ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











What is a function of IPv6 Source Guard?

A.

It works with address glean or ND to find existing addresses.

A.

It works with address glean or ND to find existing addresses.

Answers
B.

It inspects ND and DHCP packets to build an address binding table.

B.

It inspects ND and DHCP packets to build an address binding table.

Answers
C.

It denies traffic from known sources and allocated addresses.

C.

It denies traffic from known sources and allocated addresses.

Answers
D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

D.

It notifies the ND protocol to inform hosts if the traffic is denied by it.

Answers
Suggested answer: A

Explanation:

IPv6 source guard is an interface feature between the populated binding table and data traffic filtering. This feature enables the device to deny traffic when it is originated from an address that is not stored in the binding table. IPv6 source guard does not inspect ND or DHCP packets;rather, it works in conjunction with IPv6 neighbor discovery (ND) inspection or IPv6 address glean, both of which detect existing addresses on the link and store them into the binding table.

What is the purpose of the DHCPv6 Guard?

A.

It messages between a DHCPv6 server and a DHCPv6 client ( or relay agent).

A.

It messages between a DHCPv6 server and a DHCPv6 client ( or relay agent).

Answers
B.

It shows that clients of a DHCPv5 server are affected.

B.

It shows that clients of a DHCPv5 server are affected.

Answers
C.

It block DHCPv6 messages from relay agents to a DHCPv6 server.

C.

It block DHCPv6 messages from relay agents to a DHCPv6 server.

Answers
D.

It allows DHCPv6 replay and advertisements from (rouge) DHCPv6 servers.

D.

It allows DHCPv6 replay and advertisements from (rouge) DHCPv6 servers.

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/xe-16/ip6fxe-16-book/ip6-dhcpv6-guard.html

Refer to the exhibit.

R5 should not receive any routes originated in the EIGRP domain. Which set of configuration changes removes the EIGRP routes from the R5 routing table to fix the issue?

A.

R4

route-map O2R deny 10

match tag 111

route-map O2R permit 20

!

router rip

redistribute ospf 1 route-map O2R metric 1

A.

R4

route-map O2R deny 10

match tag 111

route-map O2R permit 20

!

router rip

redistribute ospf 1 route-map O2R metric 1

Answers
B.

R2

route-map E20 deny 20

R4

route-map O2R deny 10

match tag 111

!

router rip

redistribute ospf 1 route-map O2R metric 1

B.

R2

route-map E20 deny 20

R4

route-map O2R deny 10

match tag 111

!

router rip

redistribute ospf 1 route-map O2R metric 1

Answers
C.

R4

route-map O2R permit 10

match tag 111

route-map O2R deny 20

!

router rip

redistribute ospf 1 route-map O2R metric 1

C.

R4

route-map O2R permit 10

match tag 111

route-map O2R deny 20

!

router rip

redistribute ospf 1 route-map O2R metric 1

Answers
D.

R4

route-map O2R deny 10

match tag 111

router rip

redistribute ospf 1 route-map O2R metric 1

D.

R4

route-map O2R deny 10

match tag 111

router rip

redistribute ospf 1 route-map O2R metric 1

Answers
Suggested answer: A

Explanation:

In this question, routes from EIGRP domain are redistributed into OSPF (with tag 111) then RIPv2 but without any filtering so R5 learns all routes from both EIGRP and OSPF domain. If we only want R5 to learn routes from OSPF domain then we must filter out routes with tag 111 and permit other routes.The line ìroute-map O2R permit 20î is important to allow other routes because of the implicit deny all at the end of each route-map.

Refer to the exhibit.

An engineer has configured R1 as EIGRP stub router. After the configuration, router R3 failed to reach to R2 loopback address.

Which action advertises R2 loopback back into the R3 routing table?

A.

Add a static route for R2 loopback address in R1 and redistribute it to advertise to R3.

A.

Add a static route for R2 loopback address in R1 and redistribute it to advertise to R3.

Answers
B.

Use a leak map on R1 that matches the required prefix and apply it with the distribute list command toward R3.

B.

Use a leak map on R1 that matches the required prefix and apply it with the distribute list command toward R3.

Answers
C.

Use a leak map on R3 that matches the required prefix and apply it with the EIGRP stub feature.

C.

Use a leak map on R3 that matches the required prefix and apply it with the EIGRP stub feature.

Answers
D.

Add a static null route for R2 loopback address in R1 and redistribute it to advertise to R3.

D.

Add a static null route for R2 loopback address in R1 and redistribute it to advertise to R3.

Answers
Suggested answer: B

Refer to the exhibit.

An engineer configures the router 10.1.100.10 for EIGRP autosummarization so that R1 should receive the summary route of 10.0.0.0/8. However, R1 receives more specific /24 routes.

Which action resolves this issue?

A.

Router R1 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

A.

Router R1 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

Answers
B.

Router R1 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are received on R1.

B.

Router R1 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are received on R1.

Answers
C.

Router 10.1.100.10 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are summarized toward R1.

C.

Router 10.1.100.10 should configure ip route 10.0.0.0 255.0.0.0 null 0 for the routes that are summarized toward R1.

Answers
D.

Router 10.1.100.10 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

D.

