ExamGecko
Home Home / Cisco / 300-410

Cisco 300-410 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibits.

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

A.

The ip nhrp redirect command is missing on the spoke routers.

Answers
B.

The ip nhrp shortcut command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

Answers
C.

The ip nhrp redirect commands is missing on the hub router.

C.

The ip nhrp redirect commands is missing on the hub router.

Answers
D.

The ip nhrp shortcut commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

Answers
E.

The ip nhrp map command is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Answers
Suggested answer: B, C

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

A.

NHRP

Answers
B.

IPsec

B.

IPsec

Answers
C.

MP-BGP

C.

MP-BGP

Answers
D.

OSPF

D.

OSPF

Answers
Suggested answer: A

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Refer to the exhibit.

During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?

A.

permit tcp port 443

A.

permit tcp port 443

Answers
B.

permit udp port 465

B.

permit udp port 465

Answers
C.

permit tcp port 465

C.

permit tcp port 465

Answers
D.

permit tcp port 22

D.

permit tcp port 22

Answers
Suggested answer: A

Refer to the exhibit.

An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?

A.

Add the aaa authentication login default none command to the global configuration.

A.

Add the aaa authentication login default none command to the global configuration.

Answers
B.

Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command.

B.

Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command.

Answers
C.

Add the aaa authentication login default group tacacs+ local-case command to the global configuration.

C.

Add the aaa authentication login default group tacacs+ local-case command to the global configuration.

Answers
D.

Add the login authentication Console command to the line configuration

D.

Add the login authentication Console command to the line configuration

Answers
Suggested answer: D

Explanation:

Reference:

https://community.cisco.com/t5/switching/how-to-define-login-local-for-console-0/td-p/2949493

Refer to the exhibit.

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

A.

no ip ssh disable

A.

no ip ssh disable

Answers
B.

ip ssh enable

B.

ip ssh enable

Answers
C.

ip ssh version 2

C.

ip ssh version 2

Answers
D.

crypto key generate rsa

D.

crypto key generate rsa

Answers
Suggested answer: D

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

Answers
B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Answers
C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Answers
D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Answers
Suggested answer: B

Explanation:

IPv6 ND inspection learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables. IPv6 ND inspection analyzes neighbor discovery messages in order to build a trusted binding table database, and IPv6 neighbor discovery messages that do not have valid bindings are dropped. A neighbor discovery message is considered trustworthy if its IPv6-to-MAC mapping is verifiable.

This feature mitigates some of the inherent vulnerabilities for the neighbor discovery mechanism, such as attacks on duplicate address detection (DAD), address resolution, device discovery, and the neighbor cache.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6f-15-s-book/ip6-snooping.pdf

While troubleshooting connectivity issues to a router, these details are noticed:

Standard pings to all router interfaces, including loopbacks, are successful.

Data traffic is unaffected.

SNMP connectivity is intermittent.

SSH is either slow or disconnects frequently.

Which command must be configured first to troubleshoot this issue?

A.

show policy-map control-plane

A.

show policy-map control-plane

Answers
B.

show policy-map

B.

show policy-map

Answers
C.

show interface | inc drop

C.

show interface | inc drop

Answers
D.

show ip route

D.

show ip route

Answers
Suggested answer: A

Refer to the exhibit.

Why is user authentication being rejected?

A.

The TACACS+ server expects "user", but the NT client sends "domain/user".

A.

The TACACS+ server expects "user", but the NT client sends "domain/user".

Answers
B.

The TACACS+ server refuses the user because the user is set up for CHAP.

B.

The TACACS+ server refuses the user because the user is set up for CHAP.

Answers
C.

The TACACS+ server is down, and the user is in the local database.

C.

The TACACS+ server is down, and the user is in the local database.

Answers
D.

The TACACS+ server is down, and the user is not in the local database.

D.

The TACACS+ server is down, and the user is not in the local database.

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/terminal-access-controlleraccesscontrol-system-tacacs-/13864-tacacs-pppdebug.html

Refer to the exhibit.

Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?

A.

policy-map SHAPE_BGP

A.

policy-map SHAPE_BGP

Answers
B.

policy-map LIMIT_BGP

B.

policy-map LIMIT_BGP

Answers
C.

policy-map POLICE_BGP

C.

policy-map POLICE_BGP

Answers
D.

policy-map COPP

D.

policy-map COPP

Answers
Suggested answer: D
Total 570 questions
Go to page: of 57