ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











A CoPP policy is applied for receiving SSH traffic from the WAN interface on a Cisco ISR4321 router.

However, the SSH response from the router is abnormal and stuck during the high link utilization. The problem is identified as SSH traffic does not match in the ACL. Which action resolves the issue?

A.

Rate-limit SSH traffic to ensure dedicated bandwidth.

A.

Rate-limit SSH traffic to ensure dedicated bandwidth.

Answers
B.

Apply CoPP on the control plane interface.

B.

Apply CoPP on the control plane interface.

Answers
C.

Increase the IP precedence value of SSH traffic to 6.

C.

Increase the IP precedence value of SSH traffic to 6.

Answers
D.

Apply CoPP on the WAN interface inbound direction.

D.

Apply CoPP on the WAN interface inbound direction.

Answers
Suggested answer: B

Explanation:

The problem is "SSH traffic does not match in the ACL" and "CoPP policy is applied for receiving SSH traffic from the WAN interface" so we should apply CoPP on the control plane interface instead.

Refer to the exhibit.

An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead of current best path. Which action resolves the issue?

A.

Configure AS_PATH prepend for the current best path

A.

Configure AS_PATH prepend for the current best path

Answers
B.

Configure higher MED to select as the best path

B.

Configure higher MED to select as the best path

Answers
C.

Configure AS_PATH prepend for the desired best path

C.

Configure AS_PATH prepend for the desired best path

Answers
D.

Configure lower LOCAL_PREF to select as the best path

D.

Configure lower LOCAL_PREF to select as the best path

Answers
Suggested answer: D

Explanation:

From the output, we learn that the current best path is from 10.57.255.11 (which includes "Övalid, confed-external, best") and this path is 2 ASes away (64955 65003). Although there are some paths with only 1 AS away (path from

172.16.254.234 for example) but they were not chosen the best path so AS_PATH was not used to determine the best path -> Answers A and answer C are not correct.

All the paths in the output have metric of 0 and this is the lowest (best) value for this attribute. If we configure higher MED then it is less preferred over other paths -> Answer B is not correct.

Only answer D is left but LOCAL_PREF attribute should be configured with higher value to be preferred so we hope "lower LOCAL_PREF" here means higher value. But this is the best answer.

Refer to the exhibit.

An administrator is configuring a GRE tunnel to establish an EIGRP neighbor to a remote router. The other tunnel endpoint is already configured. After applying the configuration as shown, the tunnel started flapping. Which action resolves the issue?

A.

Modify the network command to use the Tunnel0 interface netmask

A.

Modify the network command to use the Tunnel0 interface netmask

Answers
B.

Advertise the Loopback0 interface from R2 across the tunnel

B.

Advertise the Loopback0 interface from R2 across the tunnel

Answers
C.

Stop sending a route matching the tunnel destination across the tunnel

C.

Stop sending a route matching the tunnel destination across the tunnel

Answers
D.

Readdress the IP network on the Tunnel0 on both routers using the /31 netmask

D.

Readdress the IP network on the Tunnel0 on both routers using the /31 netmask

Answers
Suggested answer: C

Explanation:

In this question we are advertising the tunnel IP address 192.168.12.2 to the other side. When other end receives the EIGRP advertisement, it realizes it can reach the other side of the tunnel via EIGRP.

In other words, it reaches the tunnel destination through the tunnel itself -> This causes "recursive routing" error.

Note: In order to avoid this error, do not advertise the tunnel destination IP address on the tunnel interface to other side.

Good recursive routing reference: https://networklessons.com/cisco/ccie-routingswitching/gretunnelrecursive-routing-error

Which two solutions are used to overcome a flapping link that causes a frequent label binding exchange between MPLS routers? (Choose two)

A.

Create link dampening on links to protect the session.

A.

Create link dampening on links to protect the session.

Answers
B.

Increase input queue on links to protect the session.

B.

Increase input queue on links to protect the session.

Answers
C.

Create targeted hellos to protect the session.

C.

Create targeted hellos to protect the session.

Answers
D.

Increase a hold-timer to protect the session.

D.

Increase a hold-timer to protect the session.

Answers
E.

Increase a session delay to protect the session.

E.

Increase a session delay to protect the session.

Answers
Suggested answer: A, C

Explanation:

To avoid having to rebuild the LDP session altogether, you can protect it. When the LDP session between two directly connected LSRs is protected, a targeted LDP session is built between the two LSRs. When the directly connected link does go down between the two LSRs, the targeted LDP session is kept up as long as an alternative path exists between the two LSRs.

For the protection to work, you need to enable it on both the LSRs. If this is not possible, you can enable it on one LSR, and the other LSR can accept the targeted LDP Hellos by configuring the command mpls ldp discovery targeted-hello accept.

Reference: https://www.ccexpert.us/mpls-network/mpls-ldp-session-protection.htmlOr from the referenceat https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/TECMPL-3201.pdfTroubleshooting LDP IssuesProblem:

I. When a link flaps (for a short time),

ÖS olution:

+ When LDP session supported by link hello is setup, create a targeted hello to protect the session.

Refer to the exhibit.

