DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Cisco 300-410 ENARSI Exam Question and Answer & Exam Resources

Cisco 300-410 ENARSI is an essential exam for aspiring CCNP Enterprise professionals. It validates your skills in implementing core enterprise network services. To successfully pass this challenging exam, you need reliable resources like practice tests, practice exams, and sample questions with detailed explanations. Our Cisco 300-410 exam resource provides you with the most up-to-date and comprehensive exam questions and answers, covering all exam topics. Our study material is meticulously crafted by certified experts, ensuring you have access to the best exam preparation resources. With our exam resources, you can confidently prepare for the exam and increase your chances of acing it on the first attempt.
Take other online exams

Question #1
Refer to the exhibit. AAA server 10.1.1.1 is configured with the default authentication and accounting settings, but the switch cannot communicate with the server.Which action resolves this issue?
A. orrect the timeout value
B. atch the authentication port
C. orrect the shared secret
D. atch the accounting port
View answer
Correct Answer: B
Question #2
Refer to the exhibit. R1 is being monitored using SNMP and monitoring devices are getting only partial information.What action should be taken to resolve this issue?
A. odify the CoPP policy to increase the configured exceeded limit for SNMP
B. odify the access list to include snmptrap
C. odify the CoPP policy to increase the configured CIR limit for SNMP
D. odify the access list to add a second line to allow udp any anyeqsnmp
View answer
Correct Answer: B
Question #3
Refer to the exhibit. A client is concerned that passwords are visible when running this show archive log config all. Which router configuration is needed to resolve this issue?
A. ASS-RTR(config)#aaa authentication arap
B. ASS-RTR(config-archive-log-cfg)#password encryption aes
C. ASS-RTR(config)#service password-encryption
D. ASS-RTR(config-archive-log-cfg)#hidekeys
View answer
Correct Answer: D
Question #4
What are two functions of IPv6 Source Guard? (Choose two.)
A. ecrease the committed burst size of the mgmt class map
B. ncrease the CIR of the mgmt class map
C. dd one new entry in the ACL 120 to permit the UDP port 161
D. dd a new class map to match TCP traffic
View answer
Correct Answer: BC
Question #5
Refer to the exhibit. Which two actions restrict access to router R1 by SSH? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: AC
Question #6
Refer to the exhibit. A network administrator wants to block all traffic toward the Internet after business hours and on weekends. When the administrator applies an access list on interface Gi0/1, all traffic is blocked and there is no access to the Internet at any time.Which action resolves the issue?
A. dd the permit ip any any time-range no-conn statement after the deny udp any any time-range no- conn command in the access list
B. dd the permit ip any any statement after the deny icmp any any time-range no-conn command in the access list
C. dd the permit allowed time-range no-conn statement after the deny icmp any any time-range no-conncommand in the access list
D. dd the permit ip any any time-range no-conn statement after the deny icmp any any time-range no- conn command in the access list
View answer
Correct Answer: B
Question #7
Refer to the exhibit. An IPv6 network was newly deployed in the environment and the help desk reports that R3 cannot SSH to the R2s Loopback interface.Which action resolves the issue?
A. odify line 10 of the access list to permit instead of deny
B. emove line 60 from the access list
C. odify line 30 of the access list to permit instead of deny
D. emove line 70 from the access list
View answer
Correct Answer: C
Question #8
An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ipospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE.Which action should be taken to resolve this issue?
A. atch the passwords
B. atch the hello timers
C. atch the MTUs
D. atch the network types
View answer
Correct Answer: C
Question #9
Refer to the exhibit. A network administrator is trying to access a branch router using TACACS+ username and password credentials, but the administrator cannot log in to the router because the WAN connectivity is down. The branch router has following AAA configuration:aaa new-modelaaa authorization commands 15 default group tacacs+aaa accounting commands 1 default stop-only group tacacs+aaa accounting commands 15 default stop-only group tacacs+tacacs-server host 10.100.50.99tacacs-server key Ci$co123Which c
A. aa authentication login console group tacacs+ enable
B. aa authentication login default group tacacs+ local
C. aa authentication login default group tacacs+ enable
D. aa authentication login default group tacacs+ console
View answer
Correct Answer: B
Question #10
Refer to the exhibit. An engineer is troubleshooting failed access by contractors to the business application server via Telnet or HTTP during the weekend.Which configuration resolves the issue?
A. 1no access-list 101 permit tcp 10
B. 1time-range Contractorno periodic weekdays 8:00 to 16:30periodic daily 8:00 to 16:30
C. 4time-range Contractorno periodic weekdays 17:00 to 23:59periodic daily 8:00 to 16:30
D. 4no access-list 101 permit tcp 10
View answer
Correct Answer: B
Question #11
What are two characteristics of IPv6 Source Guard? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: CD
Question #12
DRAG DROP (Drag and Drop is not supported)Drag and drop the IPv6 first hop security device roles from the left onto the corresponding descriptions on the right. Select and Place:
A. o access-list 101 access-list 101 deny tcp host 10
B. ontrol-planeno service-policy input PM-CoPP!interface Ethernet 0/0 service-policy input PM-CoPP
C. o access-list 101 access-list 101 deny tcp host 10
D. ontrol-planeno service-policy input PM-CoPPservice-policy input PM-CoPP
View answer
Correct Answer: A
Question #13
Refer to the exhibit. A network administrator successfully logs in to a switch using SSH from a RADIUS server. When the network administrator uses a console port to access the switch, the RADIUS server returns shell:priv-lvl=15" and the switch asks to enter the enable command. When the command is entered, it gets rejected. Which command set is used to troubleshoot and resolve this issue?
A. ine con 0 aaa authorization console privl5 !linevty 0 4 authorization exec
B. ine con 0 aaa authorization console !linevty 0 4 authorization exec
C. ine con 0 aaa authorization console authorization priv15!linevty 0 4 transport input ssh
D. ine con 0 aaa authorization console authorization exec!linevty 0 4 transport input ssh
View answer
Correct Answer: D
Question #14
Refer to the exhibit. An engineer is troubleshooting a TACACS problem. Which action resolves the issue?
