Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-410 - Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

Page: 9 / 13
Total 615 questions

A CoPP policy is applied for receiving SSH traffic from the WAN interface on a Cisco ISR4321 router.

However, the SSH response from the router is abnormal and stuck during the high link utilization. The problem is identified as SSH traffic does not match in the ACL. Which action resolves the issue?

A.

Rate-limit SSH traffic to ensure dedicated bandwidth.

B.

Apply CoPP on the control plane interface.

C.

Increase the IP precedence value of SSH traffic to 6.

D.

Apply CoPP on the WAN interface inbound direction.

Refer to the exhibit. A network engineer configured routers R1 and R2 with MP-BGP. The engineer noticed that the routers cannot exchange any IPv6 routes, however, the IPv4 neighbor relationship is working fine. Which configuration must the engineer apply to router R2 to exchange IPv6 routes?

A.

Ipv6cef I Interface Loopback100Ipv6 address 2001: DB8:128::2/128 Interface GigabitEthernet1/0Ipv6 address 2001:DB8:1::2/64 I router bgp 65002no bgp default ipv4-unlcastneighbor 2001: DB8:1::1 emote-as 65001Iaddress-family ipv6network 2001:DB8:128::2/128neighbor 2001:DB8:1::1 activate

B.

Ipv6 unicast-routingipv6 cefInterface Loopback100ipv6 address 2001: DB8:12C:2 129Iinterface GigabitEthernet1/0ipv6 address 2001: DB8:1::2 64description AS65001 ID B466:A83D:3D7::1!router bgp 65002no bgp default Ipv4-unicastneighbor 2001: DB8:1::1 remote-as 65001!address-family Ipv4neighbor 2001:DB8:1::1 activate

C.

Ipv6 unicast-routingipvG cefIInterface Loopback100Ipv6 address 2001:DB8:128::2/128 I interface GigabitEthernet1/0ipv6 address 2001:DB8:1::2/64!router bgp 65002 no bgp default ipv4-unicast neighbor 2001: DB8:1::1 remote-as 65001 !address-family ipv6 network 2001:DB8:128::2I128

D.

Ipv6 unicast-routing Ipv6 cef Iinterface Loopback100 ipv6 address 2001: DB8:128::2/128 !interface GigabitEthernet1/0 ipv6 address 2001:DB8:1::2/64 irouter bgp 65002 no bgp default ipv4-unicast neighbor 2001: DB8:1::1 remote-as 65001 !address-family ipv6 network 2001:DB8:128::2/128 neighbor 2001:DB8:1::1 activate

Refer to the exhibit.

An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?

A.

172.18.46.2

B.

192.168.1.4

C.

172.18.16.2

D.

192.168.1.1

Which option is the best for protecting CPU utilization on a device?

A.

fragmentation

B.

COPP

C.

ICMP redirects

D.

ICMP unreachable messages

Refer to the exhibit.

A junior engineer updated a branch router configuration. Immediately after the change, the engineer receives calls from the help desk that branch personnel cannot reach any network destinations. Which configuration restores service and continues to block 10.1.1.100/32?

A.

route-map FILTER-IN deny 5

B.

ip prefix-list 102 seq 15 permit 0.0.0.0/32 le 32

C.

ip prefix-list 102 seq 5 permit 0.0.0.0/32 le 32

D.

route-map FILTER-IN permit 20

Refer to the exhibit.

An administrator that is connected to the console does not see debug messages when

remote users log in. Which action ensures that debug messages are displayed for remote logins?

A.

Enter the transport input ssh configuration command.

B.

Enter the terminal monitor exec command.

C.

Enter the logging console debugging configuration command.

D.

Enter the aaa new-model configuration command.

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

A.

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.

Configure access-list 1 and match under route-map Leak-Route.

D.

Configure route-map Leak-Route permit 10 and match access-list 1.

E.

Configure route-map Leak-Route permit 20.

Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?

A.

shared risk link group-disjoint

B.

linecard-disjoint

C.

lowest-repair-path-metric

D.

interface-disjoint

Refer to the exhibit.

Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through

router R2. Which debug command is used to troubleshoot this issue?

A.

debug ip flow

B.

debug ip sla error

C.

debug ip routing

D.

debug ip packet

Refer to the exhibit.

Why is the remote NetFlow server failing to receive the NetFlow data?

A.

The flow exporter is configured but is not used.

B.

The flow monitor is applied in the wrong direction.

C.

The flow monitor is applied to the wrong interface.

D.

The destination of the flow exporter is not reachable.

Which label operations are performed by a label edge router?

A.

SWAP and POP

B.

SWAP and PUSH

C.

PUSH and PHP

D.

PUSH and POP

Which two statements about VRF-Lite configurations are true? (Choose two.)

A.

They support the exchange of MPLS labels

B.

Different customers can have overlapping IP addresses on different VPNs

C.

They support a maximum of 512.000 routes

D.

Each customer has its own dedicated TCAM resources

E.

Each customer has its own private routing table.

F.

They support IS-IS

What is a role of route distinguishers in an MPLS network?

A.

Route distinguishers define which prefixes are imported and exported on the edge router

B.

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.

Route distinguishers are used for label bindings.

D.

Route distinguishers make a unique VPNv4 address across the MPLS network

Drag and drop the operations from the left onto the locations where the operations are performed on the right.