300-410 Cisco Exam Updated Dumps
300-410 Cisco Exam Updated Dumps
2.What must be configured by the network engineer to circumvent AS_PATH prevention mechanism
in IP/VPN Hub and Spoke deployment scenarios?
A. Use allows in and as-override at all Pes.
B. Use allowas in and as-override at the PE-Hub.
C. Use Allowas-in the PE_Hub
D. Use as-override at the PE_Hub
Answer: D
3.An engineer is trying to copy an IOS file from one router to another router by using TFTP.
Which two actions are needed to allow the file to copy? (Choose two.)
A. Copy the file to the destination router with the copy tftp: flash: command
B. Enable the TFTP server on the source router with the tftp-server flash: <filename> command
C. TFTP is not supported in recent IOS versions, so an alternative method must be used
D. Configure a user on the source router with the username tftp password tftp command
E. Configure the TFTP authentication on the source router with the tftp-server authentication local
command
Answer: A,B
R1 is configured with IP SLA to check the availability of the server behind R6 but it kept failing.
Which configuration resolves the issue?
A. R1(config)# ip sla 700
R1(config-track)# delay down 30 up 20
B. R1(config)# ip sla 700
R1(config-track)# delay down 20 up 30
C. R1(config)# track 700 ip sla 700
R1(config-track)# delay down 30 up 20
D. R1(config)# track 700 ip sla 700
R1(config-track)# delay down 20 up 30
Answer: C
Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?
A. RouterB(config-if)#lp helper-address 172.31.1.1
B. RouterBiconfig-ififclp helper-address 255.255 255 255
C. RouterB(config-if)#lp helper-address 172.16.1.1
D. RouterB(config-if)#lp helper-address 172.16.1.2
Answer: D
6.165.202.128/27 from ISP2. An engineer is ISP1 reports they are receiving ISP2 routes from
AS65401.
Which configuration onR1 resolves the issue?
A. access-list 10 deny 209.165.202.128 0.0.0.31
access-list 10 permit any
!
router bgp 65401
neighbor 209.165.201.1 distribute-list 10 out
B. access-list 10 deny 209.165.202.128 0.0.0.31
access-list 10 permit any
!
router bgp 65401
neighbor 209.165.201.1 distribute-list 10 in
C. ip route 209.165.200.224 255.255.255.224 209.165.201.1
ip route 209.165.202.128 255.255.255.224 209.165.201.5
D. ip route 0.0.0.0 0.0.0.0 209.165.201.1
ip route 0.0.0.0 0.0.0.0 209.165.201.5
Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/23675-27.html
A loop occurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled.
Which action prevents the loop between R1, R2, and R3?
A. Configure route tagging
B. Enable split horizon
C. Configure R2 as stub receive-only
D. Configure route filtering
Answer: B
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
11.An engineer configured two routers connected to two different service providers using BGP with
default attributes. One of the links is presenting high delay, which causes slowness in the network.
Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second
ISP link is up?
A. LOCAL_PREF
B. MED
C. WEIGHT
D. AS-PATH
Answer: A
12.Exhibit:
Which action resolves the authentication problem?
A. Configure the user name on the TACACS+ server
B. Configure the UDP port 1812 to be allowed on the TACACS+ server
C. Configure the TCP port 49 to be reachable by the router
D. Configure the same password between the TACACS+ server and router.
Answer: D
Explanation:
Explanation
From the last line of the output, we notice that the result was “Invalid AUTHEN packet”. Therefore
something went wrong with the username or password.
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controller-
access-control-system-tacacs-/200467-Troubleshoot-TACACS-Authentication-Issue.html
An engineer recently implemented uRPF by configuring the ip verify unicast source reachable-via rx
command on interface gi0/3 The engineer noticed right after implementing F that an inbound packet
on the giO-3 interface with a source address of 172 16 3 251 was dropped.
Which action resolves the issue?
A. Configure uRPF loose mode to forward the packet.
B. Permit the 172.16.3.251 in the inbound ACL on interface gi0/3.
C. Permit the 172.16.3.251 in the inbound ACL on interface gi0/3 to allow 172.16.3.251.
D. Configure uRPF strict mode to forward the packet
Answer: A
Explanation:
Option A configures uRPF loose mode to forward the packet. This mode allows the router to check if
there is a route in the routing table that matches the source IP address of the incoming packet,
regardless of the interface that is used to reach the source. This mode is suitable for networks that
have asymmetric routing, where the incoming and outgoing interfaces for a packet may differ2.
