Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

300-410 PDF

$42

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-410 PDF + Testing Engine

$57

$189.99

3 Months Free Update

  • Exam Name: Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)
  • Last Update: Oct 4, 2025
  • Questions and Answers: 615
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-410 Engine

$48

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-410 Practice Exam Questions with Answers Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Certification

Question # 6

Refer to the exhibit.

300-410 question answer

The neighbor relationship is not coming up Which two configurations bring the adjacency up? (Choose two)

A.

NYrouter ospf 1area 0 authentication message-digest

B.

LAinterface E 0/0ip ospf message-digest-key 1 md5 Cisco123

C.

NYinterface E 0/0no ip ospf message-digest-key 1 md5 Cisco123ip ospf authentication-key Cisco123

D.

LAinterface E 0/0ip ospf authentication-key Cisco123

E.

LArouter ospf 1area 0 authentication message-digest

Full Access
Question # 7

A network engineer needs to verify IP SLA operations on an interface that shows on indication of

excessive traffic.

Which command should the engineer use to complete this action?

A.

show frequency

B.

show track

C.

show reachability

D.

show threshold

Full Access
Question # 8

Refer to the exhibit.

300-410 question answer

What is the result of applying this configuration?

A.

The router can form BGP neighborships with any other device.

B.

The router cannot form BGP neighborships with any other device.

C.

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Full Access
Question # 9

Which component of MPLS VPNs is used to extend the IP address so that an engineer is able to

identify to which VPN it belongs?

A.

VPNv4 address family

B.

RD

C.

RT

D.

LDP

Full Access
Question # 10

Refer to the exhibit.

300-410 question answer

In which circumstance does the BGP neighbor remain in the idle condition?

A.

if prefixes are not received from the BGP peer

B.

if prefixes reach the maximum limit

C.

if a prefix list is applied on the inbound direction

D.

if prefixes exceed the maximum limit

Full Access
Question # 11

Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A.

nonbroadcast multiaccess

B.

packet switching

C.

policy-based routing

D.

forwarding information base

Full Access
Question # 12

Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right.

300-410 question answer

Full Access
Question # 13

Drag and drop the DHCP messages from the left onto the correct uses on the right.

300-410 question answer

Full Access
Question # 14

Refer to the exhibit.

300-410 question answer

A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

A.

The local preference value in another neighbor statement is higher than 250.

B.

The local preference value should be set to the same value as the weight in the route map.

C.

The route map is applied in the wrong direction.

D.

The weight value in another neighbor statement is higher than 200.

Full Access
Question # 15

Refer to the exhibit.

300-410 question answer

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 16

Refer to the exhibit.

300-410 question answer

ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to

achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?

A.

Start-time 00:00

B.

Start-time 0

C.

Start-time immediately

D.

Start-time now

Full Access
Question # 17

Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right.

300-410 question answer

Full Access
Question # 18

Refer to the exhibit.

300-410 question answer

An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?

A.

An authentication error with the NTP server results in an incorrect timestamp.

B.

The keyword localtime is not defined on the timestamp service command.

C.

The NTP server is in a different time zone.

D.

The system clock is set incorrectly to summer-time hours.

Full Access
Question # 19

Drag and drop the MPLS VPN device types from me left onto the definitions on the right.

300-410 question answer

Full Access
Question # 20

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Full Access
Question # 21

Which protocol does MPLS use to support traffic engineering?

A.

Tag Distribution Protocol (TDP)

B.

Resource Reservation Protocol (RSVP)

C.

Border Gateway Protocol (BGP)

D.

Label Distribution Protocol (LDP)

Full Access
Question # 22

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:

300-410 question answer

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A.

R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.

B.

R1 does not accept any routes other than 192.168.130.0/24

C.

R1 does not forward traffic that is destined for 192.168.30.0/24

D.

Network 192.168.130.0/24 is not allowed in the R1 table

Full Access
Question # 23

Refer to the exhibit.

300-410 question answer

Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?

A.

Issue the eigrp stub command on R1

B.

Issue the no neighbor stub command on R2.

C.

Issue the eigrp command on R2.

D.

Issue the no eigrp stub command on R1.

Full Access
Question # 24

Which is statement about IPv6 inspection is true?

A.

It teams and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables

C.

It teams and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables

D.

It team and secures binding for stateless autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 25

Refer to the exhibit.

300-410 question answer

The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a?

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

A.

DMVPN

B.

GETVPN

C.

Cisco Easy VPN

D.

FlexVPN

Full Access
Question # 27

Exhibit:

300-410 question answer

BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue?

(Choose two)

A.

Configure BGP in the COPP-CRITICAL-7600 ACL

B.

Configure a higher value for CIR under the default class to allow more packets during peak traffic

C.

Configure a higher value for CIR under the class COPP-CRITICAL-7600

D.

Configure a three-color policer instead of two-color policer under class COPP-CRITICAL-7600

E.

Configure IP CEF to CoPP policy and BGP to work

Full Access
Question # 28

Refer to the exhibit.

300-410 question answer

Which statement about R1 is true?

A.

OSPF redistributes RIP routes only if they have a tag of one.

B.

RIP learned routes are distributed to OSPF with a tag value of one.

C.

R1 adds one to the metric for RIP learned routes before redistributing to OSPF.

D.

RIP routes are redistributed to OSPF without any changes.

Full Access
Question # 29

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

300-410 question answer

Full Access
Question # 30

300-410 question answer

Refer to the exhibit. an engineer is trying to get 192.168.32.100 forwarded through 10.1.1.1, but it was forwarded through 10.1.1.2. What action forwards the packets through 10.1.1.1?

A.

Configure EIGRP to receive 192.168.32.0 route with lower admin distance.

B.

A. Configure EIGRP to receive 192.168.32.0 route with longer prefix than /19.

C.

A. Configure EIGRP to receive 192.168.32.0 route with lower metric.

D.

A. Configure EIGRP to receive 192.168.32.0 route with equal or longer prefix than /24.

Full Access
Question # 31

Which statement about route distinguishers in an MPLS network is true?

A.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

B.

Route distinguishers are used for label bindings.

C.

Route distinguishers make a unique VPNv4 address across the MPLS network.

D.

Route distinguishers define which prefixes are imported and exported on the edge router.

Full Access
Question # 32

Refer to the exhibit.

300-410 question answer

An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A.

Use the icmp-echo command to track both default routes

B.

Use the same AD for both default routes

C.

Start IP SLA by matching numbers for track and ip sla commands

D.

Start IP SLA by defining frequency and scheduling it

Full Access
Question # 33

Refer to the exhibit.

300-410 question answer

Users report that IP addresses cannot be acquired from the DHCP server. The DHCP

server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?

A.

Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool

B.

Configure the DHCP lease time to a smaller value

C.

Configure the DHCP lease time to a bigger value

D.

Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool

Full Access
Question # 34

Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.

300-410 question answer

Full Access
Question # 35

What is a prerequisite for configuring BFD?

A.

Jumbo frame support must be configured on the router that is using BFD.

B.

All routers in the path between two BFD endpoints must have BFD enabled.

C.

Cisco Express Forwarding must be enabled on all participating BFD endpoints.

D.

To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.

Full Access
Question # 36

Refer to the exhibit.

300-410 question answer

Redistribution is enabled between the routing protocols, and nowPC2 PC3, and PC4 cannot reach PC1. What are the two solutions to fix the problem? (Choose two.)

A.

Filter RIP routes back into RIP when redistributing into RIP in R2

B.

Filter OSPF routes into RIP FROM EIGRP when redistributing into RIP in R2.

C.

Filter all routes except RIP routes when redistributing into EIGRP in R2.