A. onfigure a matching TACACS server IP
B. onfigure a matching preshared key
C. enerate authentication from a relative source interface
D. pply a configured AAA profile to the VTY
View answer
Correct Answer: B
Question #15
The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped.access-list 100 permit ip host 172.16.1.99 any !class-map CM-ADMIN match access-group 100 !policy-map PM-COPP class CM-ADMIN police 500000 conform-action transmit !interface E0/0 service-policy input PM-COPP CoPP failed to capture the desired traffic and the CPU load is getting highe
A. nterface E0/0 no service-policy input PM-COPP !control-planeservice-policy input PM-COPP
B. olicy-map PM-COPP class CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit !control-planeservice-policy input PM-COPP
C. o access-list 100 access-list 100 permit tcp host 172
D. o access-list 100 access-list 100 permit tcp host 172
E. olicy-map PM-COPPclass CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit
View answer
Correct Answer: A
Question #16
Refer to the exhibit. While monitoring VTY access to a router, an engineer notices that the router does not have any filter and anyone can access the router with username and password even though an ACL is configured. Which command resolves this issue?
A. ccess-class INTERNET in
B. p access-group INTERNET in
C. pv6 traffic-filter INTERNET in
D. pv6 access-class INTERNET in
View answer
Correct Answer: D
Question #17
Refer to the exhibit. An engineer is trying to connect to R1 via Telnet with no success.Which configuration resolves the issue?
A. acacs server prod address ipv4 10
B. p route 10
C. p route 10
D. acacs server prod address ipv4 10
View answer
Correct Answer: C
Question #18
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)
A. odify the subnet mask to the network 192
B. onfigure the DHCP lease time to a smaller value
C. onfigure the DHCP lease time to a bigger value
D. dd the network 192
View answer
Correct Answer: AB
Question #19
Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?
A. tart-time 00:00
B. tart-time 0
C. tart-time immediately
D. tart-time now
View answer
Correct Answer: B
Question #20
Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?
A. n authentication error with the NTP server results in an incorrect timestamp
B. he keyword localtime is not defined on the timestamp service command
C. he NTP server is in a different time zone
D. he system clock is set incorrectly to summer-time hours
View answer
Correct Answer: A
Question #21
DRAG DROP (Drag and Drop is not supported)Drag and drop the DHCP messages from the left onto the correct uses on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #22
A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?
A. ervice timestamps log uptime
B. lock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00
C. ervice timestamps log datetimelocaltime show-timezone
D. lock calendar-valid
View answer
Correct Answer: C
Question #23
When provisioning a device in Cisco DNA Center, the engineer sees the error message “Cannot select the device. Not compatible with template”. What is the reason for the error?
A. he template has an incorrect configuration
B. he software version of the template is different from the software version of the device
C. he changes to the template were not committed
D. he tag that was used to filter the templates does not match the device tag
View answer
Correct Answer: D
Question #24
While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?
A. he device must be resynced to Cisco DNA Center
B. he software image for the device is in install mode
C. he device has lost connectivity to Cisco DNA Center
D. he software image for the device is in bundle mode
View answer
Correct Answer: B
Question #25
An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?
A. udo maglev-config update
B. udomaglevinstallconfig update
C. udomaglev reinstall
D. udo update config install
View answer
Correct Answer: A
Question #26
DRAG DROP (Drag and Drop is not supported)Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #27
Refer to the exhibit. An administrator that is connected to the console does not see debug messages when remote users log in. Which action ensures that debug messages are displayed for remote logins?
A. nter the transport input ssh configuration command
B. nter the terminal monitor exec command
C. nter the logging console debugging configuration command
D. nter the aaa new-model configuration command
View answer
Correct Answer: C
Question #28
Refer to the exhibit. Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)
A. he flow exporter is configured but is not used
B. he flow monitor is applied in the wrong direction
C. he flow monitor is applied to the wrong interface
D. he destination of the flow exporter is not reachable
View answer
Correct Answer: AB
Question #29
Refer to the exhibit. Why is the remote NetFlow server failing to receive the NetFlow data?
A. Q_R3(config)# ipsla responderHQ_R3(config)# ipsla responder icmp-echo 172
B. RANCH(config)# ipsla 1BRANCH(config-ip-sla)# icmp-echo 192
C. Q_R3(config)# ipsla responderHQ_R3(config)# ipsla responder icmp-echo 172
D. RANCH(config)# ipsla 1BRANCH(config-ip-sla)# icmp-echo 192
View answer
Correct Answer: D
Question #30
Refer to the exhibit. An engineer has successfully set up a floating static route from the BRANCH router to the HQ network using HQ_R1 as the primary default gateway. When the g0/0 goes down on HQ_R1, the branch network cannot reach the HQ network 192.168.20.0/24.Which set of configurations resolves the issue?
A. OOTP port 67
B. HCP option 66
C. OOTP port 68
D. HCP option 69
View answer
Correct Answer: D
Question #31
Refer to the exhibit. The remote server is failing to receive the NetFlow data. Which action resolves the issue?
A. odify the flow transport command transport udp 2055 to move under flow monitor profile
B. odify the interface command to ip flow monitor FLOW-MONITOR-1 input
C. odify the udp port under flow exporter profile to ip transport udp 4739
D. odify the flow record command record v4_r1 to move under flow exporter profile
View answer
Correct Answer: B
Question #32
Refer to the exhibit. A network administrator configured NTP on a Cisco router to get synchronized time for system and logs from a unified time source. The configuration did not work as desired.Which service must be enabled to resolve the issue?
A. nter the service timestamps log datetime clock-period global command
B. nter the service timestamps log datetime synchronize global command
C. nter the service timestamps log datetime console global command
D. nter the service timestamps log datetimelocaltime global command
View answer
Correct Answer: D
Question #33
Refer to the exhibits. An engineer filtered messages based on severity to minimize log messages. After applying the filter, the engineer noticed that it filtered required messages as well.Which action must the engineer take to resolve the issue?
A. onfigure syslog level 2
B. onfigure syslog level 3
C. onfigure syslog level 4
D. onfigure syslog level 5
View answer
Correct Answer: D
Question #34
An engineer is troubleshooting on the console session of a router and turns on multiple debug commands. The console screen is filled with scrolling debug messages that none of the commands can be verified if entered correctly or display any output.Which action allows the engineer to see entered console commands while still continuing the analysis of the debug messages?
