D. SHA-1
Answer: D
Explanation: Secure Hash Algorithm 1 (“SHA-1” or “sha1”) and Message Digest 5 (“MD5”) are
the only hashing algorithms supported for OSPFv3 Address Families authentication.
A. TCP 179
B. TCP 443
C. TCP 137
D. TCP 161
Answer: A
36. In which state does a BGP-enabled router wait for the receipt of a Keepalive message in
order to completely establish the BGP session?
A. Active
B. Idle
C. OpenSent
D. OpenConfirm
Answer: D
Explanation: In the OpenConfirm state, BGP waits for the receipt of either a Keepalive or
Notification message. If no Keepalive message arrives, the state will move back to Idle. If there
is the receipt of a neighbor’s Keepalive message, the BGP session moves to the final Established
state.
37. Which BGP command allows us to change interface source address used when establishing
a neighbor adjacency?
A. update-interface
B. session-source
C. update-source
D. set-source
Answer: C
Explanation: The “update-source” command allows us to change the interface source address
used when establishing a BGP session. By default, when establishing a neighbor adjacency with
another BGP-enabled router, the session is formed using the IP address of the outgoing
interface nearest to the neighbor. It’s common to create a loopback interface on a router and
set this instead as the source of a BGP session. This helps guard against outages, in a case
where there may be redundant links between BGP routers. If there are redundant links and one
link goes down, the BGP session will also momentarily go down and establish a second session
with the redundant interface, creating a network outage during this transition. Using a
loopback interface as the source address ensures a seamless transition in a case such as this.
A. Well-known discretionary
B. Well-known mandatory
C. Optional transitive
D. Optional nontransitive
Answer: B
Explanation: Well-known mandatory attributes must be present and understood by all BGP
peers, and they are required to exist in the BGP update message. These attributes can be seen
in the output of the “show ip bgp” command, and include attributes such as the origin, the
autonomous system path, and the next-hop address.
39. Which command allows us to disable the default BGP synchronization feature found in
older Cisco IOS versions?
A. no suppress
B. no local preference
C. no metric-type internal
D. no synchronization
Answer: D
Explanation: A BGP router with synchronization enabled will only advertise a route learned
from an internal BGP (iBGP) peer to an external BGP (eBGP) peer when there is an exact match
of that route learned from an IGP (such as EIGRP or OSPF) in the routing table. The “no
synchronization” command will specifically disable this feature, although by default this is
already disabled in newer Cisco IOS versions.
40. Which mechanism within Multiprotocol BGP (MP-BGP) allows BGP to carry multiple
protocols at once?
A. Route reflectors
B. VPNv4
C. Address families
D. L2VPN
41. Which BGP feature allows us to reduce the number of BGP updates created, lowering
resource usage on BGP-enabled devices?
A. Peer group
B. Multihop
C. Route reflector
D. Summarization
Answer: A
Explanation: BGP peer groups allow us to group neighbors together in order to share
configurations and policies. When BGP creates updates, a separate update is created for each
neighbor. Peer groups can simplify our configuration and use less device resources, since
updates will be processed for the peer group as a whole rather than for each separate
neighbor.
42. What is the default time-to-live (TTL) value used with external BGP (eBGP)?
A. 0
B. 5
C. 2
D. 1
Answer: D
Explanation: External BGP (eBGP) by default requires two BGP-enabled routers to be directly
connected to one another in order to properly establish a neighbor adjacency. This is because
the default TTL value is 1 when using eBGP. The BGP multihop feature can be used to overcome
this, allowing us to configure a higher TTL value.
A. MP-BGP
B. Communities
C. Route reflectors
D. Filtering
Answer: C
Explanation: Internal BGP (iBGP) neighbors do not add their own autonomous system number
to the BGP update messages sent out. For this reason, any routes learned from another iBGP
neighbor will not be advertised to any other iBGP neighbor, which would require a full-mesh
network to overcome. An alternative to this a BGP route reflector, which allows us to point to
other iBGP routers in order to specifically forward routes that would not normally be sent.
44. Which optional keyword is used to suppress prefixes and present only an aggregate
address in the BGP update?
A. no-summary
B. summary-only
C. aggregate-address
D. suppress-update
Answer: B
Explanation: BGP can advertise a summarized route through the “aggregate-address”
command. By default, the summary address, along with all other prefixes, will be advertised in
the BGP updates sent out to peers. These prefixes can be suppressed so that BGP updates only
send out the summarized route to peers by appending the “summary-only” keyword when
configuring the aggregate address.