Option B permits the 172.16.3.251 in the inbound ACL on interface gi0/3. This option does not resolve
the issue, because it only allows the packet to pass the ACL check, but not the uRPF check. The
packet will still be dropped by uRPF if there is no route to reach the source IP address via the same
interface3.
Option C permits the 172.16.3.251 in the inbound ACL on interface gi0/3 to allow 172.16.3.251. This
option is redundant and incorrect, because it repeats the same IP address twice in the ACL
statement. It also does not resolve the issue for the same reason as Option B3.
Option D configures uRPF strict mode to forward the packet. This option does not resolve the issue,
because it is the same mode that was already configured on the interface. Strict mode requires that
the router has a route to reach the source IP address via the same interface where the packet was
received. If this condition is not met, the packet will be dropped4.
16.16.4.0/24
An engineer examines the BGP update for the IPv6 prefix 2001:db8::1/128. which should have been
summarized into a /64 prefix.
Which sequence of actions achieves the summarization?
A. R1 is a route reflector client of a RR with a router ID of 1.1.1.1. and the originator of the prefix has
a router ID of 3.3.3.3. Both routers belong to different ASs. The prefix is not advertised to any peer
and must be advertised using the network statement on R3.
B. R1 is a route reflector with a router ID of 3.3.3.3. and the originator of the prefix is a route reflector
client, which has a router ID of 3.3.3.3. Both routers belong to the same AS Configure an aggregate
address on the router with ID 1.1.1.1 for the prefix
C. R1 is a route reflector with a router ID of 1.111. and the originator of the prefix is a route reflector
client, which has a router ID of 3.3.3.3. Both routers belong to the same AS Configure an aggregate
address on the router with ID 1.1.1.1 for the prefix
D. R1 is a route reflector client of a RR with a router ID of 1.1.1.1. and the originator of the prefix has
a router ID of 3.3.3.3. Both routers belong to the same AS. Configure an aggregate address on the
router with ID 3 3.3.3 for the prefix.
Answer: D
18.Refer to Exhibit.
The network administrator configured the branch router for IPv6 on the E0/0 interface. The
neighboring router is fully configured to meet requirements, but the neighbor relationship is not
coming up.
Which action fixes the problem on the branch router to bring the IPv6 neighbors up?
A. Enable the IPv4 address family under the router ospfv3 4 process by using the address-family ipv4
unicast command
B. Disable IPv6 on the E0/0 interface using the no ipv6 enable command
C. Enable the IPv4 address family under the E0/0 interface by using the address-family ipv4 unicast
command
D. Disable OSPF for IPv4 using the no ospfv3 4 area 0 ipv4 command under the E0/0 interface
Answer: A
Explanation:
Explanation
Once again, Cisco changed the IOS configuration commands required for OSPFv3 configuration. The
new OSPFv3 configuration uses the “ospfv3” keyword instead of the earlier “ipv6 router ospf”
routing process command and “ipv6 ospf” interface commands.
The Open Shortest Path First version 3 (OSPFv3) address families feature enables both IPv4 and
IPv6 unicast traffic to be supported. With this feature, users may
have two processes per interface, but only one process per address family (AF).
19.Refer to the exhibit.
The none area 0 routers in OSPF still receive more specific routes of 10.1.1.0.10.1.2.0.10.1.3.0 from
area 0.
Which action resolves the issue?
A. Configure route summarization on OSPF-enabled interfaces.
B. Summarize by using the summary-address 10.1.0.0 255.255.252.0 command.
C. Summarize by using the area range command on ABRs
D. Configure the summary-address 10.1.0.0 255.255.252.0 command under OSPF process.
Answer: C
21.Refer to Exhibit:
AS 111 wanted to use AS 200 as the preferred path for 172.20.5.0/24 and AS 100 as the backup.
After the configuration, AS 100 is not used for any other routes.
Which configuration resolves the issue?