D.

Filter RIP AND OSPF routes back into OSPF from EIGRP when redistributing into OSPF in R2

E.

Filter all routes except EIGRP routes when redistributing into OSPF in R3.

Full Access
Question # 37

When provisioning a device in Cisco DNA Center, the engineer sees the error message “Cannot select the device. Not compatible with template”.

What is the reason for the error?

A.

The template has an incorrect configuration.

B.

The software version of the template is different from the software version of the device.

C.

The changes to the template were not committed.

D.

The tag that was used to filter the templates does not match the device tag.

Full Access
Question # 38

Refer to the exhibit.

300-410 question answer

Drag and drop the credentials from the left onto the remote login information on the right to resolve a failed login attempt to vtys. Not all credentials are uf SLA by defining frequency and schedulingsed

300-410 question answer

Full Access
Question # 39

Refer to the exhibit.

300-410 question answer

A junior engineer updated a branch router configuration. Immediately after the change, the engineer receives calls from the help desk that branch personnel cannot reach any network destinations. Which configuration restores service and continues to block 10.1.1.100/32?

A.

route-map FILTER-IN deny 5

B.

ip prefix-list 102 seq 15 permit 0.0.0.0/32 le 32

C.

ip prefix-list 102 seq 5 permit 0.0.0.0/32 le 32

D.

route-map FILTER-IN permit 20

Full Access
Question # 40

Which statement about MPLS LDP router ID is true?

A.

If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.

B.

The loopback with the highest IP address is selected as the router ID.

C.

The MPLS LDP router ID must match the IGP router ID.

D.

The force keyword changes the router ID to the specified address without causing any impact.

Full Access
Question # 41

300-410 question answer

Refer to the exhibit. The administrator configured route advertisement to a remote low resources router to use only the default route to reach any network but failed. Which action resolves this issue?

A.

Change the direction of the distribute-list command from out to in.

B.

Remove the line with the sequence number 5 from the prefix list.

C.

Remove the prefix keyword from the distribute-list command.

D.

Remove the line with the sequence number 10 from the prefix list.

Full Access
Question # 42

Refer to Exhibit:

300-410 question answer

300-410 question answer

AS 111 wanted to use AS 200 as the preferred path for 172.20.5.0/24 and AS 100 as the backup. After the configuration, AS 100 is not used for any other routes. Which configuration resolves the issue?

A.

route-mmap SETLP permit 10match ip address prefix-list PLIST1set local-preference 99route-map SETLP permit 20

B.

route-map SETLP permit 10match ip address prefix-list PLIST1set local-preference 110route-map SETLP permit 20

C.

router bgp 111no neighbor 192.168.10.1 route-map SETLP inneighbor 192.168.10.1 route-map SETLP out

D.

router bap 111no neighbor 192.168.10.1 route-map SETLP inneighbor 192.168.20.2 route-map SE TLP in

Full Access
Question # 43

Refer to the exhibit.

300-410 question answer

An engineer is trying to redistribute OSPF to BGP, but not all of the routes are

redistributed. What is the reason for this issue?

A.

By default, only internal routes and external type 1 routes are redistributed into BGP

B.

Only classful networks are redistributed from OSPF to BGP

C.

BGP convergence is slow, so the route will eventually be present in the BGP table

D.

By default, only internal OSPF routes are redistributed into BGP

Full Access
Question # 44

What is a function of IPv6 ND inspection?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

Full Access
Question # 45

Refer to the exhibit.

300-410 question answer

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)

A.

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.

Change the mode from mode tunnel to mode transport on R3

D.

Change the mode from mode transport to mode tunnel on R2.

E.

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Full Access
Question # 46

Drag and drop the OSPF adjacency states from the left onto the correct descriptions on the right.

300-410 question answer

Full Access
Question # 47

Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A.

NHRP

B.

IPsec

C.

MP-BGP

D.

OSPF

Full Access
Question # 48

Refer to the exhibit.

300-410 question answer

Which routes from OSPF process 5 are redistributed into EIGRP?

A.

E1 and E2 subnets matching access list TO-OSPF

B.

E1 and E2 subnets matching prefix list TO-OSPF

C.

only E2 subnets matching access list TO-OSPF

D.

only E1 subnets matching prefix listTO-OS1

Full Access
Question # 49

Refer to the exhibit.

300-410 question answer

During troubleshooting it was discovered that the device is not reachable using a secure

web browser. What is needed to fix the problem?

A.

permit tcp port 443

B.

permit udp port 465

C.

permit tcp port 465

D.

permit tcp port 22

Full Access
Question # 50

Which statement about IPv6 ND inspection is true?

A.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.

B.

It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.

C.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.

D.

It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.

Full Access
Question # 51

Refer to the exhibit.

300-410 question answer

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Full Access
Question # 52

Which two statements about VRF-Lite configurations are true? (Choose two.)

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

Full Access
Question # 53

300-410 question answer

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

A.

OSPF on the remote router

B.

matching hello timers

C.

use router ID

D.

matching MTU values

Full Access
Question # 54

Refer to the exhibit.

300-410 question answer

An IT staff member comes into the office during normal office hours and cannot access devices through SSH Which action should be taken to resolve this issue?

A.

Modify the access list to use the correct IP address.

B.

Configure the correct time range.

C.

Modify the access list to correct the subnet mask

D.

Configure the access list in the outbound direction.

Full Access
Question # 55

Refer to the exhibit.

300-410 question answer

Which interface configuration must be configured on the HUB router to enable MVPN with mGRE mode?

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

How does an MPLS Layer 3 VPN function?

A.

set of sites use multiprotocol BGP at the customer site for aggregation

B.

multiple customer sites interconnect through service provider network to create secure tunnels between customer edge devices

C.

set of sites interconnect privately over the Internet for security

D.

multiple customer sites interconnect through a service provider network using customer edge to provider edge connectivity

Full Access
Question # 57

Refer to the exhibit.

300-410 question answer

An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A.

Configure the service timestamps log uptime command in global configuration mode.

B.

Configure the logging clock synchronize command in global configuration mode.

C.

Configure the service timestamps log datetime localtime command in global configuration mode.

D.

Make sure that the clock on the device is synchronized with an NTP server.

Full Access
Question # 58

Refer to the exhibit.

300-410 question answer

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

Refer to the exhibit.

300-410 question answer

A network administrator logs into the router using TACACS+ username and password credentials, but the administrator cannot run any privileged commands Which action resolves the issue?

A.

Configure TACACS+ synchronization with the Active Directory admin group

B.

Configure the username from a local database

C.

Configure full access for the username from TACACS+ server

D.

Configure an authorized IP address for this user to access this router

Full Access
Question # 60

A network administrator is tasked to permit http and https traffic only toward the internet from the User1 laptop to adhere to company’s security policy. The administrator can still ping to www.cisco.com Which interface should the access list 101 be applied to resolve this issue?

300-410 question answer

A.

Interface G0/48 in the incoming direction

B.

Interface G0/0 in the outgoing direction.

C.

Interface S1/0 in the outgoing direction.

D.

Interface G0/0 in the incoming direction.

Full Access
Question # 61

Refer to the exhibit.

300-410 question answer

An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface. Which action resolves the issue?

A.

Modify line 10 of the access list to permit instead of deny.

B.

Remove line 60 from the access list.

C.

Modify line 30 of the access list to permit instead of deny.

D.

Remove line 70 from the access list.