45. Which BGP command allows for routes to be received even if a router sees its own
autonomous system number in the AS-Path section of a BGP update?
A. no-prepend
B. replace-as
C. allowas-in
D. local-as
46. Which protocol is used to automatically generate and exchange labels between
multiprotocol label switching (MPLS) routers?
A. LFIB
B. LIB
C. LDP
D. LSR
Answer: C
Explanation: Label Distribution Protocol (LDP) allows an MPLS router to generate labels for its
prefixes, which are advertised to MPLS neighbors. LDP first establishes a neighbor adjacency
with another LDP-capable device before exchanging labels. These labels allow MPLS-enabled
routers to determine how data is forwarded in the network, rather than basing those decisions
on IP addressing information.
47. Which structure within an MPLS Layer 3 VPN configuration determines which Virtual
Routing and Forwarding (VRF) instance a VPNv4 route will be imported into?
A. Route Distinguisher
B. Route Target
C. Next Hop
D. VPN Label
Answer: B
Explanation: A Route Target (RT) is an 8-byte value added to a prefix within MPLS Layer 3 VPNs.
The typical format is the autonomous system number followed by the customer site number,
separated by a colon (e.g. 65100:1). The RT is attached to a prefix, creating a VPNv4 route that
is sent over MP-BGP to a peer. The RT informs the receiving peer about which VRF the VPNv4
route should be imported into.
A. ASN:nn
B. IP-address:nn
C. MAC:nn
D. 4BASN:nn
Answer: C
Explanation: A Route Distinguisher (RD) is used to identify a VRF routing instance. The accepted
formats for specifying an RD include: ASN:nn, IP-address:nn, and 4BASN:nn.
Video Reference: 3.1.3 VRF-Aware Routing with MPLS Layer 3 VPN Configuration
49. Which protocol is used to dynamically scale a network through use with Dynamic
Multipoint VPNs?
A. NHRP
B. NBMA
C. NHC
D. DNS
Answer: A
Explanation: The next-hop resolution protocol (NHRP) is functionally similar to how DNS works.
This is an ARP-like protocol that allows DMVPN spokes to directly communicate with one
another. This is a client-server model where the DMVPN hub maintains an NHRP database for
each spoke, allowing for the spokes to build direct tunnels between themselves.
50. When configuring a DMVPN hub, which command enables the router to support multicast
traffic over the tunnel interfaces?
Answer: D
51. Which command will require the VTY line connections to authenticate a user with the local
database of the router?
Answer: C
Explanation: While under line configuration mode, the command “login local” configures the
lines to authenticate incoming sessions to the local user database on the router.
52. Which command allows us to configure a router to use a loopback address as the source
for TACACS+ communication?
Answer: C
Explanation: While under global configuration mode, the command “ip tacacs source-interface”
allows us to specify a particular interface as the source address for TACACS logging messages.
It’s a best practice to set the source to a local loopback interface, so that log messages are more
easily interpreted.
A. 1812
B. 1813
C. 1642
D. 1643
Answer: A
Explanation: RADIUS commonly uses port 1812 for authentication and 1813 for accounting, as
defined by the Internet Engineering Task Force (IETF). Some RADIUS servers also use 1645 for
authentication and 1646 for accounting, so this the server configuration should be verified
when implementing RADIUS in a network. It is possible to change these values when
configuring RADIUS within Cisco IOS.
54. Which Cisco IOS command will display the hours during which a time-based ACL named
AFTER-WORK is configured to be active?
Answer: D
Explanation: The command “show time-range” followed by the name of a particular ACL will
display the hours during which it is configured to be active. The output will show the days and
times during which the ACL will be enforced.
55. Which command is correct when applying an IPv6 ACL named FILTER to an interface in the
inbound direction?
Answer: A
Explanation: When applying an IPv6 ACL to an interface, rather than using the “access-group”
command as we do with IPv4 ACLs, we instead need to use the “ipv6 traffic-filter” command.
56. Which Unicast Reverse Path Forwarding (uRPF) mode verifies that a packet source IP
arrives on the same interface the router would use to reach the IP address?
A. Verbose Mode
B. Loose Mode
C. Strict Mode
D. Asymmetric Mode
Answer: C
Explanation: Using strict mode in uRPF means that the router will verify that the same interface
on which the packet was received can be used to reach the packet’s source IP address. If this is
true, and there is a route in the routing table for the source, the packet will be permitted. By
contrast, loose mode only checks to see if there is a route available in the routing table, and is
not concerned with which interface is used to reach the source.
57. Which structure within a Control Plane Policing (CoPP) configuration is used to define the
action which should be taken against policed traffic?
