Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-410 - Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

Page: 13 / 13
Total 630 questions

Refer to the exhibit.

Although summarization is configured for R1 to receive 10.0.0.0/8. more specific routes are received by R1. How should the 10.0.0.0/8 summary route be received from the neighbor, attached to R1 via Fast Ethernet0/0 interface?

A.

R1 should configure the ip summary-address eigrp 10.0.0.0.255.0.0.0 command under the Fast Ethernet 0/0 interface.

B.

The summarization condition is not met Router 10 1 100.10 requires a route for 10 0.0.0/8 that points to null 0

C.

The summarization condition is not met. The network 10.1.100.0/24 should be changed to 172.16.0.0/24.

D.

R1 should configure the ip summary-address eigrp 10.0.0.0 0.0.0.255 command under the Fast Ethernet 0/0 interface.

Refer to the Exhibit.

R1 and R2 use IGP protocol to route traffic between AS 100 and AS 200 despite being configured to use BGP. Which action resolves the issue and ensures the use of BGP?

A.

Configure distance to 100 under the EIGRP process of R1 and R2.

B.

Remove distance commands under BGP AS 100 and AS 200.

C.

Remove distance commands under BGP AS 100.

D.

Configure distance to 100 under the OSPF process of R1 and R2

Refer to the exhibit.

R4 is experiencing packet drop when trying to reach 172.16.2.7 behind R2. Which action resolves the issue?

A.

Insert a /16 floating static route on R2 toward R3 with metric 254

B.

Insert a /24 floating static route on R2 toward R3 with metric 254

C.

Enable auto summarization on all three routers R1, R2, and R3

D.

Disable auto summarization on R2

Refer to the exhibit. An engineer configures router A to mark all inside to outside traffic from network 192 168 1 0, except from host 192 168 1 1. with critical IP precedence. The policy did not work as expected Which configuration resolves the issue?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

What is an advantage of implementing BFD?

A.

BFD provides faster updates for any flapping route.

B.

BFD provides millisecond failure detection

C.

BFD is deployed without the need to run any routing protocol

D.

BFD provides better capabilities to maintain the routing table

Refer to Exhibit.

PC2 is directly connected to R1. A user at PC2 cannot Telnet to 2001:db8:a:b::10. The user can ping

2001:db8:a:b::10 and receive DHCP-related information from the DHCP server. Which action resolves

the issue?

A.

Remove sequence 10 and put it back as sequence 25.

B.

Remove sequence 20 and put it back as sequence 45.

C.

Remove sequence 30 and put it back as sequence 5.

D.

Remove sequence 40 and put it back as sequence 15.

Refer to the exhibit.

Which action makes 10.1.3.2 the feasible successor to reach 10. 200. 1 0/24 for location S42T447E33F95?

A.

Increase path bandwidth lower than 1011 2 and lower than 1012 2 between RtrA and the destination

B.

Increase path bandwidth higher than 10.1 2 2 and lower than 101.1.2 between RtrA and the destination.

C.

Increase path bandwidth higher than 1011 2 and lower than 1012 2 between RtrA and the destination

D.

Increase path bandwidth higher than 10.1 2 2 and higher than 10.1.1.2 between RtrA and the destination

Refer to the exhibit. After reloading the router an administrator discovered that the interface utilization graphs displayed inconsistencies with their previous history in the NMS. Which action prevents this issue from occurring after another router reload in the future?

A.

Rediscover all the router interfaces through SNMP after the router is reloaded

B.

Save the router configuration to startup-config before reloading the router

C.

Configure SNMP to use static OlDs referring to individual router interfaces

D.

Configure SNMP interface index persistence on the router

What is the purpose of an OSPF sham-link?

A.

to allow intra-area routing when OSPF is used as the PE-CE connection protocol in an MPLS VPN network

B.

to correct OSPF backdoor routing when OSPF is used as the PE-CE connection protocol *i an MPLS VPN network

C.

to correct OSPF backdoor routing when OSPF is used as the PE-PE connection protocol m an MPLS VPN network

D.

to allow inter-area routing when OSPF is used as the PE-CE connection protocol in a MPLS VPN network