A. route-mmap SETLP permit 10
match ip address prefix-list PLIST1
set local-preference 99
route-map SETLP permit 20
B. route-map SETLP permit 10
match ip address prefix-list PLIST1
set local-preference 110
route-map SETLP permit 20
C. router bgp 111
no neighbor 192.168.10.1 route-map SETLP in
neighbor 192.168.10.1 route-map SETLP out
D. router bap 111
no neighbor 192.168.10.1 route-map SETLP in
neighbor 192.168.20.2 route-map SE TLP in
Answer: A
Explanation:
There is an implicit deny all at the end of any route-map so all other traffic that does not match
172.20.5.0/24 would be dropped. Therefore we have to add a permit sequence at the end of the route-
map to allow other traffic.
The default value of Local Preference is 100 and higher value is preferred so we have to set the local
preference of AS100 lower than that of AS200.
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: C,E
B)
C)
D)
A. Option
B. Option
C. Option
D. Option
Answer: C
27.DRAG DROP
Drag and drop the operations from the left onto the locations where the operations are performed on
the right.
Answer:
Explanation:
Label Switch Router
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
B)
C)
D)
A. Option
B. Option
C. Option
D. Option
Answer: A
30.Refer to the exhibit.
An engineer is trying to configure local authentication on the console line, but the device is trying to
authenticate using TACACS+.
Which action produces the desired configuration?
A. Add the aaa authentication login default none command to the global configuration.
B. Replace the capital “C” with a lowercase “c” in the aaa authentication login Console local
command.
C. Add the aaa authentication login default group tacacs+ local-case command to the
globalconfiguration.
D. Add the login authentication Console command to the line configuration
Answer: D
Explanation:
Reference: https://community.cisco.com/t5/switching/how-to-define-login-local-for-console-0/td-
p/2949493
33.Users report issues with reachability between areas as soon as an engineer configured summary
routes between areas in a multiple area OSPF autonomous system.
Which action resolves the issue?
A. Configure the summary-address command on the ASBR.
B. Configure the summary-address command on the ABR.
C. Configure the area range command on the ABR.
D. Configure the area range command on the ASBR.
Answer: C
Explanation:
For OSPF, we can only summary at the ABR with the command “area range” or at the ASBR with the
command “summary-address” -> Therefore answer A and answer B are not correct.
In this question, the most likely problem is that when doing summarization, the network mask is
configured wrong and summarization doesn’t work because of the misconfiguration. When
configuring the area range command, make sure that the summarization mask is in the form of a
prefix mask rather than a wildcard mask (that is, 255.255.255.0 instead of 0.0.0.255).
Good reference: https://www.configrouter.com/troubleshooting-route-summarization-ospf-14082/
34.Refer to Exhibit.
A network administrator added one router in the Cisco DNA Center and checked its discovery and
health from the Network Health Dashboard. The network administrator observed that the router is still
showing up as unmonitored.
What must be configured on the router to mount it in the Cisco DNA Center?
A. Configure router with NetFlow data
B. Configure router with the telemetry data
C. Configure router with routing to reach Cisco DNA Center
D. Configure router with SNMPv2c or SNMPv3 traps
Answer: B
Explanation:
Unmonitored: Unmonitored devices are devices for which Assurance did not receive any telemetry
data during the specified time range.
AAA server 10.1.1.1 is configured with the default authentication and accounting settings, but the
switch cannot communicate with the server.
Which action resolves this issue?
A. Match the authentication port
B. Match the accounting port
C. Correct the timeout value.
D. Correct the shared secret.
Answer: A
Explanation:
Command Default
Accounting port: 1813
Authentication port: 1812
Accounting: enabled
Authentication: enabled
Retransmission count: 1
Idle-time: 0
Server monitoring: disabled
Timeout: 5 seconds
Test username: test
Test password: test
Reference: https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/n5k/commands/radius-server-
host.html
By default, RADIUS uses UDP port 1812 for authentication and port 1813 for accounting. In the
exhibit above we see port 1814 is being used for authentication to AAA server at 10.1.1.1 which is not
the default port so we must adjust the authentication port to the default value 1812.
40.An engineer received a ticket about a router that has reloaded. The monitoring system graphs
show different traffic patterns between logical and physical interfaces when the router is rebooted.