A. Policy Map
B. ACL
C. Class Map
D. Service Policy
Answer: A
Explanation: With a CoPP configuration, an ACL is used to identify particular traffic, which is
classified and grouped using a Class Map. A Policy Map is used to define actions which should
be taken against the traffic, such as rate-limiting or dropping. A Service Policy is then used to
enable policing on the control plane interface.
58. The IPv6 RA Guard feature filters out which type of router advertisements in an IPv6
network?
A. Broadcast
B. Multicast
Answer: B
Explanation: In IPv6 networks, devices periodically send out router advertisement (RA)
messages via multicast. These help network nodes determine information about the LAN,
including the default gateway, network prefix lists, and more. The IPv6 RA Guard feature can
filter these more specifically so that rogue advertisements cannot be introduced into the
network.
A. Only on interface
B. Only a VLAN
C. On either an interface or a VLAN
D. Only globally
Answer: C
Explanation: DHCPv6 guard uses a policy, similar to the way that IPv6 RA Guard works. This can
be applied on a per-interface basis or at the VLAN level, applying the policy itself to the selected
interfaces.
60. What is used by IPv6 nodes to discover the presence and link-layer addresses of other
nodes which reside on the same link?
A. STP
B. LDP
C. NDP
D. ARP
Answer: C
Explanation: Neighbor Discovery Protocol (NDP) is used for IPv6 traffic, and it allows different
nodes on the same link to advertise themselves to neighboring devices. It also allows them to
learn information from these neighbors. These NDP messages are unsecure and susceptible to
attacks, which is a case where we would use IPv6 ND Inspection/Snooping for protection. By
snooping these messages, we can build a reference table called a DHCPv6 Snooping Binding
Table which will help protect against things such as cache poisoning, DoS, and redirect attacks.
61. Which feature allows us to filter inbound traffic on L2 switch ports that are not found in the
IPv6 binding table?
A. IPv6 RA Guard
B. DHCPv6 Guard
C. IPv6 ND Inspection
D. IPv6 Source Guard
Answer: D
Explanation: IPv6 Source Guard is a first-hop security feature used for IPv6 networks that filters
inbound traffic on a L2 switch. It references the IPv6 binding table, which is populated by an
inspection feature such as ND inspection or IPv6 snooping. If the inbound traffic is not found in
the binding table, the traffic will be denied, helping to protect against spoofing and DoS attacks.
62. Which command will allow an administrator to connect to a Cisco device’s VTY line only
over port 22?
Answer: D
Explanation: SSH uses standard TCP port 22 for communication. Although the “transport input
all” command will allow all methods of connection to the VTY line, in order to only allow SSH
we would need to say “transport input ssh” under line configuration mode. It’s a best practice
to disallow less secure telnet connections in this manner.
63. When switching a router configuration from SSHv1 to SSHv2, which command is necessary
in order to provide secure access?
64. Which well-known port number is commonly used to move files and images between a
Cisco router and a TFTP server?
A. TCP 69
B. UDP 69
C. TCP 121
D. UDP 121
Answer: B
Explanation: Trivial File Transfer Protocol (TFTP) is a standard used for transferring files. This
protocol uses UDP communication over well-known port 69, as opposed to File Transfer
Protocol (FTP) which uses TCP for communication over well-known port 21. The UDP
communication used with TFTP makes this a faster method of file transfer.
65. Which version of SNMP added the “inform” command in order to provide positive
acknowledgement of message receipt?
A. SNMPv1
B. SNMPv1.5
C. SNMPv2c
D. SNMPv3
Answer: C
Explanation: The key advantage of SNMPv2c over SNMPv1 is the addition of the “informs”
command. The original version of SNMP uses TRAP messages which are sent between SNMP
entities without any acknowledgement or confirmation of receipt, meaning you have no
assurance that the TRAP was received. SNMPv2c added an INFORM message, which is
essentially a TRAP message that requires an entity to acknowledge that the TRAP was received.
Answer: B
Explanation: The “auth” keyword configures a remote user to receive traps at the “authNoPriv”
security level when using the SNMPv3 security model, meaning that authentication is used but
encryption for privacy is not. SNMPv3 added both authentication and encryption, which can be
used together or individually.
67. Which Syslog command will configure a Cisco device for logging at the Warning level, and
also those levels considered to be more severe?
Answer: C
Explanation: Syslog levels range from most severe Level 0 (Emergency) through informational
Level 7 (Debugging). Warning conditions are specified as Level 4 severity. Configuring a Cisco
device for Syslog Level 4 (Warning) logging means that messages at Level 4 and those
numerically lower are logged. This means that Levels 0-4 are collected, ranging from Emergency
to Warning.