Router 10.1.100.10 should configure ip summary address eigrp (AS number) 10.0.0.0 255.0.0.0 for the R1 Fast Ethernet 0/0 connected interface.

Answers
Suggested answer: D

Refer to the exhibit.

An engineer is troubleshooting a TACACS problem.

Which action resolves the issue?

A.

Configure a matching TACACS server IP.

A.

Configure a matching TACACS server IP.

Answers
B.

Configure a matching preshared key.

B.

Configure a matching preshared key.

Answers
C.

Generate authentication from a relative source interface.

C.

Generate authentication from a relative source interface.

Answers
D.

Apply a configured AAA profile to the VTY.

D.

Apply a configured AAA profile to the VTY.

Answers
Suggested answer: B

Explanation:

Reference:

https://community.cisco.com/t5/network-access-control/issues-with-tacacs-authentication/tdQuestions& Answers PDF P-225p/3412001

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit ip host 172.16.1.99 any

! class-map CM-ADMIN match access-group 100

! policy-map PM-COPP class CM-ADMIN police 500000 conform-action transmit

!i nterface E0/0 service-policy input PM-COPP

CoPP failed to capture the desired traffic and the CPU load is getting higher.

Which two configurations resolve the issue? (Choose two.)

A.

interface E0/0

no service-policy input PM-COPP

!

control-plane

service-policy input PM-COPP

A.

interface E0/0

no service-policy input PM-COPP

!

control-plane

service-policy input PM-COPP

Answers
B.

policy-map PM-COPP

class CM-ADMIN

no police 500000 conform-action transmit

police 500 conform-action transmit

!

control-plane

service-policy input PM-COPP

B.

policy-map PM-COPP

class CM-ADMIN

no police 500000 conform-action transmit

police 500 conform-action transmit

!

control-plane

service-policy input PM-COPP

Answers
C.

no access-list 100

access-list 100 permit tcp host 172.16.1.99 any eq 80

C.

no access-list 100

access-list 100 permit tcp host 172.16.1.99 any eq 80

Answers
D.

no access-list 100

access-list 100 permit tcp host 172.16.1.99 any eq 80

access-list 100 permit tcp host 172.16.1.99 any eq 443

D.

no access-list 100

access-list 100 permit tcp host 172.16.1.99 any eq 80

access-list 100 permit tcp host 172.16.1.99 any eq 443

Answers
E.

policy-map PM-COPP

class CM-ADMIN

no police 500000 conform-action transmit

police 500 conform-action transmit

E.

policy-map PM-COPP

class CM-ADMIN

no police 500000 conform-action transmit

police 500 conform-action transmit

Answers
Suggested answer: A, D

Refer to the exhibit.

While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.

Which command resolves this issue?

A.

access-class INTERNET in

A.

access-class INTERNET in

Answers
B.

ip access-group INTERNET in

B.

ip access-group INTERNET in

Answers
C.

ipv6 traffic-filter INTERNET in

C.

ipv6 traffic-filter INTERNET in

Answers
D.

ipv6 access-class INTERNET in

D.

ipv6 access-class INTERNET in

Answers
Suggested answer: D

Refer to the exhibit.

A network administrator is troubleshooting IPv6 address assignment for a DHCP client that is not getting an IPv6 address from the server.

Which configuration retrieves the client IPv6 address from the DHCP server?

A.

ipv6 address autoconfig command on the interface

A.

ipv6 address autoconfig command on the interface

Answers
B.

ipv6 dhcp server automatic command on DHCP server

B.

ipv6 dhcp server automatic command on DHCP server

Answers
C.

ipv6 dhcp relay-agent command on the interface

C.

ipv6 dhcp relay-agent command on the interface

Answers
D.

service dhcp command on DHCP server

D.

service dhcp command on DHCP server

Answers
Suggested answer: A

Refer to the exhibit.

A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers.

Which configuration prevents changes from unauthorized NMS and TFTP servers?

A.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

!

snmp-server group NETVIEW v3 priv read NETVIEW access 20

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20

snmp-server community Cisc0Us3r RO 20

snmp-server community Cisc0wrus3r RW 20

snmp-server tftp-server-list 20

A.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

!

snmp-server group NETVIEW v3 priv read NETVIEW access 20

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20

snmp-server community Cisc0Us3r RO 20

snmp-server community Cisc0wrus3r RW 20

snmp-server tftp-server-list 20

Answers
B.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

!

snmp-server group NETVIEW v3 priv read NETVIEW access 20

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20

snmp-server community Cisc0wrus3r RO 20

snmp-server community Cisc0Us3r RW 20

snmp-server tftp-server-list 20

B.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

!

snmp-server group NETVIEW v3 priv read NETVIEW access 20

snmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 20

snmp-server community Cisc0wrus3r RO 20

snmp-server community Cisc0Us3r RW 20

snmp-server tftp-server-list 20

Answers
C.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

C.

access-list 20 permit 10.221.10.11

access-list 20 deny any log

Answers
D.

access-list 20 permit 10.221.10.11

D.

access-list 20 permit 10.221.10.11

Answers
Suggested answer: A
Total 570 questions
Go to page: of 57