Full Access
Question # 62

300-410 question answer

Refer to the exhibit. The network administrator has configured the Customer Edge router (AS 64511) to send only summarized routes toward ISP-1 (AS 100) and ISP-2 (AS 200).

router bgp 64511

network 172.16.20.0 mask 255.255.255.0

network 172.16.21.0 mask 255.255.255.0

network 172.16.22.0 mask 255.255.255.0

network 172.16.23.0 mask 255.255.255.0

aggregate-address 172.16.20.0 255.255.252.0

After this configuration. ISP-1 and ISP-2 continue to receive the specific routes and the summary route. Which configuration resolves the issue?

A.

router bgp 64511aggregate-address 172.16.20.0 255.255.252.0 summary-only

B.

router bgp 64511neighbor 192.168.100.1 summary-onlyneighbor 192.168.200.2 summary-only

C.

interface E 0/0ip bgp suppress-map BLOCK_SPECIFIC!interface E 0/1ip bgp suppress-map BLOCK_SPECIFIC!ip prefix-list PL_BLOCK_SPECIFIC permit 172.16.20.0/22 ge 24!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC

D.

ip prefix-list PL_BLOCK_SPECIFIC deny 172.16.20.0/22 ge 22ip prefix-list PL BLOCK SPECIFIC permit 172.16.20.0/22!route-map BLOCK_SPECIFIC permit 10match ip address prefix-list PL_BLOCK_SPECIFIC!router bgp 64511aggregate-address 172.16.20.0 255 255.252.0 suppress-map BLOCKSPECIFIC

Full Access
Question # 63

Refer to the exhibit.

300-410 question answer

Troubleshoot and ensure that branch B only ever uses the MPLS B network to reach HQ. Which action achieves this requirement?

A.

Introduce an AS path filter on branch A routers so that only local prefixes are advertised into BGP

B.

increase the local preference for all HQ prefixes received at branch B from the MPLS B network to be higher than the local preferences used on the MPLS A network

C.

Introduce AS path prepending on the branch A MPLS B network connection so that any HQ advertisements from branch A toward the MPLS B network are prepended three times

D.

Modify the weight of all HQ prefixes received at branch B from the MPLS B network to be higher than the weights used on the MPLS A network

Full Access
Question # 64

Refer to the exhibit.

300-410 question answer

Which action resolves the adjacency issue?

A.

Match the hello interval timers.

B.

Configure the same EIGRP process IDs.

C.

Match the authentication keys.

D.

Configure the same autonomous system numbers.

Full Access
Question # 65

Drag and drop the LDP features from the left onto the descriptions on the right

300-410 question answer

Full Access
Question # 66

Which two components are needed for a service provider to utilize the LVPN MPLS application? (Choose two.)

A.

The P routers must be configured for MP-iBGP toward the PE routers

B.

The P routers must be configured with RSVP.

C.

The PE routers must be configured for MP-iBGP with other PE routers

D.

The PE routers must be configured for MP-eBGP to connect to CEs

E.

The P and PE routers must be configured with LDP or RSVP

Full Access
Question # 67

An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output. Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?

A.

Configure the logging synchronous command

B.

Configure the no logging console debugging command globally

C.

Configure the logging synchronous level all command

D.

Configure the term no mon command globally

Full Access
Question # 68

300-410 question answer

Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source The configuration did not work as desired Which service must be enabled to resolve the issue?

A.

Enter the service timestamps log datetime localtime global command.

B.

Enter the service timestamps log datetime synchronize global command.

C.

Enter the service timestamps log datetime console global command.

D.

Enter the service timestamps log datetime clock-period global command

Full Access
Question # 69

Refer to the exhibit.

300-410 question answer

R1 is being monitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?

A.

Modify the CoPP policy to increase the configured exceeded limit for SNMP.

B.

Modify the access list to include snmptrap.

C.

Modify the CoPP policy to increase the configured CIR limit for SNMP.

D.

Modify the access list to add a second line to allow udp any any eq snmp

Full Access
Question # 70

Refer to the exhibit.

300-410 question answer

The network administrator configured redistribution on an ASBR to reach to all WAN networks but failed Which action resolves the issue?

A.

The route map must have the keyword prefix-list to evaluate the prefix list entries

B.

The OSPF process must have a metric when redistributing prefixes from EIGRP.

C.

The route map EIGRP->OSPF must have the 10.0.106.0/24 entry to exist in one of the three prefix lists to pass

D.

EIGRP must redistribute the 10.0.106.0/24 route instead of using the network statement

Full Access
Question # 71

An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted. Which action resolves the issue?

A.

Configure all devices for SNMPv3 informs with priv.

B.

Configure all devices for SNMPv3 informs with auth.

C.

Configure all devices for SNMPv3 traps with auth.

D.

Configure all devices for SNMPv3 traps with priv.

Full Access
Question # 72

Refer to the exhibit.

300-410 question answer

What does the imp-null tag represent in the MPLS VPN cloud?

A.

Pop the label

B.

Impose the label

C.

Include the EXP bit

D.

Exclude the EXP bit

Full Access
Question # 73

How are MPLS Layer 3 VPN services deployed?

A.

The RD and RT values must match under the VRR

B.

The RD and RT values under a VRF must match on the remote PE router

C.

The import and export RT values under a VRF must always be the same.

D.

The label switch path must be available between the local and remote PE routers.

Full Access
Question # 74

Which feature drops packets if the source address is not found in the snooping table?

A.

IPv6 Source Guard

B.

IPv6 Destination Guard

C.

IPv6 Prefix Guard

D.

Binding Table Recovery

Full Access
Question # 75

Refer to the exhibit.

300-410 question answer

Which two actions should be taken to access the server? (Choose two.)

A.

Modify the access list to add a second line of permit ip any

B.

Modify the access list to deny the route to 192.168.2.2.

C.

Modify distribute list seq 10 to permit the route to 192.168.2.2.

D.

Add a sequence 20 in the route map to permit access list 1.

E.

Add a floating static route to reach to 192.168.2.2 with administrative distance higher than OSPF

Full Access
Question # 76

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A.

VACL blocking broadcast frames from nonauthorized hosts

B.

PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

C.

PVLANs with community ports associated to route advertisements and isolated ports for nodes

D.

IPv4 ACL blocking route advertisements from nonauthorized hosts

Full Access
Question # 77

Refer to the exhibit.

300-410 question answer

A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A.

Set a tag in the route map when redistributing EIGRP into OSPF on R1. and match the same tag on R2 to allow when redistributing OSPF into EIGRP.

B.

Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.

C.

Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.

D.

Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.

Full Access
Question # 78

Refer to the exhibit.

300-410 question answer

A network administrator configured an IPv6 access list to allow TCP return frame only, but it is not working as expected. Which changes resolve this issue?

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on

that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?

A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction

B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction

C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction

D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction

Full Access
Question # 80

300-410 question answer

An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

Which two protocols work in the control plane of P routers across the MPLS cloud? (choose two)

A.

LSP

B.

RSVP

C.

ECMP

D.

LDP

E.

MPLS OAM

Full Access
Question # 82

An engineer configured policy-based routing for a destination IP address that does not exist in the routing table. How is the packet treated through the policy for configuring the set ip default next-hop command?

A.

Packets are not forwarded to the specific next hop.

B.

Packets are forwarded based on the routing table.

C.

Packets are forwarded based on a static route.

D.

Packets are forwarded to the specific next hop.

Full Access
Question # 83

A customer reports to the support desk that they cannot print from their PC to the local printer id:401987778. Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?

A.

application trace

B.

path trace

C.

ACL trace

D.

device trace

Full Access
Question # 84

Refer to the exhibit.

300-410 question answer

A user cannot SSH to the router. What action must be taken to resolve this issue?

A.

Configure transport input ssh

B.

Configure transport output ssh

C.