Which action resolves the issue?
A. Configure the snmp ifindex persist command globally.
B. Clear the logical interfaces with snmp ifindex clear command
C. Configure the snmp ifindex persist command on the physical interfaces.
D. Trigger a new snmpwalk from the monitoring system to synchronize interface OlDs
Answer: A
An administrator noticed that after a change was made on R1, the timestamps on the system logs did
not match the clock.
What is the reason for this error?
A. An authentication error with the NTP server results in an incorrect timestamp.
B. The keyword localtime is not defined on the timestamp service command.
C. The NTP server is in a different time zone.
D. The system clock is set incorrectly to summer-time hours.
Answer: B
An engineer configured user login based on authentication database on the router, but no one can log
into the router.
Which configuration resolves the issue?
A. aaa authentication login default enable
B. aaa authorization network default local
C. aaa authentication login default local
D. aaa authorization exec default local
Answer: C
B)
C)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
49.Which two labet distribution methods are used by routers in MPLS? (Choose two)
A. targeted hello message
B. LDP discovery hello message
C. LDP session protection message
D. downstream unsolicited
E. downstream on demand
Answer: D,E
51.An engineer must configure a Cisco router to initiate secure connections from the router to other
devices in the network but kept failing.
Which two actions resolve the issue? (Choose two.)
A. Configure a source port for the SSH connection to initiate
B. Configure a TACACS+ server and enable it
C. Configure transport input ssh command on the console
D. Configure a domain name
E. Configure a crypto key to be generated
Answer: D,E
Explanation:
Follow these guidelines when configuring the switch as an SSH server or SSH client:
+ An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse.
+ If the SSH server is running on a stack master and the stack master fails, the new stack master
uses the RSA key pair generated by the previous stack master
+ If you get CLI error messages after entering the crypto key generate rsa global configuration
command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and
then enter the crypto key generate rsa command.
+ When generating the RSA key pair, the message No host name specified might appear. If it does,
you must configure a hostname by using the hostname global configuration command.
+ When generating the RSA key pair, the message No domain specified might appear. If it does, you
must configure an IP domain name by using the ip domain-nameglobal configuration command.
+ When configuring the local authentication and authorization authentication method, make sure that
AAA is disabled on the console.
Reference: https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3.2_0_se/
multibook/configuration_guide/b_consolidated_config_guide_3850_chapter_01100
55.Refer to exhibit.
Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to
services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when
the show ip route profile command is run.
How must the services be stabilized?
A. The issue with using BGP must be resolved by using another protocol and redistributing it into
EIGRP on R3
B. The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3
C. The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3
D. The issue with using iBGP must be fixed by running eBGP between R3 and R4
Answer: B
Explanation:
After redistribution, R3 learns about network 10.1.1.0/24 via two paths:
+ Internal BGP (IBGP): advertised from R4 with AD of 200 (and metric of 0)
+ OSPF: advertised from R1 with AD of 110 (O E2) (and metric of 20)
Therefore R3 will choose the path with the lower AD via OSPF But this is a looped path which is
received from R3 -> R2 -> R1 -> R3. So when the advertised route from R4 is expired, the looped
path is also expired soon and R3 will reinstall the main path from R4. This is the cause of intermittent
connectivity. In order to solve this issue, we can lower the AD of iBGP to a value which is lower than
110 so that it is preferred over OSPF-advertised route.
An organization is installing a new L3 MPLS link to establish DM VPN Phase 2 tunnels between the
hub and two spoke routers.
Which additional configuration should the engineer implement on each device to achieve optimal
routing between the spokes?
A)
B)
C)
D)
A. Option
B. Option
C. Option
D. Option
Answer: C
57.Which Layer 3 VPN attribute allows different customers to connect to the same MPLS network
with overlapping IP ranges?
A. VRF
B. RT
C. MP-BGP
D. RD
Answer: D
Explanation:
In a Layer 3 VPN (Virtual Private Network) over an MPLS (Multiprotocol Label Switching) network, the
attribute that allows different customers to connect with overlapping IP ranges is the Route
Distinguisher (RD)123.
RD is a unique identifier that is prepended to each IP address in a customer’s VPN to create a
unique VPNv4 address. This allows customers to use overlapping IP addresses without conflict123.
