ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

A.

It uses the populated binding table for allowing legitimate traffic.

Answers
B.

It works independent from IPv6 neighbor discovery.

B.

It works independent from IPv6 neighbor discovery.

Answers
C.

It denies traffic from unknown sources or unallocated addresses.

C.

It denies traffic from unknown sources or unallocated addresses.

Answers
D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

Answers
E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Answers
Suggested answer: A, C

Explanation:

An engineer configured access list NON-CISCO in a policy to influence routes

What are the two effects of this route map configuration? (Choose two.)

A.

Packets are not evaluated by sequence 10.

A.

Packets are not evaluated by sequence 10.

Answers
B.

Packets are evaluated by sequence 10.

B.

Packets are evaluated by sequence 10.

Answers
C.

Packets are forwarded to the default gateway.

C.

Packets are forwarded to the default gateway.

Answers
D.

Packets are forwarded using normal route lookup.

D.

Packets are forwarded using normal route lookup.

Answers
E.

Packets are dropped by the access list.

E.

Packets are dropped by the access list.

Answers
Suggested answer: B, C

Explanation:

https://www.cisco.com/c/en/us/support/docs/ip/ip-routed-protocols/47121-pbr-cmds-ce.html

Refer to the exhibit.

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

Answers
B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

Answers
C.

Remove class-map ANY from service-policy CoPP

C.

Remove class-map ANY from service-policy CoPP

Answers
D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

Answers
E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Answers
Suggested answer: A, B

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

A.

Detect Mult

A.

Detect Mult

Answers
B.

Required Min Echo RX Interval

B.

Required Min Echo RX Interval

Answers
C.

Desired Min TX Interval

C.

Desired Min TX Interval

Answers
D.

Required Min RX Interval

D.

Required Min RX Interval

Answers
Suggested answer: C

Explanation:

Desired Min TX Interval: This is the minimum interval, in microseconds, that the local system would like to use when transmitting BFD Control packets, less any jitterapplied. The value zero is reserved.

Required Min Echo RX Interval: This is the minimum interval, in microseconds, between received BFD Echo packets that this system is capable of supporting, less anyjitter applied by the sender. If this value is zero, the transmitting system does not support the receipt of BFD Echo packets.

Reference: https://tools.ietf.org/html/rfc5880

Refer to the exhibit.

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

A.

Configure logging history 2

A.

Configure logging history 2

Answers
B.

Configure logging history 3

B.

Configure logging history 3

Answers
C.

Configure logging history 4

C.

Configure logging history 4

Answers
D.

Configure logging history 5

D.

Configure logging history 5

Answers
Suggested answer: D

Explanation:

By default, the maximum severity sent as a syslog trap is warning. That is why you see syslog traps for login failures. Since a login success is severity 5 (notifications), those syslog messages will not be converted to traps. To fix this, configure:

Note:

The syntax of login block is: login block-for seconds attempts tries within seconds

Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

https://community.cisco.com/t5/networking-documents/stateful-dhcpv6-relay-configurationexample/ta-p/3149338

A network administrator is tasked to permit http and https traffic only toward the internet from theUser1 laptop to adhere to company's security policy. The administrator can still ping towww.cisco.com Which interface should the access list 101 be applied to resolve this issue?

A.

Interface G0/48 in the incoming direction

A.

Interface G0/48 in the incoming direction

Answers
B.

Interface G0/0 in the outgoing direction.

B.

Interface G0/0 in the outgoing direction.

Answers
C.

Interface S1/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

Answers
D.

Interface G0/0 in the incoming direction.

D.

Interface G0/0 in the incoming direction.

Answers
Suggested answer: D

Refer to Exhibit.

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responder

HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

A.

HQ_R1(config)# ip sla responder

HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

Answers
B.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

B.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

Answers
C.

HQ_R2(config)# ip sla responder

HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

C.

HQ_R2(config)# ip sla responder

HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

Answers
D.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

D.

BRANCH(config)# ip sla 1

BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Answers
Suggested answer: D

Explanation:

In the configuration above, the engineer has made a mistake as he was tracking 172.16.35.6 (the backup path) instead of tracking the main path (172.16.35.2). Therefore,when he shut down the main path, the track 1 was still up so traffic still went through the main path -> it failed.

To fix this issue, we just need to correct the tracking interface of the main path.

Refer to Exhibit.

Which two configurations allow clients to get dynamic ip addresses assigned?

A.

Configure access-list 100 permit udp any any eq 61 as the first line

A.

Configure access-list 100 permit udp any any eq 61 as the first line

Answers
B.

Configure access-list 100 permit udp any any eq 86 as the first line

B.

Configure access-list 100 permit udp any any eq 86 as the first line

Answers
C.

Configure access-list 100 permit udp any any eq 68 as the first line

C.

Configure access-list 100 permit udp any any eq 68 as the first line

Answers
D.

Configure access-list 100 permit udp any any eq 69 as the first line

D.

Configure access-list 100 permit udp any any eq 69 as the first line

Answers
E.

Configure access-list 100 permit udp any any eq 67 as the first line

E.

Configure access-list 100 permit udp any any eq 67 as the first line

Answers
Suggested answer: C, E

Explanation:

A DHCP server that receives a DHCPDISCOVER message may respond with a DHCPOFFER message on UDP port 68 (BootP client).

ÖI n the event that the DHCP server is not on the local subnet, the DHCP server will send the DHCPOFFER, as a unicast packet, on UDP port 67, back to the DHCP/BootPRelay Agent from which the DHCPDISCOVER came.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/dynamic-address-allocationresolution/27470-100.html

Which Ipv6 first-hop security feature helps to minimize denial of service attacks?

A.

IPv6 Router Advertisement Guard

A.

IPv6 Router Advertisement Guard

Answers
B.

IPv6 Destination Guard

B.

IPv6 Destination Guard

Answers
C.

DHCPv6 Guard

C.

DHCPv6 Guard

Answers
D.

IPv6 MAC address filtering

D.

IPv6 MAC address filtering

Answers
Suggested answer: B

Explanation:

The Destination Guard feature helps in minimizing denial-of-service (DoS) attacks. It performs address resolutions only for those addresses that are active on the link,and requires the FHS binding table to be populated with the help of the IPv6 snooping feature.The feature enables the filtering of IPv6 traffic based on the destinationaddress, and blocks the NDP resolution for destination addresses that are not found in the binding table. By default, the policy drops traffic coming for an unknowndestination.

Reference:

https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/15S/configuration/guide/7600_15_0s_book/IPv6_Security.pdf

Total 570 questions
Go to page: of 57