Configure ip ssh version 2

D.

Configure ip ssh source-interface loopback0

Full Access
Question # 85

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the high-delay ISP link if the second ISP link is up?

A.

LOCAL_PREF

B.

MED

C.

WEIGHT

D.

AS-PATH

Full Access
Question # 86

Refer to the exhibits.

300-410 question answer

A user on the 192.168.1.0/24 network can successfully ping 192.168.3.1, but the administrator cannot ping 192.168.3.1 from the LA router. Which set of configurations fixes the issue?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Refer to the exhibit.

300-410 question answer

The administrator successfully logs into R1 but cannot access privileged mode commands. What should be configured to resolve the issue?

A.

aaa authorization reverse-access

B.

secret cisco123! at the end of the username command instead of password cisco123!

C.

matching password on vty lines as cisco123!

D.

enable secret or enable password commands to enter into privileged mode

Full Access
Question # 88

300-410 question answer

300-410 question answer

Refer to the exhibit. The Los Angeles and New York routers are receiving routes from Chicago but not from each other. Which configuration fixes the issue?

A.

Interface Tunnel1no ip split-horizon eigrp 111

B.

Interface Tunnel1Ip next-hop-self elgrp 111

C.

Interface Tunnel1tunnel mode Ipsec Ipv4

D.

Interface Tunnel1tunnel protection ipsec profile IPSec-PROFILE

Full Access
Question # 89

300-410 question answer

300-410 question answer

Refer to the exhibit. R2 has two paths to reach 192.168.13.0/24. but traffic is sent only through R3. Which action allows traffic to use both paths?

A.

Configure the bandwidth 2000 command under interface FastEthernet0/0 on R2.

B.

Configure the variance 4 command under the EIGRP process on R2.

C.

Configure the delay 1 command under interface FastEthernet0/0 on R2.

D.

Configure the variance 2 command under the EIGRP process on R2

Full Access
Question # 90

Refer to the exhibit.

300-410 question answer

To provide reachability to network 10.1.1.0 /24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a ........... path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A.

Change the administrative distance of the external EIGRP to 90.

B.

Apply the outbound distribution list on R5 toward R4 in OSPF.

C.

Change the administrative distance of OSPF to 200 on R5.

D.

Redistribute OSPF into EIGRP on R4

Full Access
Question # 91

Refer to the exhibit.

300-410 question answer

A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully However the WLC is showing [ error "uncontactable" when the administrator tries to add it in Cisco DNA Center. Which action discovers WLC in Cisco DNA Center successfully?

A.

Copy the .cert file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

B.

Delete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again.

C.

Add the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices.

D.

Copy the .pern file from the Cisco DNA Center on the USB and upload it to the WLC 3504.

Full Access
Question # 92

Refer to the exhibit.

300-410 question answer

The network administrator must mutually redistribute routes at the Chicago router to the LA and NewYork routers. The configuration of the Chicago router is this:

300-410 question answer

After the configuration, the LA router receives all the NewYork routes, but NewYork router does not receive any LA routes. Which set of configurations fixes the problem on the Chicago router?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 93

300-410 question answer

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

A.

jpv6 unicast-routing

B.

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.

permit ip any any on access list EGRESS2 on Router1

D.

IPv6 address on GigabitEthernet0/0

Full Access
Question # 94

300-410 question answer

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?

A.

router ospf 1default-information originate

B.

router ospf 1network 0.0.0.0 0.0.0.0 area 0

C.

router ospf 1redistribute connected 0.0.0.0

D.

router ospf 1redistribute static subnets

Full Access
Question # 95

What are two functions of IPv6 Source Guard? (Choose two.)

A.

It uses the populated binding table for allowing legitimate traffic.

B.

It works independent from IPv6 neighbor discovery.

C.

It denies traffic from unknown sources or unallocated addresses.

D.

It denies traffic by inspecting neighbor discovery packets for specific pattern.

E.

It blocks certain traffic by inspecting DHCP packets for specific sources.

Full Access
Question # 96

Refer to exhibit.

300-410 question answer

Routing protocols are mutually redistributed on R3 and R1. Users report intermittent connectivity to services hosted on the 10.1.1.0/24 prefix. Significant routing update changes are noticed on R3 when the show ip route profile

command is run. How must the services be stabilized?

A.

The issue with using BGP must be resolved by using another protocol and redistributing it into EIGRP on R3

B.

The routing loop must be fixed by reducing the admin distance of iBGP from 200 to 100 on R3

C.

The routing loop must be fixed by reducing the admin distance of OSPF from 110 to 80 on R3

D.

The issue with using iBGP must be fixed by running eBGP between R3 and R4

Full Access
Question # 97

300-410 question answer

Refer to the exhibit. Which action restores the routes from neighbors while still filtering 1.1.1.0/24?

A.

Add a second line in the access list to permit any.

B.

Modify the route map to permit the access list instead of deny it

C.

Modify the access list to deny instead of permit it.

D.

Add a second sequence in the route map permit 20

Full Access
Question # 98

An engineer configured a DHCP server for Cisco IP phones to download its configuration from a TFTP server, but the IP phones failed to toad the configuration What must be configured to resolve the issue?

A.

BOOTP port 67

B.

DHCP option 66

C.

BOOTP port 68

D.

DHCP option 69

Full Access
Question # 99

Refer to the exhibit.

300-410 question answer

Which two actions restrict access to router R1 by SSH? (Choose two.)

A.

Configure transport input ssh on line vty and remove sequence 30 from access list 100.

B.

Configure transport output ssh on line vty and remove sequence 20 from access list 100.

C.

Remove class-map ANY from service-policy CoPP

D.

Configure transport output ssh on line vty and remove sequence 10 from access list 199.

E.

Remove sequence 10 from access list 100 and add sequence 20 deny tcp any any eq telnet to access list 199

Full Access
Question # 100

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

A.

RIPv2 and OSPF

B.

OSPF and EIGRP

C.

OSPF and ISIS

D.

ISIS and RIPv2

Full Access
Question # 101

Refer to the exhibit.

300-410 question answer

A user has set up an IP SLA probe to test if a non-SLA host web server on IP address 10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing. Which action should the network administrator recommend for the probe to succeed?

A.

Re-issue the ip sla schedule command.

B.

Add icmp-echo command for the host.

C.

Add the control disable option to the tcp connect.

D.

Modify the ip sla schedule frequency to forever.

Full Access
Question # 102

Exhibit:

300-410 question answer

NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15. Which action resolves the issue?

A.

Check and resolve reachability between the WLC and the NTP server

B.

Reset the NTP server to resolve any synchronization issues for all devices

C.

Check and resolve reachability between Cisco DNA Center and the NTP server

D.

Check and configure NTP on the WLC and synchronize with Cisco DNA Center

Full Access
Question # 103

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) to the outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

A.

Desired Min TX Interval

B.

Detect Mult

C.

Required Min RX Interval

D.

Required Min Echo RX Interval

Full Access
Question # 105

Exhibit:

300-410 question answer

Which action resolves the authentication problem?

A.

Configure the user name on the TACACS+ server

B.

Configure the UDP port 1812 to be allowed on the TACACS+ server

C.

Configure the TCP port 49 to be reachable by the router

D.

Configure the same password between the TACACS+ server and router.

Full Access
Question # 106

What is the minimum time gap required by the local system before putting a BFD control packet on the wire?

A.

Detect Mult

B.

Required Min Echo RX Interval

C.

Desired Min TX Interval

D.

Required Min RX Interval

Full Access
Question # 107

Refer to the exhibit.