The RD makes it possible for the same IP prefix to exist in different VPNs, which is crucial when
customers have overlapping IP ranges123.
Reference: MPLS Layer 3 VPN Explained - NetworkLessons.com
MPLS: Layer 3 VPNs Configuration Guide - Cisco
Understanding Using MPLS-Based Layer 3 VPNs on Switches - Juniper
58.A network administrator successfully established a DMVPN tunnel with one hub and two spokes
using EIGRP. One of the requirements was to enable spoke-to-spoke tunnels through the hub router
using EIGRP.
Which configuration command must the engineer configure to meet the requirement?
A. no ip eigrp 1 mode multipoint
B. no ip eigrp 1 split-horizon
C. no ip eigrp 1 tunnel-redirect
D. no ip eigrp 1 mode mgre
Answer: B
APC is configured to obtain an IP address automatically, but it receives an IP address only from the
169.254.0.0 subnet The DHCP server logs contained no DHCPDISCOVER message from the MAC
address of the PC.
Which action resolves the issue?
A. Configure an ip helper-address on the router to forward DHCP messages to the server.
B. Configure DHCP Snooping on the switch to forward DHCP messages to the server.
C. Configure a DHCP reservation on the server for the PC.
D. Configure a static IP address on the PC and exclude it from the DHCP pool.
Answer: A
An engineer notices a connectivity problem between routers R1 and R2. The frequency of this
problem is high during peak business hours.
Which action resolves the issue?
A. Increase the MTU on the interfaces that connect R1 and R2.
B. Increase the available bandwidth between R1 and R2.
C. Decrease the EIGRP keepallve and hold down timers on R1 and R2.
D. Set static EIGRP neighborship between R1 and R2.
Answer: B
61.The network administrator configured CoPP so that all SNMP traffic from Cisco Prime located at
192.168.1.11 toward the router CPU is limited to 1000 kbps.
Any traffic that exceeds this limit must be dropped.
access-list 100 permit udp any any eq 161
!
class-map CM-SNMP
match access-group 100
!
policy-map PM-COPP
class CM-SNMP
police 1000 conform-action transmit
!
control-plane
service-policy input PM-COPP
The network administrator is not getting the desired result for the SNMP traffic and SNMP traffic is
getting dropped frequently.
Which set of configurations resolves the issue?
A. no access-list 100
access-list 100 permit tcp host 192.168.1.11 any eq 161
B. no access-list 100
access-list 100 permit udp host 192.168.1.11 any eq 161
!
policy-map PM-COPP
class CM-SNMP
no police 1000 conform-action transmit
police 1000000 conform-action transmit
!
control-plane
no service-policy input PM-COPP
!
interface E 0/0
service-policy input PM-COPP
!
interface E 0/1
service-policy input PM-COPP
C. no access-list 100
access-list 100 permit udp host 192.168.1.11 any eq 161
!
policy-map PM-COPP
class CM-SNMP
no police 1000 conform-action transmit
police 1000000 conform-action transmit
D. policy-map PM-COPP class CM-SNMP
no police 1000 conform-action transmit police 1000000 conform-action transmit
Answer: C
Explanation:
In the context of Control Plane Policing (CoPP) in Cisco devices, the rate limit is specified in bits per
second (bps), not kilobits per second (kbps). Therefore, a limit of 1000 kbps should indeed be entered
as 1,000,000 bps in the CoPP configuration.
Also, the access list should be configured to match the specific SNMP traffic from the Cisco Prime IP
address (192.168.1.11), as you correctly pointed out.
Here’s the corrected configuration:
no access-list 100
access-list 100 permit udp host 192.168.1.11 any eq 161
!
policy-map PM-COPP
class CM-SNMP
no police 1000 conform-action transmit
police 1000000 conform-action transmit
This configuration ensures that only the SNMP traffic from Cisco Prime is policed and any excess
traffic is dropped, preventing the router’s CPU from being overwhelmed.
62.A network administrator is troubleshooting a high utilization issue on the route processor of a
router that was reported by NMS The administrator logged into the router to check the control plane
policing and observed that the BGP process is dropping a high number of routing packets and
causing thousands of routes to recalculate frequently.
