Cisco 300-410 Practice Test - Questions Answers, Page 14
List of questions
Related questions
What are two functions of IPv6 Source Guard? (Choose two.)
It uses the populated binding table for allowing legitimate traffic.
It works independent from IPv6 neighbor discovery.
It denies traffic from unknown sources or unallocated addresses.
It denies traffic by inspecting neighbor discovery packets for specific pattern.
It blocks certain traffic by inspecting DHCP packets for specific sources.
An engineer configured access list NON-CISCO in a policy to influence routes
What are the two effects of this route map configuration? (Choose two.)
Packets are not evaluated by sequence 10.
Packets are evaluated by sequence 10.
Packets are forwarded to the default gateway.
Packets are forwarded using normal route lookup.
Packets are dropped by the access list.
Refer to the exhibit.
Which two actions restrict access to router R1 by SSH? (Choose two.)
Configure transport input ssh on line vty and remove sequence 30 from access list 100.
Configure transport output ssh on line vty and remove sequence 20 from access list 100.
Remove class-map ANY from service-policy CoPP
Configure transport output ssh on line vty and remove sequence 10 from access list 199.
Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199
What is the minimum time gap required by the local system before putting a BFD control packet on the wire?
Detect Mult
Required Min Echo RX Interval
Desired Min TX Interval
Required Min RX Interval
Refer to the exhibit.
The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?
Configure logging history 2
Configure logging history 3
Configure logging history 4
Configure logging history 5
Clients on ALS2 receive IPv4 and IPv6 addresses but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?
Option A
Option B
Option C
Option D
A network administrator is tasked to permit http and https traffic only toward the internet from theUser1 laptop to adhere to company's security policy. The administrator can still ping towww.cisco.com Which interface should the access list 101 be applied to resolve this issue?
Interface G0/48 in the incoming direction
Interface G0/0 in the outgoing direction.
Interface S1/0 in the outgoing direction.
Interface G0/0 in the incoming direction.
Refer to Exhibit.
Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?
HQ_R1(config)# ip sla responder
HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2
BRANCH(config)# ip sla 1
BRANCH(config-ip-sla)# icmp-echo 172.16.35.1
HQ_R2(config)# ip sla responder
HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5
BRANCH(config)# ip sla 1
BRANCH(config-ip-sla)# icmp-echo 172.16.35.2
Refer to Exhibit.
Which two configurations allow clients to get dynamic ip addresses assigned?
Configure access-list 100 permit udp any any eq 61 as the first line
Configure access-list 100 permit udp any any eq 86 as the first line
Configure access-list 100 permit udp any any eq 68 as the first line
Configure access-list 100 permit udp any any eq 69 as the first line
Configure access-list 100 permit udp any any eq 67 as the first line
Which Ipv6 first-hop security feature helps to minimize denial of service attacks?
IPv6 Router Advertisement Guard
IPv6 Destination Guard
DHCPv6 Guard
IPv6 MAC address filtering
Question