A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log message stream it is impossible to capture the problem Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two)

A.

debug condition interface

B.

debug condition ip

C.

debug condition ospf neighbor

D.

debug condition session-id ADJCHG

E.

debug condition all

Full Access
Question # 108

Refer to Exhibit.

300-410 question answer

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

A.

HQ_R1(config)# ip sla responderHQ_R1(config)# ip sla responder icmp-echo 172.16.35.2

B.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.1

C.

HQ_R2(config)# ip sla responderHQ_R2(config)# ip sla responder icmp-echo 172.16.35.5

D.

BRANCH(config)# ip sla 1BRANCH(config-ip-sla)# icmp-echo 172.16.35.2

Full Access
Question # 109

300-410 question answer

300-410 question answer

Refer to the exhibit SW100 cannot receive routes from R1 Which configuration resolves the issue?

300-410 question answer

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option C

Full Access
Question # 110

What does IPv6 Source Guard utilize to determine if IPv6 source addresses should be forwarded?

A.

ACE

B.

ACLS

C.

DHCP

D.

Binding Table

Full Access
Question # 111

Refer to the exhibit.

300-410 question answer

300-410 question answer

The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. What command is needed to resolve the issue?

A.

Configure logging history 2

B.

Configure logging history 3

C.

Configure logging history 4

D.

Configure logging history 5

Full Access
Question # 112

What statement about route distinguishes in an MPLS network is true?

A.

Route distinguishes make a unique VPNv4 address across the MPLS network.

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishes are used for label bindings

D.

Route distinguishes define which prefixes are imported and exported on the edge router

Full Access
Question # 113

Refer to the exhibit.

300-410 question answer

R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?

A.

R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.

B.

Route reflector setup requires full IBGP mesh between the routers.

C.

In route reflector setup, only classful prefixes are advertised to other clients.

D.

In route reflector setups, prefixes are not advertised from one client to another.

Full Access
Question # 114

What are two MPLS label characteristics? (Choose two.)

A.

The label edge router swaps labels on the received packets.

B.

Labels are imposed in packets after the Layer 3 header.

C.

LDP uses TCP for reliable delivery of information.

D.

An MPLS label is a short identifier that identifies a forwarding equivalence class.

E.

A maximum of two labels can be imposed on an MPLS packet.

Full Access
Question # 115

Drag and drop the MPLS concepts from the left onto the descriptions on the right.

300-410 question answer

Full Access
Question # 116

Refer to the exhibit.

300-410 question answer

Users in VLAN46 cannot get the IP from the DHCP server. Assume that all the parameters are configured properly in VLAN 10 and on the DHCP server Which command on interlace VLAN46 allows users to receive IP from the DHCP server?

A.

ip dhcp-addreos 10.221.10.10

B.

ip dhcp server 10.221.10.10

C.

ip helper-addrets 10.221.10.10

D.

ip dhcp relay information trust-all

Full Access
Question # 117

Refer to the exhibit.

300-410 question answer

A customer reports that user traffic of bank XYZ to the AAA server is not using the primary path via the R3-R2 link. The network team observes:

No fiber is cut on links R2 and R3.

As101 and AS 201 routers established BGP peering.

Which configuration resolves the issue?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 118

:579

300-410 question answer

Refer to the exhibit. Router ABR-Rtr is not propagating the internet routes in OSPF area 10. which causes internet reachability problems in the area. Which action resolves the issue?

A.

ABR-Rtr must configure the default-information originate always command.

B.

ABR-Rtr must configure the area 10 stub no-summary command.

C.

ABR-Rtr network type must be broadcast network.

D.

ABR-Rtr must advertise the 0.0.0.0/0 default route in area 10.

Full Access
Question # 119

A network engineer must configure a DMVPN network so that a spoke establishes a direct path to another spoke if the two must send traffic to each other. A spoke must send traffic directly to the hub if required Which configuration meets this requirement?

300-410 question answer

300-410 question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 120

Refer to the exhibit.

300-410 question answer

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from ethernet 0/0 of R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1source Ethernet0/0

B.

interface Ethernet0/1ip flow monitor Flowmonitor1 inputip flow monitor Flowmonitor1 output

C.

interface Ethernet0/0ip flow monitor Flowmonitor1 inputip flow monitor Flowmonitor1 output

D.

flow exporter FlowAnalyzer1source Ethernet0/0

Full Access
Question # 121

Users report issues with reachability between areas as soon as an engineer configured summary routes between areas in a multiple area OSPF autonomous system. Which action resolves the issue?

A.

Configure the summary-address command on the ASBR.

B.

Configure the summary-address command on the ABR.

C.

Configure the area range command on the ABR.

D.

Configure the area range command on the ASBR.

Full Access
Question # 122

300-410 question answer

Refer to the exhibit. The IT manager received reports from users about slow application through network x. which action resolves the issue?

A.

Use the variance 2 command to enable load balancing.

B.

Increase the bandwidth from the service provider.

C.

Move the servers into the users subnet.

D.

Upgrade the IOS on router E.

Full Access
Question # 123

Refer to the exhibit.

300-410 question answer

A client is concerned that passwords are visible when running this show archive log config all.

Which router configuration is needed to resolve this issue?

A.

MASS-RTR(config-archive-log-cfg)#password encryption aes

B.

MASS-RTR(config)#aaa authentication arap

C.

MASS-RTR(config)#service password-encryption

D.

MASS-RTR(config-archive-log-cfg)#hidekeys

Full Access
Question # 124

300-410 question answer

Refer to the exhibit. An organization is installing a new L3 MPLS link to establish DM VPN Phase 2 tunnels between the hub and two spoke routers Which additional configuration should the engineer implement on each device to achieve optimal routing between the spokes?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 125

Refer to the exhibit.

300-410 question answer

An engineer configured NetFlow to capture traffic information through the router, but it iOS not working as expected. Which action captures the flow information from this router to the collector?

A.

Change the interface configuration FLOW-MONITOR-1 from input to output.

B.

Configure a flow exporter under flow FLOW-MONITOR-1.

C.

Configure more than one flow exporter destination addresses.

D.

Change the flow exporter transport protocol from UDP to TCP

Full Access
Question # 126

300-410 question answer

Refer to the exhibit The remote branch locations have a static neighbor relationship configured to R1 only R1 has successful neighbor relationships with the remote locations of R2 and R3, but the end users cannot communicate with each other. Which configuration resolves the issue’

300-410 question answer

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 127

300-410 question answer

300-410 question answer

Refer to the exhibit. AS 111 mut not be used as a transit AS, but ISP-1 is getting ISP-2 routes from AS 111. Which configuration stops Customer AS from being used as a transit path on ISP-1?

A.

ip as-path access-list 1 permit ^$

B.

ip as-path access-list 1 permit_111_

C.

ip as-path access-list 1 permit."

D.

ip as-path access-list 1 permit ^111$

Full Access
Question # 128

What is a function of the IPv6 DHCP Guard feature for DHCP messages?

A.

Only access lists are supported for matching traffic.

B.

All client messages are always switched regardless of the device role.

C.

It blocks only DHCP request messages.

D.

If the device is configured as a DHCP server, no message is switched.

Full Access
Question # 129

What action is performed for untagged outgoing labels in an MPLS router?

A.

Convert the incoming MPLS packet to an untagged packet and then do a FIB lookup

B.

Convert the incoming MPLS packet to an untagged packet and then do a RIB lookup.

C.

Convert the untagged packet to a labeled packet and forward it to the next router

D.

Convert the incoming MPLS packet to an IP packet and forward it to the next router.

Full Access
Question # 130

The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123.

The administrator has configured the following on R1:

300-410 question answer

ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 131

Refer to the exhibit.