Which solution resolves this issue?
A. Police the cir for BGP, conform-action transmit, and exceed action transmit.
B. Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frde-transmit.
C. Shape the cir for BGP. conform-action transmit, and exceed action transmit.
D. Police the pir for BGP, conform-action set-prec-transmit, and exceed action set-clp-transmit.
Answer: D
Explanation:
CIR (Committed Information Rate) is the minimum guaranteed traffic delivered in the network.
PIR (Peak Information Rate) is the top bandwidth point of allowed traffic in a non busy times without
any guarantee.
+ Policing: is used to control the rate of traffic flowing across an interface. During a bandwidth exceed
(crossed the maximum configured rate), the excess traffic is generally dropped or remarked. The
result of traffic policing is an output rate that appears as a saw-tooth with crests and troughs. Traffic
policing can be applied to inbound and outbound interfaces. Unlike traffic shaping, QoS policing
avoids delays due to queuing. Policing is configured in bytes.
+ Shaping: retains excess packets in a queue and then schedules the excess for later transmission
over increments of time. When traffic reaches the maximum configured rate, additional packets are
queued instead of being dropped to proceed later. Traffic shaping is applicable only on outbound
interfaces as buffering and queuing happens only on outbound interfaces. Shaping is configured in
bits per second.
Therefore in this case we can only policing, not shaping as traffic shaping is applicable only on
outbound interfaces as buffering and queuing happens only on outbound interfaces. Moreover, BGP
traffic is not important so we can drop the excess packets without any problems.
And we only policing the PIR traffic so that the route processor is not overwhelmed by BGP
calculation.
Note: The “set-prec-transmit” is the same as “transmit” command except it sets the IP Precedence
level as well. The “set-clp-transmit” sets the ATM Cell Loss Priority (CLP) bit from 0 to 1 on the ATM
cell and transmits the packet.
64.Which IPv6 feature enables a device to reject traffic when it is originated from an address that is
not stored in the device binding table?
A. IPv6 Snooping
B. IPv6 Source Guard
C. IPv6 DAD Proxy
D. IPv6 RA Guard
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/xe-3s/ip6f-xe-3s-
book/ip6-src-guard.html
65.A CoPP policy is applied for receiving SSH traffic from the WAN interface on a Cisco ISR4321
router. However, the SSH response from the router is abnormal and stuck during the high link
utilization. The problem is identified as SSH traffic does not match in the ACL.
Which action resolves the issue?
A. Rate-limit SSH traffic to ensure dedicated bandwidth.
B. Apply CoPP on the control plane interface.
C. Increase the IP precedence value of SSH traffic to 6.
D. Apply CoPP on the WAN interface inbound direction.
Answer: B
Explanation:
Explanation
The problem is “SSH traffic does not match in the ACL” and “CoPP policy is applied for receiving
SSH traffic from the WAN interface” so we should apply CoPP on the control plane interface instead.
68.How does an MPLS Layer 3 VPN differentiate the IP address space used between each VPN?
A. by RD
B. by address family
C. by MP-BGP
D. byRT
Answer: A
A junior engineer configured SNMP to network devices. Malicious users have uploaded different
configurations to the network devices using SNMP and TFTP servers.
Which configuration prevents changes from unauthorized NMS and TFTP servers?
A. access-list 20 permit 10.221.10.11
access-list 20 deny any log
!
snmp-server group NETVIEW v3 priv read NETVIEW access 20
snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20
snmp-server community Cisc0Us3r RO 20
snmp-server community Cisc0wrus3r RW 20
snmp-server tftp-server-list 20
B. access-list 20 permit 10.221.10.11
access-list 20 deny any log
!
snmp-server group NETVIEW v3 priv read NETVIEW access 20
snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20
snmp-server community Cisc0wrus3r RO 20
snmp-server community Cisc0Us3r RW 20
snmp-server tftp-server-list 20
C. access-list 20 permit 10.221.10.11
access-list 20 deny any log
D. access-list 20 permit 10.221.10.11
Answer: A
An enterprise operations team must monitor all application server traffic in the data center The team
finds that traffic coming from the hub site from R3 and R6 rs monitored successfully but traffic
destined to the application server is not monitored.