A. onfigure the term no mon command globally
B. onfigure the logging synchronous level all command
C. onfigure the logging synchronous command
D. onfigure the no logging console debugging command globally
View answer
Correct Answer: C
Question #35
Refer to the exhibit. The DHCP client is unable to receive an IP address from the DHCP server. RouterB is configured as follows:Which command is required on the fastethernet 0/0 interface of RouterB to resolve this issue?
A. outerB(config-if)#ip helper-address 172
B. outerB(config-if)#ip helper-address 255
C. outerB(config-if)#ip helper-address 172
D. outerB(config-if)#ip helper-address 172
View answer
Correct Answer: C
Question #36
Refer to the exhibit. A network administrator added one router in the Cisco DNA Center and checked its discovery and health from the Network Health Dashboard. The network administrator observed that the router is still showing up as unmonitored.What must be configured on the router to mount it in the Cisco DNA Center?
A. onfigure router with SNMPv2c or SNMPv3 traps
B. onfigure router with the telemetry data
C. onfigure router with routing to reach Cisco DNA Center
D. onfigure router with NetFlow data
View answer
Correct Answer: B
Question #37
Refer to the exhibit. NTP is configured across the network infrastructure and Cisco DNA Center. An NTP issue was reported on the Cisco DNA Center at 17:15.Which action resolves the issue?
A. eset the NTP server to resolve any synchronization issues for all devices
B. heck and resolve reachability between Cisco DNA Center and the NTP server
C. heck and resolve reachability between the WLC and the NTP server
D. heck and configure NTP on the WLC and synchronize with Cisco DNA Center
View answer
Correct Answer: D
Question #38
Refer to the exhibit. PC-2 failed to establish a Telnet connection to the terminal server.Which configuration resolves the issue?
A. ateway-Router(config)#ipv6 access-list Default_AccessGateway-Router(config-ipv6-acl)#sequence 25 permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet
B. ateway-Router(config)#ipv6 access-list Default_AccessGateway-Router(config-ipv6-acl)#no sequence 20Gateway-Router(config-ipv6-acl)#sequence 5 permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet
C. ateway-Router(config)#ipv6 access-list Default_AccessGateway-Router(config-ipv6-acl)#permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet
D. ateway-Router(config)#ipv6 access-list Default_AccessGateway-Router(config-ipv6-acl)#sequence 15 permit tcp host 2018:DB1:A:B::2 host 2018:DB1:A:C::1 eq telnet
View answer
Correct Answer: D
Question #39
Refer to the exhibit. A network administrator enables DHCP snooping on the Cisco Catalyst 3750-X switch and configures the uplink port (Port-channel2) as a trusted port. Clients are not receiving an IP address, but when DHCP snooping is disabled, clients start receiving IP addresses.Which global command resolves the issue?
A. pdhcp relay information trust portchannel2
B. pdhcp snooping
C. pdhcp snooping trust
D. o ipdhcp snooping information option
View answer
Correct Answer: D
Question #40
A customer reports to the support desk that they cannot print from their PC to the local printer id:123456789.Which tool must be used to diagnose the issue using Cisco DNA Center Assurance?
A. evice trace
B. CL trace
C. ath trace
D. pplication trace
View answer
Correct Answer: C
Question #41
An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME, WRONGDIGEST". Which action resolves the issue?
A. onfigure the correct authentication password using SNMPv3 authNoPriv
B. onfigure correct authentication and privacy passwords using SNMPv3 authPriv
C. onfigure correct authentication and privacy passwords using SNMPv3 authNoPriv
D. onfigure the correct authentication password using SNMPv3 authPriv
View answer
Correct Answer: B
Question #42
Refer to the exhibit. A network administrator is discovering a Cisco Catalyst 9300 and a Cisco WLC 3504 in Cisco DNA Center. The Catalyst 9300 is added successfully. However, the WLC is showing error "uncontactable" when the administrator tries to add if in Cisco DNA Center.Which action discovers WLC in Cisco DNA Center successfully?
A. elete the WLC 3504 from Cisco DNA Center and add it to Cisco DNA Center again
B. dd the WLC 3504 under the hierarchy of the Catalyst 9300 connected devices
C. opy the
D. opy the
View answer
Correct Answer: D
Question #43
Refer to the exhibit. A user cannot SSH to the router. What action must be taken to resolve this issue?
A. onfigure transport input ssh
B. onfigure transport output ssh
C. onfigure ipssh version 2
D. onfigure ipssh source-interface loopback0
View answer
Correct Answer: A
Question #44
An engineer configured a Cisco router to send reliable and encrypted notifications for any events to the management server. It was noticed that the notification messages are reliable but not encrypted.Which action resolves the issue?
A. onfigure all devices for SNMPv3 informs with auth
B. onfigure all devices for SNMPv3 informs with priv
C. onfigure all devices for SNMPv3 traps with auth
D. onfigure all devices for SNMPv3 traps with priv
View answer
Correct Answer: B
Question #45
Refer to the exhibit. An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available.How is this issue resolved?
A. se the icmp-echo command to track both default routes
B. se the same AD for both default routes
C. tart IP SLA by matching numbers for track and ipsla commands
D. tart IP SLA by defining frequency and scheduling it
View answer
Correct Answer: D
Question #46
Refer to the exhibits. An engineer identified a Layer 2 loop using DNAC. Which command fixes the problem in the SF-D9300-1 switch?
A. panning-tree portfastbpduguard
B. o spanning-tree uplinkfast
C. panning-tree backbonefast
D. panning-tree loopguard default
View answer
Correct Answer: A
Question #47
Refer to the exhibit. An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1. Which configuration is needed on R1 to resolve this issue?
A. 1(config)#line vty 0R1(config-line)# transport output ssh
B. 1(config)#line console 0R1(config-line)# transport output ssh
C. 1(config)#line console 0R1(config-line)# transport preferred ssh
D. 1(config)#line vty 0R1(config-line)# transport output sshR1(config-line)# transport preferred ssh
View answer
Correct Answer: D
Question #48
Refer to the exhibit. The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address.What two actions must be taken to resolve this issue? (Choose too.)
