ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

A.

The label edge router swaps labels on the received packets.

Answers
B.

Labels are imposed in packets after the Layer 3 header.

B.

Labels are imposed in packets after the Layer 3 header.

Answers
C.

LDP uses TCP for reliable delivery of information.

C.

LDP uses TCP for reliable delivery of information.

Answers
D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

Answers
E.

A maximum of two labels can be imposed on an MPLS packet.

E.

A maximum of two labels can be imposed on an MPLS packet.

Answers
Suggested answer: C, D

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switchingmpls/mpls/4649-mpls-faq-4649.html

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

Answers
B.

by the recovery mechanism to recover the binding table in the event of a device reboot

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

Answers
C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

Answers
D.

by various IPv6 guard features to validate the data link layer address

D.

by various IPv6 guard features to validate the data link layer address

Answers
E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Answers
Suggested answer: B, D

Explanation:

Overview of the IPv6 First-Hop Security Binding Table

A database table of IPv6 neighbors connected to the device is created from information sources such as NDP snooping. This database, or binding table, is used by variousIPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.

IPv6 First-Hop Security Binding Table Recovery MechanismThe IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6-fhs-bind-table.html

Refer to the exhibit. A network administrator configured an IPv6 access list to allow TCP return traffic only, but it is not working as expected. Which changes resolve this issue?

A.

ipv6 access-list inbound permit tcp any any syn deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound out

A.

ipv6 access-list inbound permit tcp any any syn deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound out

Answers
B.

ipv6 access-list inbound permit tcp any any syn deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound in

B.

ipv6 access-list inbound permit tcp any any syn deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound in

Answers
C.

ipv6 access-list inbound permit tcp any any established deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound in

C.

ipv6 access-list inbound permit tcp any any established deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound in

Answers
D.

ipv6 access-list inbound permit tcp any any established deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound out

D.

ipv6 access-list inbound permit tcp any any established deny ipv6 any any log !i nterface gi0/0 ipv6 traffic-filter inbound out

Answers
Suggested answer: C

Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source The configuration did not work as desired Which service must be enabled to resolve the issue?

A.

Enter the service timestamps log datetime localtime global command.

A.

Enter the service timestamps log datetime localtime global command.

Answers
B.

Enter the service timestamps log datetime synchronize global command.

B.

Enter the service timestamps log datetime synchronize global command.

Answers
C.

Enter the service timestamps log datetime console global command.

C.

Enter the service timestamps log datetime console global command.

Answers
D.

Enter the service timestamps log datetime clock-period global command

D.

Enter the service timestamps log datetime clock-period global command

Answers
Suggested answer: B

Explanation:

If a router is configured to get the time from a Network Time Protocol (NTP) server, the times in the router's log entries may be different from the time on the systemclock if the [localtime] option is not in the service timestamps log command. To solve this issue, add the [localtime] option to the service timestamps log command. Thetimes should now be synchronized between the system clock and the log message timestamps.

Reference: https://community.cisco.com/t5/networking-documents/router-log-timestamp-entriesare-different-from-the-system-clock/ta-p/3132258


Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

A.

jpv6 unicast-routing

Answers
B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

Answers
C.

permit ip any any on access list EGRESS2 on Router1

C.

permit ip any any on access list EGRESS2 on Router1

Answers
D.

IPv6 address on GigabitEthernet0/0

D.

IPv6 address on GigabitEthernet0/0

Answers
Suggested answer: D

Explanation:

--------------------------R1--------------------------------------------- interface Ethernet0/0 ip address 209.165.201.1 255.255.255.0 ip access-group EGRESS2 out ipv6 address 2001:DB8::1/64 end ---------------------- R2-------------------------------------------------- interface Ethernet0/0 ip address 209.165.201.25 255.255.255.0 ipv6 address 2001:DB8::2/64 ipv6 address autoconfig ipv6 nd autoconfig default-route ipv6 nd cache expire 60 ipv6 nd ra suppress ipv6 traffic-filter INGRESS in end IOU_Router2#telnet 2001:DB8::1 Trying 2001:DB8::1 ... Open IOU_Router1> ------------------------------------------------------------------------------

Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages.

After applying the filter, the engineer noticed that it filtered required messages as well. Which action must the engineer take to resolve the issue?

A.

Configure syslog level 2.

A.

Configure syslog level 2.

Answers
B.

Configure syslog level 3.

B.

Configure syslog level 3.

Answers
C.

Configure syslog level 4.

C.

Configure syslog level 4.

Answers
D.

Configure syslog level 5.

D.

Configure syslog level 5.

Answers
Suggested answer: D

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

A.

Packets are not forwarded to the specific next hop.

A.

Packets are not forwarded to the specific next hop.

Answers
B.

Packets are forwarded based on the routing table.

B.

Packets are forwarded based on the routing table.

Answers
C.

Packets are forwarded based on a static route.

C.

Packets are forwarded based on a static route.

Answers
D.

Packets are forwarded to the specific next hop.

D.

Packets are forwarded to the specific next hop.

Answers
Suggested answer: D

Explanation:

The set ip default next-hop command verifies the existence of the destination IP address in the routing table, andÖ+ if the destination IP address exists, the command does not policy route the packet, but forwards the packet based on the routing table.+ if the destination IP address does not exist, the command policy routes the packet by sending it to the specified next hop.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/ip-routed-protocols/47121-pbr-cmdsce.html


Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3.

Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

Answers
B.

Configure the variance 4 command under the EIGRP process on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

Answers
C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

Answers
D.

Configure the variance 2 command under the EIGRP process on R2

D.

Configure the variance 2 command under the EIGRP process on R2

Answers
Suggested answer: B

Explanation:

From the output of the "show ip eigrp topology Ö" command, we notice network 192.168.13.0/24 was learned via two routes:+ From 192.168.23.3 (R3) with FD = 1075200 and AD = 281600+ From 192.168.12.1 (R1) with FD = 2611200 and AD = 281600 From the output of the "show ip route Ö" command, we learned that the best (and chosen) path is via 192.168.23.3 (R3).

To use both paths (called unequal cost load balancing) with EIGRP, the second path via R1 must satisfy the feasibility condition. The feasibility condition states that, theAdvertised Distance (AD) of a route must be lower than the feasible distance of the current successor route.

In this case, the second path satisfies the feasible condition as its AD (281600) is smaller than the FD (1075200) of the best path. Therefore we can configure loadbalancing with "variance" command.

In other words, EIGRP will install all paths with metric < variance * best_metric into the local routing table, provided that it meets the feasibility condition to preventrouting loop. Therefore we can calculate the variance > metric / best_metric = 2611200 / 1075200 =2.4.

So with a variance greater than 2 (and must be an integer), we can load balance traffic to network 192.168.13.0/24.

Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

Answers
B.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

Answers
C.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

C.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Answers
D.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

D.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

Answers
Suggested answer: A


Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

A.

Remove the current autonomous system number on one of the routers and change to a different value.

A.

Remove the current autonomous system number on one of the routers and change to a different value.

Answers
B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

B.

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

Answers
C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

C.

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

Answers
D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

D.

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Answers
Suggested answer: B
Total 570 questions
Go to page: of 57