ExamGecko
Home Home / Cisco / 300-515

Cisco 300-515 Practice Test - Questions Answers

Question list
Search
Search

Related questions











Which utility can you use to validate an LSP in an MPLS environment?

A.

uRPF

A.

uRPF

Answers
B.

MPLS LSP ping

B.

MPLS LSP ping

Answers
C.

logging

C.

logging

Answers
D.

RSVP

D.

RSVP

Answers
Suggested answer: B

What is the primary function of a VRF on a router?

A.

It enables the router to support multiple separate routing tables, which allows the device to handle overlapping IP addresses.

A.

It enables the router to support multiple separate routing tables, which allows the device to handle overlapping IP addresses.

Answers
B.

It enables a router to run BGP and a distance vector routing protocol at the same time, which allows it to serve as a VPN endpoint between remote sites.

B.

It enables a router to run BGP and a distance vector routing protocol at the same time, which allows it to serve as a VPN endpoint between remote sites.

Answers
C.

It enables a router to configure VLANs locally, which provides segregation between networks.

C.

It enables a router to configure VLANs locally, which provides segregation between networks.

Answers
D.

It enables the router to provide faster switching through the network by using labels to identify the input and output interfaces for neighbor routers.

D.

It enables the router to provide faster switching through the network by using labels to identify the input and output interfaces for neighbor routers.

Answers
Suggested answer: A

Which two statements describe primary differences between MPLS Layer 2 and Layer 3 VPNs?

(Choose two.)

A.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use L2TPv3 tunneling.

A.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use L2TPv3 tunneling.

Answers
B.

Layer 2 VPNs use AToM, but Layer 3 VPNs use MPLS/BGP.

B.

Layer 2 VPNs use AToM, but Layer 3 VPNs use MPLS/BGP.

Answers
C.

Layer 2 VPNs use BGP, but Layer 3 VPNs use VPLS.

C.

Layer 2 VPNs use BGP, but Layer 3 VPNs use VPLS.

Answers
D.

Layer 2 VPNs use L2TPv3 tunneling, but Layer 3 VPNs use GRE tunneling.

D.

Layer 2 VPNs use L2TPv3 tunneling, but Layer 3 VPNs use GRE tunneling.

Answers
E.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use pseudowires to provide tunneling.

E.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use pseudowires to provide tunneling.

Answers
Suggested answer: B, D


Refer to the exhibit. A network engineer has been called to configure the four PE devices in order to enable full communication among the four CE devices connected to them. While starting to configure, he experienced a connectivity issue.

Which two tasks should the engineer perform in order to begin the process correctly? (Choose two.)

A.

Configure PE3 to export route-targets 100:1 and 200:2. B. Configure PE3 to import route-targets 100:1 and 200:2.

A.

Configure PE3 to export route-targets 100:1 and 200:2. B. Configure PE3 to import route-targets 100:1 and 200:2.

Answers
B.

Configure PE4 to import route-targets 101:1 and 202:2. D. Configure PE2 to export route-targets 300:3 and 400:4.

B.

Configure PE4 to import route-targets 101:1 and 202:2. D. Configure PE2 to export route-targets 300:3 and 400:4.

Answers
C.

Configure PE1 to import route-targets 300:3 and 400:4.

C.

Configure PE1 to import route-targets 300:3 and 400:4.

Answers
Suggested answer: A, B

Refer to the exhibit. If the two devices are operating normally, which two conclusions can you draw from this configuration? (Choose two.)

A.

CE1 must use OSPF to establish a neighbor relationship with PE1.

A.

CE1 must use OSPF to establish a neighbor relationship with PE1.

Answers
B.

PE1 labels the routes it learns from CE1 with the route-target 222:2 and shares them with its VPNv4 peers.

B.

PE1 labels the routes it learns from CE1 with the route-target 222:2 and shares them with its VPNv4 peers.

Answers
C.

PE1 labels the routes it learns from CE1 with the route-target 111:1 and shares them with its VPNv4 peers.

C.

PE1 labels the routes it learns from CE1 with the route-target 111:1 and shares them with its VPNv4 peers.

Answers
D.

The PE-CE routes between the devices are being exchanged by OSPF

D.

The PE-CE routes between the devices are being exchanged by OSPF

Answers
E.

CE1 is supporting CSC.

E.

CE1 is supporting CSC.

Answers
Suggested answer: A, D

Which two frames can be configured on an Ethernet flow point?

(Choose two.)

A.

of a specific VLAN

A.

of a specific VLAN

Answers
B.

with different type of service values

B.

with different type of service values

Answers
C.

with identical type of service value

C.

with identical type of service value

Answers
D.

with different class of service values

D.

with different class of service values

Answers
E.

with no tags

E.

with no tags

Answers
Suggested answer: A, E

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cether/configuration/xe-3s/asr903/16-5-1/b-ce-xe-16-5-asr900/trunk-efp-support.html

In an Ethernet Virtual Circuit environment, which restriction do bridge domains have when

STP is running?

A.

The STP mode must be RSTP or PVST+

A.

The STP mode must be RSTP or PVST+

Answers
B.

Bridge domains must be mapped to a different VLAN.

B.

Bridge domains must be mapped to a different VLAN.

Answers
C.

The STP mode must be MSTP

C.

The STP mode must be MSTP

Answers
D.

Bridge domains must belong to different MST instances.

D.

Bridge domains must belong to different MST instances.

Answers
Suggested answer: C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/ce/b_ce_xe-313s-asr920-book/b_ce_xe-313s-asr920-book_chapter_01.html#reference_770349446ED24E83821EF701DDC46BFD


Refer to the exhibit. An engineer is implementing an MPLS P2MP TE solution. Which type of router can serve as the midpoint router and the tailend router in this P2MP TE network implementation?

A.

headend

A.

headend

Answers
B.

source

B.

source

Answers
C.

transit

C.

transit

Answers
D.

bud

D.

bud

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/mpls/mp-te-path-setup-xe-3s-asr920-book/mp-te-path-setup-xe-3s-asr920-book_chapter_01.html

An engineer is investigating an EVPN traffic flow issue. Which type of traffic should the engineer allow in an EVPN Tree Service in order to fix this issue?

A.

known unicast from a leaf to another leaf

A.

known unicast from a leaf to another leaf

Answers
B.

unknown unicast from a leaf to another leaf

B.

unknown unicast from a leaf to another leaf

Answers
C.

multicast from a leaf to another leaf

C.

multicast from a leaf to another leaf

Answers
D.

known unicast from a root to another root

D.

known unicast from a root to another root

Answers
Suggested answer: D

Explanation:

Reference: https://tools.ietf.org/html/draft-ietf-bess-evpn-etree-14

An engineer is investigating an MPLS LDP issue. Which command should an engineer use on a Cisco IOS XE device to display the contents of the LFIB?

A.

show mpls forwarding- table

A.

show mpls forwarding- table

Answers
B.

show mpls ldp neighbors

B.

show mpls ldp neighbors

Answers
C.

show mpls ldp labels

C.

show mpls ldp labels

Answers
D.

show mpls ldp bindings

D.

show mpls ldp bindings

Answers
Suggested answer: A

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mpls/command/mp-cr-book/mp-s2.html

Total 59 questions
Go to page: of 6