A. e-issue the ipsla schedule command
B. dd the control disable option to the tcp connect
C. odify the ipsla schedule frequency to forever
D. dd icmp-echo command for the host
View answer
Correct Answer: BC
Question #49
Refer to the exhibit. A user has set up an IP SLA probe to test if a non SLA host web server on IP address10.1.1.1 accepts HTTP sessions prior to deployment. The probe is failing.Which action should the network administrator recommend for the probe to succeed?
A. onfigure to match the OSPF interface network types on both routers
B. onfigure to match the OSPF interface speed and duplex settings on both routers
C. onfigure to match the OSPF interface MTU settings on both routers
D. onfigure to match the OSPF interface unique IP address and subnet mask on both routers
View answer
Correct Answer: A
Question #50
Refer to the exhibit. A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log messages stream, it is impossible to capture the problem.Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two.)
A. config)#terminal no monitor
B. config)#no terminal monitor
C. no terminal monitor
D. terminal no monitor
View answer
Correct Answer: AB
Question #51
Refer to the exhibit. A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?
A. he Python interpreter must first be enabled with the guestshell enable command
B. he SSH access must be allowed on the VTY lines using the transport input ssh command
C. he SSH service must be enabled with the crypto key generate rsa command
D. he SCP service must be enabled with the ipscp server enable command
View answer
Correct Answer: D
Question #52
Refer to the exhibit. A network administrator has developed a Python script on the local Linux machine and is trying to transfer it to the router. However, the transfer fails.Which action resolves this issue?
A. ccess-list 20 permit 10
B. nmp-server group NETADMIN v3 priv read NETVIEW write NETADMIN access 22
C. nmp-server group NETVIEW v2c priv read NETVIEW access 20
D. ccess-list 20 permit 10
View answer
Correct Answer: D
Question #53
Refer to the exhibit. Which two commands provide the administrator with the information needed to resolve the issue? (Choose two.)
A. nmp-server ifindex persist
B. nmp-server ifindex permanent
C. nmpifindex persist
D. nmpifindex permanent
View answer
Correct Answer: BC
Question #54
Refer to the exhibit. The network administrator can see the DHCP discovery packet in R1, but R2 is not replying to the DHCP request. The R1 related interface is configured with the DHCP helper address. If the PC is directly connected to the Fa0/1 interface on R2, the DHCP server assigns as IP address from the DHCP pool to the PC. Which two commands resolve this issue? (Choose two.)
A. 6(config)#ipsla responder udp-echo ip address 10
B. 6(config)#ip access-list extended DDOS R6(config-ext-nacl)#5 permit icmp host 10
C. 6(config)#ipsla responder
D. 6(config)#ip access-list extended DDOS R6(config-ext-nacl)#5 permit icmp host 10
View answer
Correct Answer: CD
Question #55
Refer to the exhibit. An engineer configured IP SLA on R1 to avoid the ISP link flapping problem, but it is not working as designed. IP SLA should wait 30 seconds before switching traffic to a secondary connection and then revert to the primary link after waiting 20 seconds, when the primary link is available and stabilized. Which configuration resolves the issue?
A. 1(config)#track 700 ipsla 700 R1 (config-track)#delay down 30 up 20
B. 1 (config)#ipsla 700 R1(config-ip-sla)#delay down 30 up 20
C. 1 (config)#ipsla 700 R1(config-ip-sla)#delay down 20 up 30
D. 1(config)#track 700 ipsla 700 R1(config-track)#delay down 20 up 30
View answer
Correct Answer: A
Question #56
Refer to the exhibit. An engineer must block access to the console ports for all corporate remote Cisco devices based on the recent corporate security policy but the security team still can connect through the console port. Which configuration on the console port resolves the issue?
A. ogin and password
B. xec 0 0
C. ransport input telnet
D. o exec
View answer
Correct Answer: D
Question #57
Refer to the exhibit. A network administrator is troubleshooting IPv6 address assignment for a DHCP client that is not getting an IPv6 address from the server. Which configuration retrieves the client IPv6 address from the DHCP server?
A. pv6 address autoconfig command on the interface
B. pv6 dhcp server automatic command on DHCP server
C. pv6 dhcp relay-agent command on the interface
D. ervice dhcp command on DHCP server
View answer
Correct Answer: A
Question #58
Refer to the exhibit. A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices using SNMP and TFTP servers. Which configuration prevents changes from unauthorized NMS and TFTP servers?
A. ccess-list 20 permit 10
B. ccess-list 20 permit 10
C. ccess-list 20 permit 10
D. ccess-list 20 permit 10
View answer
Correct Answer: A
Question #59
An engineer creates a Cisco DNA Center cluster with three nodes, but all the services are running on one host node. Which action resolves this issue?
A. estore the link on the switch interface that is connected to a cluster link on the Cisco DNA Center
B. lick system updates, and upgrade to the latest version of Cisco DNA Center
C. nable service distribution from the Systems 360 page
D. lick the master host node with all the services and select services to be moved to other hosts
View answer
Correct Answer: A
Question #60
Refer to the exhibit. The AP status from Cisco DNA Center Assurance Dashboard shows some physical connectivity issues from access switch interface G1/0/14. Which command generates the diagnostic data to resolve the physical connectivity issues?
A. heck cable-diagnostics tdr interface GigabitEthernet1/0/14
B. erify cable-diagnostics tdr interface GigabitEthernet1/0/14
C. how cable-diagnostics tdr interface GigabitEthernet1/0/14
D. est cable-diagnostics tdr interface GigabitEthernet1/0/14
View answer
Correct Answer: D
Question #61
Refer to the exhibit. An engineer configured NetFlow on R1, but the NMS server cannot see the flow from R1. Which configuration resolves the issue?
A. nterface Ethernet0/1 flow-destination 10
B. nterface Ethernet0/0 flow-destination 10
C. low exporter FlowAnalyzer1 destination 10
D. low monitor Flowmonitor1 destination 10
View answer
Correct Answer: C
Question #62
Refer to the exhibit. An engineer cannot copy the IOS.bin file from the FTP server to the switch. Which action resolves the issue?
A. llow file permissions to download the file from the FTP server
B. dd the IOS
C. ake memory space on the switch flash or USB drive to download the file
D. se the copy flash:/ ftp://cisco@10
View answer
Correct Answer: B
Question #63
Refer to the exhibit. After reloading the router, an administrator discovered that the interface utilization graphs displayed inconsistencies with their previous history in the NMS. Which action prevents this issue from occurring after another router reload in the future?
