ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











Refer to Exhibit.

A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored. What must be configured on the router to mount it in the Cisco DNA Center?

A.

Configure router with NetFlow data

A.

Configure router with NetFlow data

Answers
B.

Configure router with the telemetry data

B.

Configure router with the telemetry data

Answers
C.

Configure router with routing to reach Cisco DNA Center

C.

Configure router with routing to reach Cisco DNA Center

Answers
D.

Configure router with SNMPv2c or SNMPv3 traps

D.

Configure router with SNMPv2c or SNMPv3 traps

Answers
Suggested answer: B

Explanation:

Unmonitored: Unmonitored devices are devices for which Assurance did not receive any telemetry data during the specified time range.

Exhibit:

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

A.

Check and resolve reachability between the WLC and the NTP server

A.

Check and resolve reachability between the WLC and the NTP server

Answers
B.

Reset the NTP server to resolve any synchronization issues tor all devices

B.

Reset the NTP server to resolve any synchronization issues tor all devices

Answers
C.

Check and resolve reachability between Cisco DNA Center and the NTP server

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

Answers
D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Answers
Suggested answer: D

Explanation:

Excessive time lag between Cisco DNA Center and device: The time difference between Cisco DNA Center and the device IP Address has drifted too far apart. CiscoDNA Center cannot process the device data accurately if the time difference is more than 3 minutes.

Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/networkautomation-and-management/dna-center-assurance/1-2-10/b_cisco_dna_assurance_1_2_10_ug/b_cisco_dna_assurance_1_2_10_ug_chapter_01101.html

Refer to Exhibit.

A network administrator enables DHCP snooping on the Cisco Catalyst 3750-X switch and configures the uplink port (Port-channel2) as a trusted port. Clients are not receiving an IP address, but when DHCP snooping is disabled, clients start receiving IP addresses. Which global command resolves the issue?

A.

No ip dhcp snooping information option

A.

No ip dhcp snooping information option

Answers
B.

ip dhcp snooping

B.

ip dhcp snooping

Answers
C.

ip dhcp relay information trust portchannel2

C.

ip dhcp relay information trust portchannel2

Answers
D.

ip dhcp snooping trust

D.

ip dhcp snooping trust

Answers
Suggested answer: A

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A.

VACL blocking broadcast frames from nonauthorized hosts

A.

VACL blocking broadcast frames from nonauthorized hosts

Answers
B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

Answers
C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

Answers
D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

Answers
Suggested answer: B

Explanation:

The IPv6 Router Advertisement Guard feature provides support for allowing the network administrator to block or reject unwanted or rogue router advertisement guard messages that arrive at the network device platform. Router

Advertisements are used by devices to announce themselves on the link. The IPv6 Router Advertisement Guard feature analyzes these router advertisements and filters out router advertisements that are sent by unauthorized devices.

Certain switch platforms can already implement some level of rogue RA filtering by the administrator configuring Access Control Lists (ACLs) that block RA ICMP messages that might be inbound on "user" ports.

Reference: https://datatracker.ietf.org/doc/html/rfc6104

Refer to Exhibit:

AS 111 wanted to use AS 200 as the preferred path for 172.20.5.0/24 and AS 100 as the backup. After the configuration, AS 100 is not used for any other routes. Which configuration resolves the issue?

A.

route-mmap SETLP permit 10 match ip address prefix-list PLIST1 set local-preference 99 route-map SETLP permit 20

A.

route-mmap SETLP permit 10 match ip address prefix-list PLIST1 set local-preference 99 route-map SETLP permit 20

Answers
B.

route-map SETLP permit 10 match ip address prefix-list PLIST1 set local-preference 110 route-map SETLP permit 20

B.

route-map SETLP permit 10 match ip address prefix-list PLIST1 set local-preference 110 route-map SETLP permit 20

Answers
C.

router bgp 111 no neighbor 192.168.10.1 route-map SETLP in neighbor 192.168.10.1 route-map SETLP out

C.

router bgp 111 no neighbor 192.168.10.1 route-map SETLP in neighbor 192.168.10.1 route-map SETLP out

Answers
D.

router bap 111 no neighbor 192.168.10.1 route-map SETLP in neighbor 192.168.20.2 route-map SE TLP in

D.

router bap 111 no neighbor 192.168.10.1 route-map SETLP in neighbor 192.168.20.2 route-map SE TLP in

Answers
Suggested answer: A

Explanation:

There is an implicit deny all at the end of any route-map so all other traffic that does not match 172.20.5.0/24 would be dropped. Therefore we have to add a permitsequence at the end of the route-map to allow other traffic.

The default value of Local Preference is 100 and higher value is preferred so we have to set the local preference of AS100 lower than that of AS200.