An engineer must configure a LAN-to-LAN IPsec VPN between R1 and the remote router. Which IPsec Phase 1 configuration must the engineer use for the local router?

A.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash sha

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

A.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash sha

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

Answers
B.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

B.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 200.1.1.3

Answers
C.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 199.1.1.1

C.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123 address 199.1.1.1

Answers
D.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123! address 199.1.1.1

D.

crypto isakmp policy 5

authentication pre-share

encryption 3des

hash md5

group 2

!

crypto isakmp key cisco123! address 199.1.1.1

Answers
Suggested answer: A

Explanation:

In the "crypto isakmp key Ö address " command, the address must be of the IP address of the other end (which is 200.1.1.3 in this case) so Option A and Option B are correct. The difference between these two options are in the hash SHA or MD5 method but both of them can be used although SHA is better than MD5 so we choose Option A the best answer.

Note: Cisco no longer recommends using 3DES, MD5 and DH groups 1, 2 and 5.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_imgmt/configuration/xe-16-5/sec-ipsec-management-xe-16-5-book/sec-ipsec-usability-enhance.html

What is a function of an end device configured with DHCPv6 guard?

A.

If it is configured as a server, only prefix assignments are permitted.

A.

If it is configured as a server, only prefix assignments are permitted.

Answers
B.

If it is configured as a relay agent, only prefix assignments are permitted.

B.

If it is configured as a relay agent, only prefix assignments are permitted.

Answers
C.

If it is configured as a client, messages are switched regardless of the assigned role.

C.

If it is configured as a client, messages are switched regardless of the assigned role.

Answers
D.

If it is configured as a client, only DHCP requests are permitted.

D.

If it is configured as a client, only DHCP requests are permitted.

Answers
Suggested answer: C

Explanation:

The DHCPv6 Guard feature blocks reply and advertisement messages that come from unauthorized DHCP servers and relay agents.

Packets are classified into one of the three DHCP type messages. All client messages are always switched regardless of device role. DHCP server messages are only processed further if the device role is set to server. Further processing of server messages includes DHCP server advertisements (for source validation and server preference) and DHCP server replies (for permitted prefixes).

If the device is configured as a DHCP server, all the messages need to be switched, regardless of the device role configuration.

A customer requested a GRE tunnel through the provider network between two customer sites using loopback to hide internal networks. Which configuration on R2 establishes the tunnel with R1?

A.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1400

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 192.168.20.1

R2(config-if)# tunnel destination 192.168.10.1

A.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1400

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 192.168.20.1

R2(config-if)# tunnel destination 192.168.10.1

Answers
B.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1400

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 10.10.2.2

R2(config-if)# tunnel destination 10.10.1.1

B.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1400

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 10.10.2.2

R2(config-if)# tunnel destination 10.10.1.1

Answers
C.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1500

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 192.168.20.1

R2(config-if)# tunnel destination 10.10.1.1

C.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1500

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 192.168.20.1

R2(config-if)# tunnel destination 10.10.1.1

Answers
D.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1500

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 10.10.2.2

R2(config-if)# tunnel destination 10.10.1.1

D.

R2(config)# interface Tunnel 1

R2(config-if)# ip address 172.20.1.2 255.255.255.0

R2(config-if)# ip mtu 1500

R2(config-if)# ip tcp adjust-mss 1360

R2(config-if)# tunnel source 10.10.2.2

R2(config-if)# tunnel destination 10.10.1.1

Answers
Suggested answer: D

A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router?

A.

ip nhrp registration ignore

A.

ip nhrp registration ignore

Answers
B.

ip nhrp registration no-registration

B.

ip nhrp registration no-registration

Answers
C.

ip nhrp registration dynamic

C.

ip nhrp registration dynamic

Answers
D.

ip nhrp registration no-unique

D.

ip nhrp registration no-unique

Answers
Suggested answer: D

Which IPv6 feature enables a device to reject traffic when it is originated from an address that is not stored in the device binding table?

A.

IPv6 Snooping

A.

IPv6 Snooping

Answers
B.

IPv6 Source Guard

B.

IPv6 Source Guard

Answers
C.

IPv6 DAD Proxy

C.

IPv6 DAD Proxy

Answers
D.

IPv6 RA Guard

D.

IPv6 RA Guard

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/xe-3s/ip6f-xe-3sbook/ip6-src-guard.html

Refer to the exhibit.

The R2 loopback interface is advertised with RIP and EIGRP using default values. Which configuration changes make R1 reach the R2 loopback using RIP?

A.

R1(config)# router rip

R1(config-router)# distance 90

A.

R1(config)# router rip

R1(config-router)# distance 90

Answers
B.

R1(config)# router rip

R1(config-router)# distance 100

B.

R1(config)# router rip

R1(config-router)# distance 100

Answers
C.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 130 120

C.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 130 120

Answers
D.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 120 120

D.

R1(config)# router eigrp 1

R1(config-router)# distance eigrp 120 120

Answers
Suggested answer: C

Explanation:

distance (AD Number u want to change to) (neighbor IP) (Wildcard Mask) (access-list number)

Total 570 questions
Go to page: of 57