ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted.

Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

A.

Configure all devices for SNMPv3 informs with priv.

Answers
B.

Configure all devices for SNMPv3 informs with auth.

B.

Configure all devices for SNMPv3 informs with auth.

Answers
C.

Configure all devices for SNMPv3 traps with auth.

C.

Configure all devices for SNMPv3 traps with auth.

Answers
D.

Configure all devices for SNMPv3 traps with priv.

D.

Configure all devices for SNMPv3 traps with priv.

Answers
Suggested answer: A

Explanation:

SNMP notifications can be sent as traps or inform requests. Traps are unreliable because the receiver does not send acknowledgments when this device receives traps."Send reliable and encrypted notifications for any events" so it is SNMP notifications. For encryption we need to configure "priv".

Refer to the exhibit.

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

Answers
B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

Answers
C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

Answers
D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Answers
Suggested answer: C

Explanation:

https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocoleigrp/8606-redist.html

Refer to the exhibit.

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Answers
B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

Answers
C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

Answers
D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lancontrollers/109597-csr-chained-certificates-wlc-00.html#anc12


Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

A.

IPv6 Source Guard

Answers
B.

IPv6 Destination Guard

B.

IPv6 Destination Guard

Answers
C.

IPv6 Prefix Guard

C.

IPv6 Prefix Guard

Answers
D.

Binding Table Recovery

D.

Binding Table Recovery

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/xe-3s/ip6f-xe-3sbook/ip6-snooping.pdf

Refer to the exhibit.

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

A.

Re-issue the ip sla schedule command.

Answers
B.

Add icmp-echo command for the host.

B.

Add icmp-echo command for the host.

Answers
C.

Add the control disable option to the tcp connect.

C.

Add the control disable option to the tcp connect.

Answers
D.

Modify the ip sla schedule frequency to forever.

D.

Modify the ip sla schedule frequency to forever.

Answers
Suggested answer: C

Refer to the exhibit.

The network administrator must mutually redistribute routes at the Chicago router to the LA and NewYork routers. The configuration of the Chicago router is this:

After the configuration, the LA router receives all the NewYork routes, but NewYork router does not receive any LA routes. Which set of configurations fixes the problem on the Chicago router?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.

D.

Answers
Suggested answer: B

Refer to the exhibit.

An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface. Which action resolves the issue?

A.

Modify line 10 of the access list to permit instead of deny.

A.

Modify line 10 of the access list to permit instead of deny.

Answers
B.

Remove line 60 from the access list.

B.

Remove line 60 from the access list.

Answers
C.

Modify line 30 of the access list to permit instead of deny.

C.

Modify line 30 of the access list to permit instead of deny.

Answers
D.

Remove line 70 from the access list.

D.

Remove line 70 from the access list.

Answers
Suggested answer: C

An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME.

WRONGDIGEST". Which action resolves the issue?

A.

Configure the correct authentication password using SNMPv3 authPriv .

A.

Configure the correct authentication password using SNMPv3 authPriv .

Answers
B.

Configure the correct authentication password using SNMPv3 authNoPriv.

B.

Configure the correct authentication password using SNMPv3 authNoPriv.

Answers
C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

Answers
D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-3se/3850/snmp-xe-3se-3850-book/nm-snmp-snmpv3.html

Refer to the exhibits.

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.

D.

Answers
Suggested answer: B

Refer to the exhibits.

When DMVPN is configured, which configuration allows spoke-to-spoke communication using loopback as a tunnel source?

A.

Configure crypto isakmp key cisco address 0.0.0.0 on the hub.

A.

Configure crypto isakmp key cisco address 0.0.0.0 on the hub.

Answers
B.

Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.

B.

Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.

Answers
C.

Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.

C.

Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.

Answers
D.

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.

D.

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/en/US/technologies/tk583/tk372/technologies_white_paper0900aecd802b8f3c.html

Total 570 questions
Go to page: of 57