300-410 question answer

An error message "an OSPF-4-FLOOD_WAR” is received on SW2 from SW1. SW2 is repeatedly receiving its own link-state advertisement and flushes it from the network. Which action resolves the issue?

A.

Change area 5 to a normal area from a nonstub area

B.

Resolve different subnet mask issue on the link

C.

Configure Layer 3 port channel on interfaces between switches

D.

Resolve duplicate IP address issue in the network

Full Access
Question # 132

Refer to the exhibit.

300-410 question answer

An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead

of current best path. Which action resolves the issue?

A.

Configure AS_PATH prepend for the current best path

B.

Configure higher MED to select as the best path

C.

Configure AS_PATH prepend for the desired best path

D.

Configure lower LOCAL_PREF to select as the best path

Full Access
Question # 133

Refer to the exhibit.

300-410 question answer

Which action adds the 10 1 7.6-32 route to the BGP table?

A.

Add a static roue for the 10 1 7 &32 network

B.

Add the network 10.1.7.6 mask 255.255.255.255 backdoor command

C.

Add summaty-address10.1.7.6.255.255.2550

D.

Add the network 10.1.7.6 mask 255.255.255.255 command

Full Access
Question # 134

What is the function of BFD?

A.

It provides uniform failure detection regardless of media type.

B.

It creates high CPU utilization on hardware deployments.

C.

It negotiates to the highest version if the neighbor version differs.

D.

It provides uniform failure detection on the same media type.

Full Access
Question # 135

Refer to the exhibit.

300-410 question answer

The security department recently installed a monitoring device between routers R3 and R5, which a loss of network connectivity for users connected to R5. Troubleshooting revealed that the monitoring device cannot forward multicast packets. The team already updated R5 with the correct configuration. Which configuration must be implemented on R3 to resolve the problem by ensuring R3 as the DR for the R3-R5 segment?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 136

300-410 question answer

Refer to the exhibit. Router R1 peers with two ISPs using static routes to get to the internet. The requirement is that R1 must prefer ISP-A under normal circumstances and failover to ISP-B if the connectivity to ISP-A is lost. The engineer observes that R1 is load balancing traffic across the two ISPs Which action resolves the issue by sending traffic to ISP-A only with failover to ISP-B?

A.

Configure OSPF between R1. ISP-A. and ISP-B for dynamic failover if any ISP link to R1 fails

B.

Configure two static routes on R1. one pointing to ISP-A and another pointing to ISP- B with 222 admin distance

C.

Change the bandwidth of the interface on R1 so that interface to ISP-A has a higher value than the interface to ISP-B

D.

Configure two static routes on R1. one pointing to ISP-B with more specific routes and another pointing to ISP-A with summary routes

Full Access
Question # 137

What is the purpose of an OSPF sham-link?

A.

to allow intra-area routing when OSPF is used as the PE-CE connection protocol in an MPLS VPN network

B.

to correct OSPF backdoor routing when OSPF is used as the PE-CE connection protocol *i an MPLS VPN network

C.

to correct OSPF backdoor routing when OSPF is used as the PE-PE connection protocol m an MPLS VPN network

D.

to allow inter-area routing when OSPF is used as the PE-CE connection protocol in a MPLS VPN network

Full Access
Question # 138

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.

access-list 100 permit ip host 172.16.1.99 any

!

class-map CM-ADMIN

match access-group 100

!

policy-map PM-COPP

class CM-ADMIN

police 500000 conform-action transmit

!

interface E0/0

service-policy input PM-COPP

CoPP failed to capture the desired traffic and the CPU load is getting higher.

Which two configurations resolve the issue? (Choose two.)

A.

interface E0/0no service-policy input PM-COPP!control-planeservice-policy input PM-COPP

B.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit!control-planeservice-policy input PM-COPP

C.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80

D.

no access-list 100access-list 100 permit tcp host 172.16.1.99 any eq 80access-list 100 permit tcp host 172.16.1.99 any eq 443

E.

policy-map PM-COPPclass CM-ADMINno police 500000 conform-action transmitpolice 500 conform-action transmit

Full Access
Question # 139

Refer to the exhibit.

300-410 question answer

An engineer configures DMVPN and receives the hub location prefix of 10.1.1.0724 on R2 and R3 The R3 prefix of 10 1.3.0/24 is not received on R2. and the R2 prefix 10.1,2.0/24 is not received on R3. Which action reserves the issue?

A.

Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the command no ip split-horizon eigrp 10 on the tunnel interface of R1

B.

There is no spoke-to-spoke connection DMVPN configuration should be modified to enable a tunnel connection between R2 and R3 and neighbor relationship confirmed by use of the show ip eigrp neighbor command

C.

Split horizon prevents the routes from being advertised between spoke routers it should be disabled with the no ip split-horizon eigrp 10 command on the Gi0/0 interface of R1.

D.

There is no spoke-to-spoke connection DMVPN configuration should be modified with a manual neighbor relationship configured between R2 and R3 and confirmed bb use of the show ip eigrp neighbor command.

Full Access
Question # 140

Refer to the exhibit.

300-410 question answer

While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured.

Which command resolves this issue?

A.

access-class INTERNET in

B.

ip access-group INTERNET in

C.

ipv6 traffic-filter INTERNET in

D.

ipv6 access-class INTERNET in

Full Access
Question # 141

300-410 question answer

Refer lo lhe exhibit. The Customer Edge rouler wants to use AS 100 as the preferred ISP for all external routes and ISP-2 as a backup.

300-410 question answer

After this configuration, all the backup routes have disappeared from the BGP table on the Customer Edge router. Which set of configurations resolves the issue on the Customer Edge router?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 142

How does LDP operate in an MPLS network?

A.

When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change.

B.

When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity.

C.

Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages

D.

LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP.

Full Access
Question # 143

What is an advantage of implementing BFD?

A.

BFD provides faster updates for any flapping route.

B.

BFD provides millisecond failure detection

C.

BFD is deployed without the need to run any routing protocol

D.

BFD provides better capabilities to maintain the routing table

Full Access
Question # 144

Refer to the exhibit.

300-410 question answer

300-410 question answer

An OSPF neighbor relationship between R2 and R3 is showing stuck in EXCHANGE/EXSTART state. The neighbor is established between R1 and R2. The network engineer can ping from R2 to R3 and vice versa, but the

neighbor is still down. Which action resolves the issue?

A.

Restore the Layer 2/Layer 3 conectivity issue in the ISP network.

B.

Match MTU on both router interfaces or ignore MTU.

C.

Administrative "shut then no shut" both router interfaces.

D.

Enable OSPF on the interface, which is required.

Full Access
Question # 145

300-410 question answer

300-410 question answer

Refer to the exhibit. An engineer applied filter on R1 The interface flapped between R1 and R2 and cleaning the BGP session did not restore the BGP session and failed Which action must the engineer take to restore the BGP session from R2 to R1?

A.

Apply the IPv6 traffic filter in the outbound direction on the interface

B.

ICMPv6 must be permitted by the IPv6 traffic filter

C.

Enable the BGP session, which went down when the session was cleared.

D.

Swap the source and destination IP addresses in the IPv6 traffic filter

Full Access
Question # 146

300-410 question answer

Refer to the exhibit. R1 lost its directly connected EIGRP peer 172.16.33.2 (SW1). Which configuration resolves the issue?

