Cisco 300-410 Practice Test - Questions Answers, Page 27

List of questions
Question 261

What is a function of IPv6 Source Guard?
Question 262

What is the purpose of the DHCPv6 Guard?
Question 263

Refer to the exhibit.
R5 should not receive any routes originated in the EIGRP domain. Which set of configuration changes removes the EIGRP routes from the R5 routing table to fix the issue?
Question 264

Refer to the exhibit.
An engineer has configured R1 as EIGRP stub router. After the configuration, router R3 failed to reach to R2 loopback address.
Which action advertises R2 loopback back into the R3 routing table?
Question 265

Refer to the exhibit.
An engineer configures the router 10.1.100.10 for EIGRP autosummarization so that R1 should receive the summary route of 10.0.0.0/8. However, R1 receives more specific /24 routes.
Which action resolves this issue?
Question 266

Refer to the exhibit.
An engineer is troubleshooting a TACACS problem.
Which action resolves the issue?
Question 267

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.
access-list 100 permit ip host 172.16.1.99 any
! class-map CM-ADMIN match access-group 100
! policy-map PM-COPP class CM-ADMIN police 500000 conform-action transmit
!i nterface E0/0 service-policy input PM-COPP
CoPP failed to capture the desired traffic and the CPU load is getting higher.
Which two configurations resolve the issue? (Choose two.)
Question 268

Refer to the exhibit.
While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.
Which command resolves this issue?
Question 269

Refer to the exhibit.
A network administrator is troubleshooting IPv6 address assignment for a DHCP client that is not getting an IPv6 address from the server.
Which configuration retrieves the client IPv6 address from the DHCP server?
Question 270

Refer to the exhibit.
A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers.
Which configuration prevents changes from unauthorized NMS and TFTP servers?
Question