A. onfigure SNMP interface index persistence on the router
B. ave the router configuration to startup-config before reloading the router
C. ediscover all the router interfaces through SNMP after the router is reloaded
D. onfigure SNMP to use static OIDs referring to individual router interfaces
View answer
Correct Answer: A
Question #64
Refer to the exhibit. In an attempt to increase the network security, the administrator applied the Gi3-in ACL to the Gi3 interface. After the ACL was applied, clients in the network connected to Gi3 lost their ability to obtain IP settings from DHCP.Which two configuration commands must be added to the Gi3-in ACL to reinstate the DHCP service for the clients? (Choose two.)
A. 4 permit udp 192
B. 1 permit udp host 0
C. 3 permit udp host 0
D. 2 permit udp host 192
E. 5 permit udp host 0
View answer
Correct Answer: B
Question #65
Refer to the exhibit. Router R2 should be learning the route for 10.123.187.0/24 via EIGRP. Which action resolves the issue without introducing more issues?
A. edistribute the route in EIGRP with metric, delay, and reliability
B. se distribute-list to modify the route as an internal EIGRP route
C. se distribute-list to filter the external routes in OSPF
D. emove route redistribution in R2 for this route in OSPF
View answer
Correct Answer: C
Question #66
Refer to the exhibit. The control plane is heavily impacted after the CoPP configuration is applied to the router. Which command removal lessens the impact on the control plane?
A. ccess-list 120 permit tcp any gt 1024 eq bgp log
B. ccess-list 120 permit ospf any
C. ccess-list 120 permit udp any any eq pim-auto-rp
D. ccess-list 120 permit eigrp any host 224
View answer
Correct Answer: A
Question #67
Refer to the exhibit. An engineer is trying to add an encrypted user password that should not be visible in the router configuration. Which two configuration commands resolve the issue?(Choose two.)
A. nable poison reverse
B. isable split horizon
C. isable poison reverse
D. nable split horizon
View answer
Correct Answer: BC
Question #68
A customer reports that traffic is not passing on an EIGRP enabled multipoint interface on a router configured as below:Which action resolves the issue?
A. nable split horizon
B. onfigure R3 as stub receive-only
C. onfigure route tagging
D. onfigure route filtering
View answer
Correct Answer: B
Question #69
Refer to the exhibit. A loop occurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled. Which action prevents the loop between R1, R2, and R3?
A. hange area 5 to a normal area from a nonstub area
B. esolve different subnet mask issue on the link
C. onfigure Layer 3 port channel on interfaces between switches
D. esolve duplicate IP address issue in the network
View answer
Correct Answer: A
Question #70
Which two components are required for MPLS Layer 3 VPN configuration? (Choose two.)
A. 6(config)#ip sla responder
B. 6(config)#ip sla 650 R6(config-ip-sla)#udp-jitter 10
C. 6(config)#ip sla responder udp-echo ipaddress 10
D. 6(config)#ip sla schedule 10 life forever start-time now
View answer
Correct Answer: CD
Question #71
Refer to the exhibit. Which configuration resolves the IP SLA issue from R1 to the server?
A. p nhrp registration no-registration
B. p nhrp registration dynamic
C. p nhrp registration no-unique
D. p nhrp registration ignore
View answer
Correct Answer: C
Question #72
A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router?
A. outer ospf 1 vrf CCNP network 10
B. outer ospf 1 interface Ethernet1 ip ospf 1 area 0
C. outer ospf 1 vrf CCNP interface Ethernet1 ip ospf 1 area 0
D. outer ospf 1 vrf CCNP network 10
View answer
Correct Answer: C
Question #73
Refer to the exhibit. TCP traffic should be reaching host 10.10.10.10/24 via R2. Which action resolves the issue?
A. llow TCP in the access list with no changes to the route map
B. dd a permit 20 statement in the route map to allow TCP traffic
C. CP traffic will reach the destination via R2 without any changes
D. et IP next-hop to 10
View answer
Correct Answer: A
Question #74
A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?
A. p tcp adjust-mss 1360 crypto ipsec fragmentation mtu-discovery
B. p tcp adjust-mss 1360 crypto ipsec fragmentation after-encryption
C. p tcp payload-mtu 1360 crypto ipsec fragmentation after-encryption
D. p tcp payload-mtu 1360 crypto ipsec fragmentation mtu-discovery
View answer
Correct Answer: B
Question #75
Refer to the exhibit. During ISP router maintenance, the network produced many alerts because of the flapping interface. Which configuration on R1 resolves the issue?
A. p verify drop-rate notify hold-down 60
B. nmp trap link-status down
C. nmp trap ip verify drop-rate
D. o snmp trap link-status
View answer
Correct Answer: D
Question #76
Refer to the exhibit. Reachability between servers in a network deployed with DHCPv6 is unstable. Which command must be removed from the configuration to make DHCPv6 function?
A. pv6 nd ra suppress
B. ddress prefix 2001:0:1:4::/64 lifetime infinite infinite
C. pv6 dhcp server DHCP POOL
D. pv6 address 2001:0:1:4::1/64
View answer
Correct Answer: A
Question #77
A customer requested a GRE tunnel through the provider network between two customer sites using loopback to hide internal networks. Which configuration on R2 establishes the tunnel with R1?
A. 2(config)#interface Tunnel1 R2(config-if)#ip address 172
B. 2(config)#interface Tunnel1 R2(config-if#ip address 172
C. 2(config)#interface Tunnel1 R2(config-if)#ip address 172
D. 2(config)#interface Tunnel1 R2(config-if)#ip address 172
View answer
Correct Answer: B
Question #78
Refer to the exhibit. R1 and R2 are configured for EIGRP peering using authentication and the neighbors failed to come up. Which action resolves the issue?
A. onfigure a matching lowest key-id on both routers
B. onfigure a matching authentication type on both routers
C. onfigure a matching key-id number on both routers
D. onfigure a matching key-chain name on both routers
View answer
Correct Answer: A
Question #79
Refer to the exhibit. Mutual redistribution is enabled between RIP and EIGRP on R2 and R5. Which configuration resolves the routing loop for the 192.168.1.0/24 network?
