Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-410 - Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

Page: 9 / 13
Total 615 questions

Drag and drop the IPv6 first hop security device roles from the left onto the corresponding descriptions on the right.

Refer to the exhibit.

A prefix list is created to filter routes inbound to an EIGRP process except for network 10 prefixes After the prefix list is applied no network 10 prefixes are visible in the routing table from EIGRP. Which configuration resolves the issue?

A.

ip prefix-list EIGRP seq 20 permit 10.0.0.0/8 ge 9.

B.

ip prefix-list EIGRP seq 10 permit 0.0.0.0/0 le 32

C.

ip prefix-list EIGRP seq 5 permit 10.0.0.0/8 ge 9 no ip prefix-list EIGRP seq 20 permit 10.0.0.0/8

D.

ip prefix-list EIGRP seq 20 permit 10.0.0.0/8 ge 9 ip prefix-list EIGRP seq 10 permit 0.0.0.0/0 le 32

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

WAN

CORE

MGMT

Refer to the exhibit.

An engineer noticed that the router log messages do not have any information about when the event occurred. Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?

A.

Replace OSPF process 10 on the interfaces with OSPF process 1 and configure an additional router IO with IPv6 address

B.

Replace OSPF process 10 on the interfaces with OSPF process 1. and remove process 10 from the global configuration

C.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv6 address and remove process 10 from the global configuration

D.

Replace OSPF process 10 on the interfaces with OSPF process 1 for the IPv4 address and remove process 10 from the global configuration

An engineer configured routing between multiple OSPF domains and introduced a routing loop that caused network instability. Which action resolves the problem?

A.

Set a tag using the redistribute command toward a domain and deny inbound m the other domain by a matching tag

B.

Set a tag using the redistribute command toward a different domain and deny the matching tag when exiting from that domain

C.

Set a tag using the network command in a domain and use the route-map command to deny the matching lag when exiting toward a different domain

D.

Set a tag using the network command in a domain and use the route-map command to deny the matching tag when entering into a different domain

Refer to the exhibit.

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

What is a function of BFD?

A.

peer recovery after a Layer 3 protocol adjacency failure

B.

peer recovery after a Layer 2 adjacency failure

C.

failure detection independent of routing protocols and media types

D.

failure detection dependent on routing protocols and media types

The network administrator configured CoPP so that all routing protocol traffic toward the router CPU is

limited to 1 mbps. All traffic that exceeds

this limit must be dropped. The router is running BGP and OSPF Management traffic for Telnet and SSH

must be limited to 500kbps.

access-list 100 permit tcp any any eq 179

access-list 100 permit tcp any any range 22 23

access-list 100 permit ospf any any

!

class-map CM-ROUTING

match access-group 100

class-map CM-MGMT

match access-group 100

!

policy-map PM-COPP

class CM-ROUTING

police 1000000 conform-action transmit

class CM-MGMT

police 500000 conform-action transmit

!

control-plane

service-policy output PM-COPP

No traffic is filtering through CoPP,which is resulting in high CPU utilization,which configuration resolves

the issue ?

A.

no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101

B.

control-planeno service-policy output PM-COPPservice-policy input PM-COPP

C.

No access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range eq 22access-list 100 permit tcp any any range eq 23access-list 100 permit ospf any any

D.

no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101!control-planeno service-policy output PM-COPPservice-policy input PM-COPP

Refer to the exhibit.

A network engineer must establish communication between three different customer sites with these requirements:

Site-A: must be restricted to access to any users at Site-B or Site-C.

Site-B and Site-C must be able to communicate between sites and share routes using OSPF.

Which configuration meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

The network administrator configured the router for Control Plane Policing to limit OSPF traffic to be

policed to 1 Mbps. Any traffic that exceeds this limit must also be allowed at this point for traffic

analysis. The router configuration is:

access-list 100 permit ospf any any

!

class-map CM-OSPF

match access-group 100

!

policy-map PM-COPP

class CM-OSPF

police 1000000 conform-action transmit

!

control-plane

service-policy output PM-COPP

The Control Plane Policing failed to monitor and police OSPF traffic. Which configuration resolves this

issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A network administrator opens a telnet connection to the router and gets the message:

R1#telnet 10.1.1.2

Trying 10 1.1 2 Open

(Connection to 10.1.1.2 closed by foreign host)

Router R2 is configured with enable secret and password commands. Which action resolves the issue?

A.

Configure the logging synchronous command on line vty.

B.

Configure the exec command on line vty.

C.

Configure the login local command on line vty

D.

Configure the enable password command on line vty.

An engineer configured a router with this configuration

ip access-hst DENY TELNET

10 deny tcp any any eq 23 log-input

The router console starts receiving log message :%SEC-6-IPACCESSLOGP: list DENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) ->192.168.2.20(23), 1 packet"

Which action stops messages on the console while still denying Telnet?

A.

Configure a 20 permit ip any any command

B.

Remove log-Input keyword from the access list.

C.

Replace log-input keyword with the log keyword in the access list.

D.

Configure a 20 permit ip any any log-input command.

A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?

A.

ip tcp adjust-mss 1360crypto ipsec fragmentation after-encryption

B.

ip tcp adjust-mtu 1360crypto ipsec fragmentation after-encryption

C.

ip tcp adjust-mss 1360crypto ipsec fragmentation mtu-discovery

D.

ip tcp adjust-mtu 1360crypto ipsec fragmentation mtu-discovery

What are two characteristics of a VRF instance? (Choose two)

A.

It is defined by the VPN membership of a customer site attached to a P device.

B.

Each VRF has a different set of routing and CEF tables.

C.

AII VRFS share customers routing and CEF tables.

D.

An interface must be associated to one VRF

E.

A customer site can be associated to different VRFs.

Which feature is required for IPv6 Source Guard to block traffic arriving on the server interface from unknown sources?

A.

Dynamic ARP Inspection

B.

IPv6 RA Guard

C.

IPv6 ND Inspection

D.

DHCPv6 Guard