ExamGecko
Home / Cisco / 300-515 / List of questions
Ask Question

Cisco 300-515 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

The CTO of a company requires the support of a network consultant to deliver an MPLS solution without resigning to a certain degree of redundancy and scalability. Which solution effectively scales to hundreds or thousands of sites?

L2VPN with the broadcast traffic processed at the ingress PE.

L2VPN with the broadcast traffic processed at the ingress PE.

L3VPN with direct LSP connectivity between all PEs.

L3VPN with direct LSP connectivity between all PEs.

L2VPN by encapsulating multiple frame formats with interworking.

L2VPN by encapsulating multiple frame formats with interworking.

L3VPN using a hierarchical topology of N-PEs and U-PEs.

L3VPN using a hierarchical topology of N-PEs and U-PEs.

Suggested answer: D
asked 07/10/2024
Zahidul Haque
50 questions

Question 22

Report Export Collapse

You are troubleshooting ARP connectivity issues for an Ethernet interface on an IOS XR network that runs IS-IS. You verify that the IGP protocol is running, but an ARP entry has not yet been created.

Which action should you take?

debug ping packets

debug ping packets

debug ARP

debug ARP

ping the connected neighbor

ping the connected neighbor

verify the RIB table routes

verify the RIB table routes

Suggested answer: C
asked 07/10/2024
Dylan Johnson
47 questions

Question 23

Report Export Collapse

Which two are characteristics of using a non-MPLS peer-to-peer model over a traditional overlay model? (Choose two.)

The model is suited for nonredundant configurations.

The model is suited for nonredundant configurations.

The configuration on a newly added site PE is updated automatically.

The configuration on a newly added site PE is updated automatically.

Provider routers know the customer network topology.

Provider routers know the customer network topology.

The customer specifies the exact site-to-site traffic profile.

The customer specifies the exact site-to-site traffic profile.

Routing information is exchanged between the customer router and one or a few PEs.

Routing information is exchanged between the customer router and one or a few PEs.

Suggested answer: C, E
Explanation:

Reference: http://etutorials.org/Networking/MPLS+VPN+Architectures/Part+2+MPLS-based+Virtual+Private+Networks/Chapter+7.+Virtual+Private+Network+VPN+Implementation+Options/Overlay+and+Peer-to-peer+VPN+Model/

asked 07/10/2024
Tom Rez
42 questions

Question 24

Report Export Collapse

While troubleshooting an AToM L2VPN service, a network consultant notices that the AC Layer 2 encapsulations are different. Which action should the consultant take in order to make the MPLS L2VPN work?

tag-rewrite on the ingress and egress PE router

tag-rewrite on the ingress and egress PE router

interworking IP configuration on the last PE router before label disposition

interworking IP configuration on the last PE router before label disposition

nonrouted interworking setup to properly translate only the Layer 2 information from the ACD. interworking IP configuration on both the AC terminations on the PEs

nonrouted interworking setup to properly translate only the Layer 2 information from the ACD. interworking IP configuration on both the AC terminations on the PEs

Suggested answer:
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-16-11/mp-l2-vpns-xe-16-11-book/l2vpn-interworking.html

asked 07/10/2024
Kenny McCue
36 questions

Question 25

Report Export Collapse

Which mechanism reduces the network flooding caused by host ARP learning behavior?

ARP suppression

ARP suppression

storm control

storm control

root guard

root guard

BPDU guard

BPDU guard

Suggested answer: A
Explanation:

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white-paper-c11-735015.html

asked 07/10/2024
Simon John Mather
49 questions

Question 26

Report Export Collapse

What do EVPN single-active and all-active have in common?

They are default gateway redundancy options.

They are default gateway redundancy options.

They are multihoming mechanisms used for CE devices.

They are multihoming mechanisms used for CE devices.

They are used to provide single connection from a CE device to a service provider.

They are used to provide single connection from a CE device to a service provider.

They are both roles that a designated router can take when MPLS is used with EVPN.

They are both roles that a designated router can take when MPLS is used with EVPN.

Suggested answer: D
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k-r6-2/lxvpn/configuration/guide/b-l2vpn-cg-asr9000-62x/b-l2vpn-cg-asr9000-62x_chapter_01011.html

asked 07/10/2024
Oscar Ballabriga
37 questions

Question 27

Report Export Collapse

Cisco 300-515 image Question 27 112952 10072024005957000000


Refer to the exhibit. An engineer is trying to configure an EVPN VWPS. What is the issue with this configuration? A.

The member in the VPWS context should be the PE-facing interface.

The 12vpn evpn command should be instance 101.

The 12vpn evpn command should be instance 101.

Interface GigabitEthernet0/1/0 should not have any IP address.

Interface GigabitEthernet0/1/0 should not have any IP address.

The service instance and the EVPN instance are different.

The service instance and the EVPN instance are different.

Suggested answer: C
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_l2_vpns/configuration/xe-3s/asr903/16-7-1/b-mpls-l2-vpns-xe-16-7-asr900/epvn_vpws_single_homed.pdf

asked 07/10/2024
Marcelo Oliveira
43 questions

Question 28

Report Export Collapse

Cisco 300-515 image Question 28 112953 10072024005957000000

Refer to the exhibit. Which result occurs when PE1 learns a new MAC address and all three PEs are enabled with EVPN native?

A system notification is sent to the network administrator that triggers the manual configuration of the new MAC address on PE2 and PE3.

A system notification is sent to the network administrator that triggers the manual configuration of the new MAC address on PE2 and PE3.

The new MAC address is sent by BGP to PE2 and PE3 as a Type 2 BGP route.

The new MAC address is sent by BGP to PE2 and PE3 as a Type 2 BGP route.

The MAC address is entered into the CAM table and is classified for use on the native VLAN

The MAC address is entered into the CAM table and is classified for use on the native VLAN

The MAC address is entered into the CAM table only if it is learned on the native VLAN.

The MAC address is entered into the CAM table only if it is learned on the native VLAN.

Suggested answer: B
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k-r6-4/lxvpn/configuration/guide/b-l2vpn-cg-asr9000-64x/b-l2vpn-cg-asr9000-64x_chapter_01011.html

asked 07/10/2024
Francisco Julian Mota Fraile
45 questions

Question 29

Report Export Collapse

While troubleshooting EoMPLS configuration problems, which three parameters should an engineer match between the two ends of the pseudowire configurations? (Choose three.)

VLAN name

VLAN name

Xconnect group name

Xconnect group name

EFP subinterface number

EFP subinterface number

pseudowire ID

pseudowire ID

MTU size

MTU size

control word usage

control word usage

Suggested answer: D, E, F
Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/multiprotocol-label-switching-mpls/mpls/213238-mpls-l2vpn-pseudowire.html

asked 07/10/2024
Rashid Hashim
47 questions

Question 30

Report Export Collapse

A network architect is troubleshooting the L2TPv3 tunneling security due to the untrusted nature of the underlaying network. Which two L2TPv3 features does the architect deploy to address the ongoing issues?

(Choose two.)

TCP MD5 authentication

TCP MD5 authentication

control message hashing

control message hashing

CHAP authentication

CHAP authentication

control message rate limiting

control message rate limiting

asymmetric mutual authentication with PSK

asymmetric mutual authentication with PSK

Suggested answer: B, C
asked 07/10/2024
Abiola Unegbu
40 questions
Total 59 questions
Go to page: of 6
Search

Related questions