A.

key chain EIGRP

keyl

key-string Cisco

!

interface GigabitEthernet 2.10

Ip authentication mode elgrp 88 md5

Ip authentication key-chain elgrp 88 EIGRP

B.

key chain EIGRP

keyl

key-string Cisco

!

interface GigabitEthernet 2

ip authentication mode elgrp 88 md5

ip authentication key-chain elgrp 88 Cisco

C.

key chain EIGRP

keyl

key-string Cisco

!

interface GigabitEthernet 2

ip authentication mode elgrp 88 md5

ip authentication key-chain elgrp 88 EIGRP

D.

key chain EIGRP

keyl

key-string Cisco

!

interface GigabitEthernet 2.10

ip authentication mode eigrp 88 md5

ip authentication key-chain eigrp 88 Cisco

Full Access
Question # 147

:583

300-410 question answer

Refer to the exhibit. R1 is directly connected to R2 over network 10.100.14.0/24. An engineer configures R1 to advertise a static route that is connected to a local loopback for network 10.100.13.0/24. The network is not in the routing table of R2. Which action resolves the issue?

A.

The redistribution command isincorrect on R1 The default metric metric 200 should be inducted with the redistribution command.

B.

The Loopback interface on R1 is administratively down The interface should be enabled with the no shutdown command

C.

R2 must use a different OSPF process number and should be changed lo ospf 1 to match R1

D.

The redistribution command is incorrect on R1 The keyword subnets should be included with the redistribution command

Full Access
Question # 148

Refer to the exhibit.

300-410 question answer

The branch router is configured with a default route toward the internet and has no routes configured for the HQ site that is connected through interface G2/0. The HQ router is fully configured and does not require changes. Which configuration on the branch router makes the intranet website (TCP port 80) available to the branch office users?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 149

Refer to the exhibit.

300-410 question answer

A network engineer finds that PC1 is accessing the hotel website to do the booking but fails to make payment. Which action resolves the issue?

A.

Allow stub network 10.10.202.168/30 on router R3 OSPF.

B.

Decrease the AD to 5 OSPF route 192.168.94.0 on R1.

C.

Increase the AD to 200 of static route 192.168.94.0 on R3.

D.

Configure a reverse route on R1 for PC1 172.16.1.0/24.

Full Access
Question # 150

Refer to the exhibit.

300-410 question answer

An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?

A.

flow monitor Flowmonitor1destination 10.221.10.11

B.

flow exporter FlowAnalyzer1destination 10.221.10.11

C.

interface Ethernet0/1flow-destination 10.221.10.11

D.

interface Ethernet0/0flow-destination 10.221.10.11

Full Access
Question # 151

300-410 question answer

Refer to the exhibit. An engineer must troubleshoot an issue with the aaa authentication that affected the user's login to router R1. Which command allows the configured user to authenticate?

A.

aaa authentication login default group radius local

B.

aaa authentication login default group radius tacacs+

C.

aaa authentication login default group tacacs+

D.

aaa authentication login default group radius

Full Access
Question # 152

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

300-410 question answer

300-410 question answer

WAN

300-410 question answer

300-410 question answer

300-410 question answer

CORE

300-410 question answer

300-410 question answer

300-410 question answer

300-410 question answer

MGMT

300-410 question answer

300-410 question answer

Full Access
Question # 153

300-410 question answer

300-410 question answer

Refer to the exhibit Users from the 192 168.2.0/24 network cannot connect to the 172.16 2 32/28 network Which configuration resolves the issue'?

A)

300-410 question answer

B)

300-410 question answerC)

300-410 question answer

D)

300-410 question answer

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 154

300-410 question answer

Refer to the exhibit. An engineer is troubleshooting suboptimal communication from the 192.168.5.32/28 subnet to the 172.16.3.16/28 segment using the slowest links. Which configuration resolves the suboptimal routing issue?

A.

R1(config-router)#router elgrp 100

R1(config-router)#redistribute ospf 1 metric 1000000 1111

B.

R2{config-router)#router ospf 1

R2{config-roiiter)#default-metric 1

R1(config-router)#router ospf 1

R1(config-router)#default-metric 10

C.

R2(config-router)#ro liter eigrp 100

R2(config-router)#redistribute ospf 1 metric 1000000 1111

D.

R2(config-router)#ro uter ospf 1

R2(config-router)#default-metric 10

R1(config-router)#router ospf 1

R1(config-router)#default-metric 1

Full Access
Question # 155

300-410 question answer

Refer to the exhibit. Which configuration is required for R2 to get the IP address from the DHCP server?

A.

ip access-list extended R2WANpermit tcp any any eq 68

B.

ip access-list extended R2WANpermit udp any any eq 68

C.

ip access-list extended R2WANpermit udp any any eq 67

D.

interface GigabitEthernet0/0ip access-group R2WAN out

Full Access
Question # 156

Refer to the exhibit.

300-410 question answer

An engineer implemented CoPP but did not see OSPF traffic going through it. Which configuration resolves the issue?

A.

ip access-list extended OSPF permit ospf any any

B.

policy-map COPP class OSFP police 8000 conform-action transmit exceed-action transmit violate-action drop

C.

control-plane service-policy input COPP

D.

class-map match-all OSFP match access-group name OSPF

Full Access
Question # 157

A customer reports that traffic is not passing on an EIGRP enabled multipoint interface on a router configured as below:

interface Serial0/0

no ip address

interface Server0/0/0.9 multipoint

ip address 10.1.1.1 255.255.255.248

ip split-horizon eigrp 1

Which action resolves the issue?

A.

Enable poison reverse

B.

Enable split horizon

C.

Disable poison reverse

D.

Disable split horizon

Full Access
Question # 158

Refer to the exhibit.

300-410 question answer

An engineer is troubleshooting a TACACS problem.

Which action resolves the issue?

A.

Configure a matching TACACS server IP.

B.

Configure a matching preshared key.

C.

Generate authentication from a relative source interface.

D.

Apply a configured AAA profile to the VTY.

Full Access
Question # 159

Refer to the exhibit.

300-410 question answer

Spoke routers do not learn about each other's routes in the DMVPN Phase2 network. Which action resolves the issue?

A.

Remove default route from spoke routers to establish a spoke-to-spoke tunnel.

B.

Configure a static route in each spoke to establish a spoke-to-spoke tunnel.

C.

Rectify incorrect wildcard mask configured on the hub router network command.

D.

Disable EIGRP split horizon on the TunnelO interface of the hub router.

Full Access
Question # 160

A network administrator successfully established a DMVPN tunnel with one hub and two spokes using EIGRP. One of the requirements was to enable spoke-to-spoke tunnels through the hub router using EIGRP. Which configuration command must the engineer configure to meet the requirement?

A.

no ip eigrp 1 mode multipoint

B.

no ip eigrp 1 split-horizon

C.

no ip eigrp 1 tunnel-redirect

D.

no ip eigrp 1 mode mgre

Full Access
Question # 161

What does the MP-BGP OPEN message contain?

A.

MPLS labels and the IP address of the router that receives the message

B.

the version number and the AS number to which the router belongs

C.

IP routing information and the AS number to which the router belongs

D.

NLRI, path attributes, and IP addresses of the sending and receiving routers

Full Access
Question # 162

300-410 question answer

300-410 question answer

Refer to the exhibit. An engineer Is troubleshooting a routing loop on the network to reach the 172.16.3.0/16 from the OSPF domain. Which configuration on router R1 resolves the Issue?

A)

300-410 question answer

B)

300-410 question answer

C)

300-410 question answer

D)

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 163

Refer to the exhibit.

300-410 question answer

After a security audit, the administrator implemented an ACL in the route reflector. The RR became unreachable from any router in the network. Which two actions resolve the issue? (Choose two.)

A.

Enable the ND proxy feature on the default gateway.

B.

Configure a link-local address on the Ethernet0/1 interface.