Which action resolves the issue?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is
causing unnecessary traffic to pass through the interface.
Which command must be configured to resolve the issue?
A. access-class INTERNET in
B. ipv6 traffic-filter INTERNET in
C. ipv6 access-class INTERNET in
D. ip access-group INTERNET in
Answer: C
77.Which feature drops packets if the source address is not found in the snooping table?
A. IPv6 Source Guard
B. IPv6 Destination Guard
C. IPv6 Prefix Guard
D. Binding Table Recovery
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/xe-3s/ip6f-xe-3s-
book/ip6-snooping.pdf
Router R4 is configured correctly with default OSPF values. A network engineer configured R7 for
OSPF. R7 must not be elected as a DR for the segment between R4-R7. The adjacency between R4
and R7 failed to form.
Which configuration resolves the issue?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
80.Refer to the exhibit.
R1 cannot receive the R2 Interfaces with individual prefixes.
What must be reconfigured to advertise R2 Interfaces to R1?
A. EIGRP process on R2 by removing the stub command Keyword summary
B. interface FastEthernet0/1 on R2 with an EIGRP summary for all three loopback prefixes
C. EIGRP process on R2 with the command stub summary receive-only
D. EIGRP process on R2 with the command stub summary connected
Answer: D
81.Refer to the exhibit.
82.SIMULATION
A network is configured with IP connectivity, and the routing protocol between devices started having
problems right after the maintenance window to implement network changes.
Troubleshoot and resolve to a fully functional network to ensure that:
R4
R5
Answer:
R4
Int range et0/0 C 1
Ip ospf authentication message-digest
Ip ospf message-digest-key 1 md5 CCNP
Router ospf 1
Redistribute connected subnets route-map to-ospf metric-type 1
Copy run start
R5
Int range et0/0 C 1
Ip ospf authentication message-digest
Ip ospf message-digest-key 1 md5 CCNP
Interface eth 0/1
Ip ospf cost 10
Copy run start
VERIFICATION: -
83.A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command.
Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU
over GRE?
A. ip tcp adjust-mss 1360
crypto ipsec fragmentation after-encryption
B. ip tcp adjust-mtu 1360
crypto ipsec fragmentation after-encryption
C. ip tcp adjust-mss 1360
crypto ipsec fragmentation mtu-discovery
D. ip tcp adjust-mtu 1360
crypto ipsec fragmentation mtu-discovery
Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/dynamic-multipoint-vpn-dmvpn/111976-dmvpn-
troubleshoot-00.html
86.SIMULATION
A network is configured with CoPP to protect the CORE router route processor for stability and DDoS
protection. As a company policy, a class named class-default is preconfigured and must not be
modified or deleted.
Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:
WAN
CORE
MGMT
Answer:
CORE
policy-mao CoPP
class CoPP-CRITICAL
police 1000000 50000 50000 conform-action transmit exceed-action transmit
Text Description automatically generated with medium confidence
CORE# Copy run start
TESTING: -
CORE
The administrator noticed that the connection was flapping between the two ISPs instead of switching
to ISP2 when the ISP1 failed.
Which action resolves the issue?
A. Include a valid source-interface keyword in the icmp-echo statement.
B. Reference the track object 1 on the default route through ISP2 instead of ISP1.
C. Modify the static routes to refer both to the next hop and the outgoing intertace.
D. Modify the threshold to match the administrative distance of the ISP2 route.
Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/ip/ip-routing/200785-ISP-Failover-withdefault-routes-
using-I.html
88.Refer to the exhibit.
Refer to the exhibit. A network engineer receives a report that Spoke 1 users can perform bank
transactions with the server located at the Center site, but Spoke 2 users cannot.
Which action resolves the issue?
A. Configure the Spoke 2 users IP on the router B OSPF domain
B. Configure encapsulation dot1q 78 on the router C interface.
C. Configure IPv6 on the routers B and C interfaces
D. Configure OSPFv2 on the routers B and C interfaces
Answer: C
89.Which IP precedence value does BFD use to prioritize traffic within an infrastructure device?
A. 4
B. 5
C. 6
D. 7
Answer: D
The authentication is not working as desired and the user drops into user-exec mode.
Which configuration resolves the issue?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C