A. 2:router eigrp 10network 181
B. 2:router eigrp 10network 181
C. 2:router eigrp 10network 181
D. 2:router eigrp 7network 181
View answer
Correct Answer: D
Question #80
Which method provides failure detection in BFD?
A. ong duration, low overhead
B. hort duration, low overhead
C. ong duration, high overhead
D. hort duration, high overhead
View answer
Correct Answer: B
Question #81
Refer to the exhibit. R4 is experiencing packet drop when trying to reach 172.16.2.7 behind R2. Which action resolves the issue?
A. nsert a /24 floating static route on R2 toward R3 with metric 254
B. isable auto summarization on R2
C. nable auto summarization on all three routers R1, R2, and R3
D. nsert a /16 floating static route on R2 toward R3 with metric 254
View answer
Correct Answer: B
Question #82
Refer to the exhibit. An engineer must advertise routes into IPv6 MP-BGP and failed. Which configuration resolves the issue on R1?
A. outer bgp 64900 no bgp default ipv4-unicast address-family ipv6 unicast redistribute ospf network 2001:DB9::/64
B. outer bgp 64900 no bgp default ipv4-unicast address-family ipv6 multicast neighbor 2001:DB8:7000::2 translate-update ipv6 multicast
C. outer bgp 65000 no bgp default ipv4-unicast address-family ipv6 unicast network 2001:DB8::/64
D. outer bgp 65000 no bgp default ipv4-unicast address-family ipv6 multicast network 2001:DB8::/64
View answer
Correct Answer: C
Question #83
Refer to the exhibit. The administrator is trying to overwrite an existing file on the TFTP server that was previously uploaded by another router. However, the attempt to update the file fails.Which action resolves this issue?
A. ake the TFTP folder writable by all on the TFTP server
B. ake the package
C. ake the package
D. ake sure to run the TFTP service on the TFTP server
View answer
Correct Answer: B
Question #84
Refer to the exhibit. A network engineer applied a filter for ISA traffic on OSPFv3 inter area routes on the area 5 ABR to protect advertising the internal routes of area 5 to the business partner network. All other areas should receive the area 5 internal routes. After the respective route filtering configuration is applied on the ABR, area 5 routes are not visible on any of the areas. How must the filter list be applied on the ABR to resolve this issue?
A. n the "in" direction for area 5 on router R1
B. n the "in" direction for area 20 on router R2
C. n the "out" direction for area 20 on router R2
D. n the "out" direction for area 5 on router R1
View answer
Correct Answer: D
Question #85
Refer to the exhibit. The R2 loopback interface is advertised with RIP and EIGRP using default values. Which configuration changes make R1 reach the R2 loopback using RIP?
A. 1(config)#router rip R1(config-router)#distance 90
B. 1(config)#router eigrp 1 R1(config-router)#distance eigrp 130 120
C. 1(config)#router rip R1(config-router)#distance 100
D. 1(config)#router eigrp 1 R1(config-router)#distance eigrp 120 120
View answer
Correct Answer: B
Question #86
Refer to the exhibit. A network administrator notices these console messages from host 10.11.110.12 originating from interface E1/0. The administrator considers this an unauthorized attempt to access SNMP on R1. Which action prevents the attempts to reach R1 E1/0?
A. onfigure IOS control plane protection using ACL 90 on interface E1/0
B. reate an inbound ACL on interface E1/0 to deny SNMP from host 10
C. dd a permit statement including the host 10
D. onfigure IOS management plane protection using ACL 90 on interface E1/0
View answer
Correct Answer: B
Question #87
Refer to the exhibit. R6 should reach R1 via R5>R2>R1. Which action resolves the issue?
A. ecrease the cost to 2 between R6-R5-R2
B. ncrease the cost to 61 between R2-R3-R1
C. ncrease the cost to 61 between R2 and R3
D. ecrease the cost to 41 between R2 and R1
View answer
Correct Answer: C
Question #88
An engineer failed to run diagnostic commands on devices using Cisco DNA Center. Which action in Cisco DNA Center resolves the issue?
A. nable Secure Shell
B. nable APIs
C. nable CDP
D. nable Command Runner
View answer
Correct Answer: D
Question #89
Refer to the exhibit. The static route is not present in the routing table of an adjacent OSPF neighbor router. Which action resolves the issue?
A. onfigure a permit 20 statement to the route map to redistribute the static route
B. onfigure the next-hop interface at the end of the static route for it to get redistributed
C. onfigure the next hop of 10
D. onfigure the subnets keyword in the redistribution command
View answer
Correct Answer: D
Question #90
Refer to the exhibit. Packets arriving from source 209.165.200.215 must be sent with the precedence bit set to 1, and packets arriving from source 209.165.200.216 must be sent with the precedence bit set to 5. Which action resolves the issue?
A. et ip precedence critical in route-map Texas permit 20
B. et ip precedence critical in route-map Texas permit 10
C. et ip precedence priority in route-map Texas permit 20
D. et ip precedence immediate in route-map Texas permit 10
View answer
Correct Answer: A
Question #91
Refer to the exhibit. An engineer must redistribute networks 192.168.10.0/24 and 192.168.20.0/24 into OSPF from EIGRP, where the metric must be added when traversing through multiple hops to start an external route of 20. The engineer notices that the external metric is fixed and does not add at each hop. Which configuration resolves the issue?
A. 2(config)#access-list 10 permit 192
B. 2(config)#access-list 10 permit 192
C. 1(config)#access-list 10 permit 192
D. 1(config)#access-list 10 permit 192
View answer
Correct Answer: B
Question #92
An engineer notices that R1 does not hold enough log messages to identify the root cause during troubleshooting. Which command resolves this issue?
A. logging buffered 4096 critical
B. logging buffered 16000 critical
C. config)#logging buffered 16000 informational
D. config)#logging buffered 4096 informational
View answer
Correct Answer: C
Question #93
Which feature minimizes DoS attacks on an IPv6 network?
A. Pv6 Binding Security Table
B. Pv6 Router Advertisement Guard
C. Pv6 Prefix Guard
D. Pv6 Destination Guard
View answer
Correct Answer: D
Question #94
Refer to the exhibit. A network administrator must block ping from user 3 to the App Server only. An inbound standard access list is applied to R1 interface G0/0 to block ping. The network administrator was notified that user 3 cannot even ping user 9 anymore. Where must the access list be applied in the outgoing direction to resolve the issue?