C.

Permit ICMPv6 neighbor discovery traffic in the ACL.

D.

Remove the ACL entry 80.

E.

Change the next hop of the default route to the link-local address of the default gateway.

Full Access
Question # 164

:586

While BGP internet routes are redistributed to a lower class of router via RIP. packets are being dropped and routes are failing to be distributed in RIP. Which action resolves the issue?

A.

Use OSPF instead of RIP to accept all BGP routes.

B.

Use the input-queue command to prevent the loss of packets.

C.

Use WFQ in the output queue of the high-performance router.

D.

Use RIP V2 to be able to use classless networks from BGP

Full Access
Question # 165

300-410 question answer

300-410 question answer

Refer to the exhibit SW100 cannot receive routes from R1 Which configuration resolves the issue?

300-410 question answer

300-410 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option C

Full Access
Question # 166

Refer to the exhibit.

300-410 question answer

The forwarding entries how that the next hop for prefixes from the 172.16.0.0/16 network is set to 10.2.2.2 instead of 10.1.1.1. Which action resolves the issue?

A.

Add set ip next hop 10.1.1.1 in route-map RED permit 20.

B.

Add the continue statement in route-map RED permit 10 instead of continue 20.

C.

Remove match ip address prefix-list 1 from route-map RED permit 10.

D.

Remove the continue 20 statement from route-map RED permit 10

Full Access
Question # 167

What is a characteristic of Layer 3 MPLS VPNs?

A.

LSP signaling requires the use of unnumbered IP links for traffic engineering.

B.

Traffic engineering supports multiple IGP instances

C.

Traffic engineering capabilities provide QoS and SLAs.

D.

Authentication is performed by using digital certificates or preshared keys.

Full Access
Question # 168

Refer to the exhibit.

300-410 question answer

A bank ATM site has difficulty connecting with the bank server. A network engineer troubleshoots the issue and finds that R4 has no active route to the bank ATM site. Which action resolves the issue?

A.

Advertise 10.10.30.0/24 subnet in R1 EIGRP AS.

B.

EIGRP peering between R3 and R4 to be fixed.

C.

EIGRP peering between R1 and R2 to be fixed.

D.

Advertise 10.10.30.0/24 subnet in R3 EIGRP AS.

Full Access
Question # 169

Refer to the exhibit.

300-410 question answer

Mutual redistribution is enabled between RIP and EIGRP on R2 and R5. Which configuration resolves the routing loop for the 192.168.1.0/24 network?

A.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

B.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

C.

R2:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s0!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 10network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 10 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

D.

R2:router eigrp 7network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 7 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit anyR5:router eigrp 7network 181.16.0.0redistribute rip metric 1 1 1 1 1distribute-list 1 in s1!router ripnetwork 178.1.0.0redistribute eigrp 7 metric 2!access-list 1 deny 192.168.1.0access-list 1 permit any

Full Access
Question # 170

How is VPN routing information distributed in an MPLS network?

A.

The top level of the customer data packet directs it to the correct CE device

B.

It is established using VPN IPsec peers.

C.

It is controlled using of VPN target communities.

D.

It is controlled through the use of RD.

Full Access
Question # 171

Which rouler takes an active role between two LDP neighbors when initiating LDP session negotiation and LDP TCP connection establishment?

A.

with the higher IP address

B.

with the larger number of LDP TCP neighbors

C.

with the lowest IP address

D.

with one interface in the MPLS backbone

Full Access
Question # 172

Refer to the exhibit.

300-410 question answer

A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?

A.

Remove ipv6 inspect ipv6-firewall in from interface gi0/1

B.

Add permit udp any eq domain any log in the access list.

C.

inspect ipv6 inspect name ipv6-firewall udp 53 in global config.

D.

Add permit any eq domain 53 any log in the access list.

Full Access
Question # 173

Refer to the exhibit.

300-410 question answer

R5 should not receive any routes originated in the EIGRP domain. Which set of configuration changes removes the EIGRP routes from the R5 routing table to fix the issue?

A.

R4route-map O2R deny 10match tag 111route-map O2R permit 20!router ripredistribute ospf 1 route-map O2R metric 1

B.

R2route-map E20 deny 20R4route-map O2R deny 10match tag 111!router ripredistribute ospf 1 route-map O2R metric 1

C.

R4route-map O2R permit 10match tag 111route-map O2R deny 20!router ripredistribute ospf 1 route-map O2R metric 1

D.

R4route-map O2R deny 10match tag 111!router ripredistribute ospf 1 route-map O2R metric 1

Full Access
Question # 174

300-410 question answer

Refer to the exhibit. Which action limits the access to R2 from 192.168.12.1?

A.

Swap sequence 10 with sequence 20 in access-list 100.

B.

Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100

C.

Swap sequence 20 with sequence 10 in access-list 100

D.

Modify sequence 10 to deny tcp any eq 22 any to access-list 100.

Full Access
Question # 175

What is the purpose of the DHCPv6 Guard?

A.

It messages between a DHCPv6 server and a DHCPv6 client ( or relay agent).

B.

It shows that clients of a DHCPv5 server are affected.

C.

It block DHCPv6 messages from relay agents to a DHCPv6 server.

D.

It allows DHCPv6 replay and advertisements from (rouge) DHCPv6 servers.

Full Access
Question # 176

Which two protocols can cause TCP starvation? (Choose two)

A.

TFTP

B.

SNMP

C.

SMTP

D.

HTTPS

E.

FTP

Full Access
Question # 177

Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A.

multi-paths eibgp 2

B.

maximum-paths 2

C.

Maximum-paths ibgp 2

D.

multi-paths 2

Full Access
Question # 178

Which statement about IPv6 RA Guard is true?

A.

It does not offer protection in environments where IPv6 traffic is tunneled.

B.

It cannot be configured on a switch port interface in the ingress direction.

C.

Packets that are dropped by IPv6 RA Guard cannot be spanned.

D.

It is not supported in hardware when TCAM is programmed.

Full Access
Question # 179

Refer to the exhibit.

300-410 question answer

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Full Access
Question # 180

Which security feature can protect DMVPN tunnels?

A.

IPsec

B.

TACACS+

C.

RTBH

D.

RADIUS

Full Access
Question # 181

Refer to the exhibit.

300-410 question answer

AAA server 10.1.1.1 is configured with the default authentication and accounting settings, but the switch cannot communicate with the server Which action resolves this issue?

A.

Match the authentication port

B.

Match the accounting port

C.

Correct the timeout value.

D.

Correct the shared secret.

Full Access
Question # 182

Refer to the exhibit.

300-410 question answer

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken to resolve this Issue? (Choose two.)

A.

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.

Configure the server with a static IP address and default gateway.

C.

Configure the router to exclude a server IP address.

D.

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.

Configure the router to exclude a server IP address and default gateway.

Full Access
Question # 183

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

TypE. dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does the authoritative flag mean in regards to the NHRP information?

A.

It was obtained directly from the next-hop server.

B.

Data packets are process switches for this mapping entry.

C.

NHRP mapping is for networks that are local to this router.

D.

The mapping entry was created in response to an NHRP registration request.

E.

The NHRP mapping entry cannot be overwritten.

Full Access
Question # 184

Refer to the exhibits.

300-410 question answer

Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two

commands are missing? (Choose two.)

A.

The ip nhrp redirect command is missing on the spoke routers.

B.

The ip nhrp shortcut command is missing on the spoke routers.

C.

The ip nhrp redirect commands is missing on the hub router.

D.

The ip nhrp shortcut commands is missing on the hub router.

E.

The ip nhrp map command is missing on the hub router.

Full Access