Refer to the exhibit.

The Math and Science departments connect through the corporate. IT router but users in the Math department must not be able to reach the Science department and vice versa Which configuration accomplishes this task?

A.

vrf definition Science

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

A.

vrf definition Science

!

interface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!

interface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

Answers
B.

vrf definition Science

address-family ipv4

!

nterface E 0/2

ip address 192.168.1.1 255.255.255.0

vrf forwarding Science

no shut

!i

nterface E 0/3

ip address 192.168.2.1 255.255.255.0

vrf forwarding Science

no shut

B.

vrf definition Science

address-family ipv4

!

nterface E 0/2

ip address 192.168.1.1 255.255.255.0

vrf forwarding Science

no shut

!i

nterface E 0/3

ip address 192.168.2.1 255.255.255.0

vrf forwarding Science

no shut

Answers
C.

vrf definition Science

address-family ipv4

!i

nterface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!i

nterface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

C.

vrf definition Science

address-family ipv4

!i

nterface E 0/2

ip address 192.168.1.1 255.255.255.0

no shut

!i

nterface E 0/3

ip address 192.168.2.1 255.255.255.0

no shut

Answers
D.

vrf definition Science

address-family ipv4

!i

nterface E 0/2

vrf forwarding Science

ip address 192.168.1.1 255.255.255.0

no shut

!i

nterface E 0/3

vrf forwarding Science

ip address 192.168.2.1

D.

vrf definition Science

address-family ipv4

!i

nterface E 0/2

vrf forwarding Science

ip address 192.168.1.1 255.255.255.0

no shut

!i

nterface E 0/3

vrf forwarding Science

ip address 192.168.2.1

Answers
Suggested answer: D

An engineer configured Reverse Path Forwarding on an interface and noticed that the routes are dropped when a route lookup fails on that interface for a prefix that is available in the routing table Which interface configuration resolves the issue?

A.

ip verify unicast source reachable-via rx

A.

ip verify unicast source reachable-via rx

Answers
B.

ip verify unicast source reachable-via any

B.

ip verify unicast source reachable-via any

Answers
C.

ip verify unicast source reachable-via allow-default

C.

ip verify unicast source reachable-via allow-default

Answers
D.

ip verify unicast source reachable-via 12-src

D.

ip verify unicast source reachable-via 12-src

Answers
Suggested answer: B

Explanation:

According to this question, uRPF is running in strict mode because packets are dropped even when that route exists in the routing table. Maybe packets are dropped because the receiving interface is different from the interface the local router uses to send packets to that destination.

The ip verify unicast source reachable-via rx command enables Unicast RPF in strict mode.

To enable loose mode, administrators can use the any option (ip verify unicast source reachable-via any). In loose mode, it doesn't matter if we use this interface to reach the source or not.

The allow-default option allows the use of the default route in the source verification process.

Refer to the exhibit.

The neighbor relationship is not coming up Which two configurations bring the adjacency up?

(Choose two)

A.

NY router ospf 1 area 0 authentication message-digest

A.

NY router ospf 1 area 0 authentication message-digest

Answers
B.

LA interface E 0/0 ip ospf message-digest-key 1 md5 Cisco123

B.

LA interface E 0/0 ip ospf message-digest-key 1 md5 Cisco123

Answers
C.

NY interface E 0/0 no ip ospf message-digest-key 1 md5 Cisco123 ip ospf authentication-key Cisco123

C.

NY interface E 0/0 no ip ospf message-digest-key 1 md5 Cisco123 ip ospf authentication-key Cisco123

Answers
D.

LA interface E 0/0 ip ospf authentication-key Cisco123

D.

LA interface E 0/0 ip ospf authentication-key Cisco123

Answers
E.

LA router ospf 1 area 0 authentication message-digest

E.

LA router ospf 1 area 0 authentication message-digest

Answers
Suggested answer: B, E

Explanation:

The configuration on NY router is good for OSPF authentication. So we must enable OSPF authentication on LA router with the following commands: router ospf 1 area 0 authentication message-digest interface E0/0 ip ospf message- digest-key 1 md5 Cisco123

Refer to the exhibit.

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Refer to the exhibit.

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

A.

Configure TACACS+ synchronization with the Active Directory admin group

A.

Configure TACACS+ synchronization with the Active Directory admin group

Answers
B.

Configure the username from a local database

B.

Configure the username from a local database

Answers
C.

Configure full access for the username from TACACS+ server

C.

Configure full access for the username from TACACS+ server

Answers
D.

Configure an authorized IP address for this user to access this router

D.

Configure an authorized IP address for this user to access this router

Answers
Suggested answer: C
Total 570 questions
Go to page: of 57