68. What is the general rule of thumb when using Cisco debug commands?
Answer: D
69. Which Cisco IOS command allows us to specifically turn off conditional debugging that has
been put in place for the GigabitEthernet 0/1 interface of a router?
Answer: C
Explanation: The command “no debug condition interface gig 0/1” will specifically remove
conditional debugging that has been configured for the GigabitEthernet 0/1 interface. Although
“no debug all” will also remove the condition, this also turns off all possible debugging in a
global manner.
70. A device within our network that has a statically configured IP address has begun having
communication issues. From a Cisco router acting as a DHCP server, how can we verify an
issue with the IP address?
Answer: A
Explanation: “show ip dhcp conflict” command will display information about any IP address
conflicts detected during DHCP negotiation. If we have a statically assigned IP address on a host
that is within the range of our DHCP pool, it’s possible that this IP address can also be assigned
by the DHCP server, particularly if we fail to create an IP address exclusion within the DHCP
pool to reserve the address.
A. The host and DHCP server are in the same broadcast domain.
B. The hosts and DHCP server are in different broadcast domains.
C. The hosts and DHCP server are directly connected.
D. The hosts and DHCP server are not directly connected.
Answer: B
Explanation: DHCP negotiation starts when a client sends out a broadcast message in order to
obtain IP addressing. If the hosts and DHCP server lie within two different broadcast domains
(e.g. different subnets), the broadcast messages will not be able to reach the DHCP server. This
can be overcome with the DHCP Relay Agent feature of IOS (ip helper-address), which allows a
router to forward DHCP messages from hosts towards the DHCP server, and vice versa.
72. Below is a section of an IP SLA configuration that does not appear to be working properly.
What should be done in order to correct the issue with the IP SLA probe?
***
Operation timeout (milliseconds): 5000
Type of operation to perform: udp-jitter
Target address/Source address: 10.1.1.50/0.0.0.0
Target port/Source port: 16500/0
Codec Packet size: 32
Control Packets: enabled
Schedule:
Operation frequency (seconds): 5
Next scheduled start time: Pending trigger
Group scheduled: FALSE
Life (seconds): Forever
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
***
Answer: C
Explanation: The default administrative distance of a static route is 1. By manually configuring a
static route with an administrative distance higher than 1, we are creating a floating static
route. This is useful in cases where we want to provide a static backup route for a primary link.
An example of this would be configuring two ISP connections and using tracking objects to
automatically switch between those in the case of a failure.
A. NetFlow v4
B. NetFlow v7
C. NetFlow v5
D. NetFlow v9
Answer: C
Explanation: NetFlow v5 has a fixed packet format that is always the same. This makes v5
compatible with most all NetFlow collection device and software packages. NetFlow v5 is the
most popular version for this reason, although NetFlow v9 continues to gain popularity.
NetFlow v9 features a dynamic packet format and uses templates to inform the NetFlow
collector about the format of the flows being exported.
A. NetFlow v9
B. NetFlow v7
C. NetFlow v5
D. NetFlow v4
Answer: A
Explanation: NetFlow v9 adds the ability to report on multicast traffic, both ingress and egress
monitoring. Using NetFlow v9 allows you to add policies such as bandwidth restriction and
quality of service rules to restrict multicast traffic.
76. Which version of NetFlow allows us to use multiple flow monitors and exporters
simultaneously on the same traffic?
A. NetFlow v9
B. NetFlow v10
C. IPFIX
D. Flexible NetFlow
Answer: D
Explanation: Flexible NetFlow allows for the exportation of multiple types of flow records
against the same traffic. This is useful in cases where two different departments might be
interested in monitoring separate aspects of the network traffic, while keeping the flow records
as concise as possible.
77. Which section of Cisco DNA Center is dedicated to proactive issue detection?
A. Design
B. Assurance
C. Policy
D. Provision
Answer: B
Explanation: The Assurance section of Cisco DNA Center uses artificial intelligence and machine
learning to try and predict services issues in the network in a proactive manner. This works by
78. Which tool within Cisco DNA Center Assurance allows us to collect network topology and
routing data from discovered devices?
A. Analytics
B. Contextual Insight
C. Path Trace
D. Network Health
Answer: C
Explanation: The Path Trace tool within Cisco DNA Center Assurance allows us to create a visual
representation of the path between two hosts or Layer 3 interfaces. This essentially works as a
graphical version of the traceroute command, displaying the path through our known topology.