A. 2 interface G0/0
B. W1 interface G1/10
C. 2 interface G1/0
D. W1 interface G2/21
View answer
Correct Answer: B
Question #95
Refer to the exhibit. Clients on ALS2 receive IPv4 and IPv6 addresses, but clients on ALS1 receive only IPv4 addresses and not IPv6 addresses. Which action on DSW1 allows clients on ALS1 to receive IPv6 addresses?
A. onfigure DSW1(dhcp-config)#default-router 2002:A04:A01::A04:A01
B. onfigure DSW1(config-if)#ipv6 dhcp relay destination 2002:404:404::404:404 GigabitEthernet1/2
C. onfigure DSW1(config)#ipv6 route 2002:404:404::404:404/128 FastEthernet1/0
D. onfigure DSW1(config-if)#ipv6 helper address 2002:404:404::404:404
View answer
Correct Answer: B
Question #96
Refer to the exhibit. An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead of current best path. Which action resolves the issue?
A. onfigure higher MED to select as the best path
B. onfigure AS_PATH prepend for the current best path
C. onfigure AS_PATH prepend for the desired best path
D. onfigure lower LOCAL_PREF to select as the best path
View answer
Correct Answer: B
Question #97
What is a function of IPv6 Source Guard?
A. t inspects ND and DHCP packets to build an address binding table
B. t works with address glean or ND to find existing addresses
C. t notifies the ND protocol to inform hosts if the traffic is denied by it
D. t denies traffic from known sources and allocated addresses
View answer
Correct Answer: B
Question #98
Refer to the exhibit. A network engineer must establish communication between three different customer sites with these requirements:* Site-A: must be restricted to access to any users at Site-B or Site-C.* Site-B and Site-C: must be able to communicate between sites and share routes using OSPF.PE interface configuration:interface FastEthernet0/0ip vrf forwarding Site-A!interface FastEthernet0/1ip vrf forwarding SharedSites!interface FastEthernet0/2ip vrf forwarding SharedSitesWhich configuration meets the
A. E(config)#router ospf 10 vrf Site-A PE(config-router)#network 0
B. E(config)#router ospf 10 vrf Site-A PE(config-router)#network 0
C. E(config)#router ospf 10 vrf Site-A PE(config-router)#network 0
D. E(config)#router ospf 10 vrf Site-A PE(config-router)#network 0
View answer
Correct Answer: C
Question #99
What is LDP label binding?
A. estination prefix with label
B. wo routers with label distribution session
C. ource prefix with label
D. eighboring router with label
View answer
Correct Answer: A
Question #100
Refer to the exhibit. The network administrator configured the Chicago router to mutually redistribute the LA and NewYork routes with OSPF routes to be summarized as a single route in EIGRP using the longest summary mask: router eigrp 100 redistribute ospf 1 metric 10 10 10 10 10 router ospf 1 redistribute eigrp 100 subnets!interface E 0/0ip summary-address eigrp 100 172.16.0.0 255.255.0.0After the configuration, the New York router receives all the specific LA routes but the summary route. Which set of con
A. outer eigrp 100 summary-address 172
B. nterface E 0/1 ip summary-address eigrp 100 172
C. outer eigrp 100 summary-address 172
D. nterface E 0/1 ip summary-address eigrp 100 172
View answer
Correct Answer: B
Question #101
Refer to the exhibit. An engineer must configure PBR on R1 to reach to 10.2.2.0/24 via R3 AS64513 as the primary path and a backup route through default route via R2 AS64513. All BGP routes are in the routing table of R1, but a static default route overrides BGP routes. Which PBR configuration achieves the objective?
A. ccess-list 100 permit ip 10
B. ccess-list 100 permit ip 10
C. ccess-list 100 permit ip 10
D. ccess-list 100 permit ip 10
View answer
Correct Answer: A
Question #102
What is the function of BFD?
A. t creates high CPU utilization on hardware deployments
B. t provides uniform failure detection on the same media type
C. t provides uniform failure detection regardless of media type
D. t negotiates to the highest version if the neighbor version differs
View answer
Correct Answer: C
Question #103
Refer to the exhibit. When an FTP client attempts to use passive FTP to connect to the FTP server, the file transfers fail. Which action resolves the issue?
A. odify traffic filter FTP-SERVER in to the outbound direction
B. onfigure active FTP traffic
C. onfigure to permit TCP ports higher than 1023
D. odify FTP-SERVER access list to remove established at the end
View answer
Correct Answer: C
Question #104
Refer to the exhibit. An administrator configured a Cisco router for TACACS authentication, but the router is using the local enable password instead. Which action resolves the issue?
A. onfigure the aaa authentication login default group admin local if-authenticated command instead
B. onfigure the aaa authentication login admin group tacacs+ local enable none command instead
C. onfigure the aaa authentication login admin group tacacs+ local if-authenticated command instead
D. onfigure the aaa authentication login admin group admin local enable command instead
View answer
Correct Answer: D
Question #105
An administrator attempts to download the .pack NBAR2 file using TFTP from the CPE router to another device over the Gi0/0 interface. The CPE is configured as below: hostname CPE!ip access-list extended WAN<`¦>remark => All UDP rules below for WAN ID: S421T18E58F90permit udp any eq domain anypermit udp any any eq tftpdeny udp any any!interface GigabitEthernet0/0<`¦>ip access-group WAN in<`¦>!tftp-server flash:pp-adv-csr1000v-1612.1a-37-53.0.0.packThe transfer fails. Which action resolves this issue?
A. ake the permit udp any eq tftp any entry the last entry in the WAN ACL
B. horten the file name to the 8+3 naming convention
C. hange the WAN ACL to permit the entire UDP destination port range
D. hange the WAN ACL to permit the UDP port 69 to allow TFTP
View answer
Correct Answer: C
Question #106
A network administrator must optimize the segment size of the TCP packet on the DMVPN IPsec protected tunnel interface, which carries application traffic from the head office to a designated branch. The TCP segment size must not overwhelm the MTU of the outbound link. Which configuration must be applied to the router to improve the application performance?
