1 / 6

300-410 VOL2-Question

300-410 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) VOL2

romanericc9
Download Presentation

300-410 VOL2-Question

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 300-410 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) VOL2 QUESTION NO: 1 In a typical MPLS VPN, which routers act as the MPLS label imposition and disposition points in the network? A.CE Router B.P router C.PE Router D.Core router Answer: C QUESTION NO: 2 In an MPLS network, which of the following describes the role of the Provider (P) router? A.To connect to customer edge (CE) devices B.To connect to PE routers and act as transit routers C.To impose MPLS labels D.To filter VPN routes in the core Answer: B QUESTION NO: 3 The MPLS LDP autoconfiguration feature allows you to enable LDP on every interface that is associated with an IGP instance. Which of the following Interior Gateway Protocols support this? (Choose two) A.OSPF B.IS-IS C.BGP D.RIP E.EIGRP Answer: A, B QUESTION NO: 4 In an MPLS VPN network, how are customer routes controlled and distributed? © Copyright Prep Solutions Limited, All rights reserved

  2. A.Through the use of GRE tunnels B.Customer routes are redistributed into the IGP that the service provider is using C.Customer routes are redistributed into BGP within the service provider D.It is distributed through the use of route targets Answer: D QUESTION NO: 5 At which layer of the OSI model is an MPLS label imposed? A.Layer 2 B.Layer 3 C.Between layers 2 and 3 D.Between layers 3 and 4 Answer: C QUESTION NO: 6 Which of the following are valid IPv6 Router Advertisement (RA) Guard modes? (Select two) A.Guard mode B.Host mode C.Router mode D.Open mode E.Closed mode Answer: B, C QUESTION NO: 7 Which of the following statements are true regarding the e IPv6 RA Guard feature? A.This feature is support on LAG bundles interfaces B.This feature is supported on private VLANs C.Packets dropped by the IPv6 RA Guard feature cannot be spanned. D.This feature offers protection in networks where IPv6 traffic is tunneled. Answer: B © Copyright Prep Solutions Limited, All rights reserved

  3. QUESTION NO: 8 Unicast Reverse Path Forwarding (uRPF) has been configured on a service provider network to protect itself from spoofed based attacks. Which of the following are valid uRPF modes? (Select two) A.Strict mode B.Open mode C.Closed mode D.Block mode E.Loose mode Answer: A, E QUESTION NO: 9 Which of the following are commonly used ports when implementing RADIUS based authentication and accounting? Select two) A.UDP port 1644 for authentication B.UDP port 1812 for authentication C.TCP port 1812 for authentication D.UDP port 1813 for accounting E.TCP port 1813 for accounting F.UDP port 1644 for accounting Answer: B, D QUESTION NO:10 Which of the following are valid restrictions when configuring Control Plane Policing (CoPP) on Cisco devices? (Choose two) A.You can not use the “log” keyword with CoPP on the access list entries B.CEF must be disabled C.The only match types supported with CoPP is ip precedence, ip dscp, and access-group D.Only standard access=lists are supported. Answer: A, C QUESTION NO: 11 © Copyright Prep Solutions Limited, All rights reserved

  4. Which of the following are used to validate the source of IPv6 traffic and are considered IPv6 layer 2 snooping features? A.DHCPv6 Guard B.DHCPv6 Root Guard C.IPv6 Source Guard D.IPv6 Prefix Guard Answer: C, D QUESTION NO: 12 You want to implement AAA on router R1 for a more robust authentication and authorization system. What is typically the first global command used to do this? A.aaa new-model B.aaa enable C.aaa server-group D.aaa authentication login Answer: A QUESTION NO: 13 A time-based access list has been configured on R1 to allow SSH access to the device only on weekdays. Which of the following are valid options when using the time range command? (Select two) A.relative B.recurring C.absolute D.periodic Answer: C, D QUESTION NO: 14 First-Hop Security (FHS) is a set of features to optimize IPv6 link operation, and help with scale in large L2 domains. Which of the following are valid First-Hop Security features supported by Cisco? (Select three) A.IPv6 RA Guard B.IPv6 Source Guard © Copyright Prep Solutions Limited, All rights reserved

  5. C.DHCPv6 Guard D.IPv6 Snooping E.DHCPv6 Snooping Answer: A, C, D QUESTION NO: 15 What are the four stages of obtaining an IP address from a DHCP server that corresponds to the acronym DORA? A.Discover, Offer, Release, Addressing B.Discover, Obtain, Request, Acknowledge C.Determine, Offer, Release, Acknowledge D.Discover, Offer, Request, Acknowledge Answer: D QUESTION NO: 16 SNMPv2 has been used throughout a network to manage all of the network devices. You have been asked to migrate to an SNMPv3 solution instead. What is the biggest advantage to migrating from SNMPv2 to SNMPv3? A.Enhanced security, including encryption of passwords B.Enhanced performance, supporting more messages per minute. C.Enhanced scaling, supporting thousands more devices per network segment than SNMPv2. D.Using a push model instead of pull. SNMPv3 uses telemetry to push data to SNMP management stations in real time. Answer: A QUESTION NO: 17 You are configuring Netflow on various network elements in order to gain visibility into the traffic types used. How many export destinations can this Network data be sent to? A.Up to 2 B.Up to 4 C.Up to 8 D.There is no limitation on the number of flow data export destinations. © Copyright Prep Solutions Limited, All rights reserved

  6. Answer: A QUESTION NO: 18 A Cisco router has just been configured for NTP and is synchronized with the configured NTP server. However, log messages still show an incorrect time. What else should be done to match the log messages time stamps with the NTP based time? A.Wait a bit longer for the synchronized time to get applied to new log messages. B.Configure the “service timestamps log datetime localtime” command in global mode. C.Configure the “service timestamps log datetime synchronize” command globally D.Configure the “service timestamps log ntp” command in global config mode. Answer: B QUESTION NO: 19 There is an issue between two nodes within your network, and you are using Cisco DNA Center Path Trace to help troubleshoot the problem. Which of the following statements are true regarding the Path Trace tool? A.Overlapping IP addresses are supported. B.Path trace between a fabric client and a non-fabric client is supported C.Path trace between a wired client and a wireless client is supported D.Only TCP traffic is supported. Answer: C QUESTION NO: 20 Which of the following are valid DHCP options that DHCP servers can be configured to use with DHCP clients when offering a lease? (Choose two) A.DHCP Option 1: subnet mask B.DHCP Option 3: Lease Duration C.DHCP Option 4: Client host name D.DHCP Option 6: DNS servers Answer: A, E © Copyright Prep Solutions Limited, All rights reserved

More Related