A. nterface tunnel30 ip mtu 1400 ip tcp payload-size 1360 ! crypto ipsec fragmentation before-encryption
B. nterface tunnel30 ip mtu 1400 ip tcp adjust-mss 1360 ! crypto ipsec fragmentation after-encryption
C. nterface tunnel30 ip mtu 1400 ip tcp max-segment 1360 ! crypto ipsec fragmentation before-encryption
D. nterface tunnel30 ip mtu 1400 ip tcp packet-size 1360 ! crypto ipsec fragmentation after-encryption
View answer
Correct Answer: B
Question #107
In a DMVPN network, the Spoke1 user observed that the voice traffic is coming to Spoke2 users via the hub router. Which command is required on both spoke routers to communicate directly to one another?
A. p nhrp nhs multicast
B. p nhrp shortcut
C. p nhrp map dynamic
D. p nhrp redirect
View answer
Correct Answer: B
Question #108
Refer to the exhibit.RR Configuration:router bgp 100neighbor IBGP peer-groupneighbor IBGP route-reflector-clientneighbor 10.1.1.1 remote-as 100neighbor 10.1.2.2 remote-as 100neighbor 10.1.3.3 remote-as 100The network administrator configured the network to establish connectivity between all devices and notices that the ASBRs do not have routes for each other.Which set of configurations resolves this issue?
A. outer bgp 100 neighbor IBGP update-source Loopback0
B. outer bgp 100 neighbor IBGP next-hop-self
C. outer bgp 100 neighbor 10
D. outer bgp 100 neighbor 10
View answer
Correct Answer: D
Question #109
Refer to the exhibit. A prefix list is created to filter routes inbound to an EIGRP process except for network 10 prefixes. After the prefix list is applied, no network 10 prefixes are visible in the routing table from EIGRP. Which configuration resolves the issue?
A. p prefix-list EIGRP seq 10 permit 0
B. p prefix-list EIGRP seq 20 permit 10
C. p prefix-list EIGRP seq 20 permit 10
D. p prefix-list EIGRP seq 5 permit 10
View answer
Correct Answer: D
Question #110
Refer to the exhibit. An engineer configured SNMP traps to record spoofed packets drop of more than 48000 a minute on the ethernet0/0 interface. During an IP spoofing attack, the engineer noticed that no notifications have been received by the SNMP server. Which configuration resolves the issue on R1?
A. p verify unicast notification threshold 800
B. p verify unicast notification threshold 8000
C. p verify unicast notification threshold 48000
D. p verify unicast notification threshold 80
View answer
Correct Answer: A
Question #111
Refer to the exhibit. An engineer implemented an access list on R1 to allow anyone to Telnet except R2 Loopback0 to R1 Loopback4. How must sequence 20 be replaced on the R1 access list to resolve the issue?
A. equence 20 permit tcp host 1001:ABC:2011:7::1 host 400A:0:400C::1 eq telnet
B. equence 20 deny tcp host 400A:0:400C::1 host 1001:ABC:2011:7::1 eq telnet
C. equence 20 permit tcp host 400A:0:400C::1 host 1001:ABC:2011:7::1 eq telnet
D. equence 20 deny tcp host 1001:ABC:2011:7::1 host 400A:0:400C::1 eq telnet
View answer
Correct Answer: D
Question #112
Refer to the exhibit. An engineer implemented CoPP to limit Telnet traffic to protect the router CPU. It was noticed that the Telnet traffic did not pass through CoPP. Which configuration resolves the issue?
A. p access-list extended TELNET permit tcp host 10
B. olicy-map COPP class TELNET police 8000 conform-action transmit exceed-action transmit
C. p access-list extended TELNET permit tcp host 10
D. olicy-map COPP class TELNET police 8000 conform-action transmit exceed-action transmit violate-action drop
View answer
Correct Answer: C
Question #113
Refer to the exhibit. After configuring OSPF in R1, some external destinations in the network became unreachable. Which action resolves the issue?
A. isconnect the router with the OSPF router ID 0
B. ncrease the SPF delay interval on R1 to synchronize routes
C. hange the R1 router ID from 10
D. lear the OSPF process on R1 to flush stale LSAs sent by other routers
View answer
Correct Answer: C
Question #114
Refer to the exhibit. A network engineer receives a report that Spoke 1 users can perform bank transactions with the server located at the Center site, but Spoke 2 users cannot. Which action resolves the issue?
A. onfigure the Spoke 2 users IP on the router B OSPF domain
B. onfigure IPv6 on the routers B and C interfaces
C. onfigure OSPFv2 on the routers B and C interfaces
D. onfigure encapsulation dot1q 78 on the router C interface
View answer
Correct Answer: B
Question #115
What is an MPLS LDP targeted session?
A. DP session established by exchanging multicast hello packets
B. DP session established between LSRs by exchanging TCP hello packets
C. ession between neighbors that are connected no more than one hop away
D. abel distribution session between non-directly connected neighbors
View answer
Correct Answer: D
Question #116
Refer to the exhibit. An engineer configures DMVPN and receives the hub location prefix of 10.1.1.0/24 on R2 and R3. The R3 prefix of 10.1.3.0/24 is not received on R2, and the R2 prefix 10.1.2.0/24 is not received on R3. Which action resolves the issue?
A. plit horizon prevents the routes from being advertised between spoke routers
B. here is no spoke-to-spoke connection
C. here is no spoke-to-spoke connection
D. plit horizon prevents the routes from being advertised between spoke routers
View answer
Correct Answer: D
Question #117
Refer to the exhibit. Which two configurations allow clients to get dynamic IP addresses assigned? (Choose two.)
A. outer eigrp 111 address-family ipv4 vrf Science autonomous-system 1 network 192
B. outer eigrp 111 address-family ipv4 vrf Science network 192
C. outer eigrp 111 network 192
D. outer eigrp 1 address-family ipv4 vrf Science autonomous-system 111 network 192
View answer
Correct Answer: AE
Question #118
Refer to the exhibit. The IT router has been configured with the Science VRF and the interfaces have been assigned to the VRF. Which set of configurations advertises Science-1 and Science-2 routes using EIGRP AS 111?
A. ccess-list 100 deny tcp 10
B. ccess-list 100 permit tcp 10
C. ccess-list 100 permit tcp 10
D. ccess-list 100 permit tcp 10
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: