Deck 8: Implementing Cisco Enterprise Advanced Routing and Services (ENARSI)

Full screen (f)
exit full mode
Question
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to isolated the cause of this fault and answer the following questions. The fault condition is related to which technology?

A) NTP
B) Switch-to-Switch Connectivity
C) Access Vlans
D) Port Security
E) VLAN ACL / Port ACL
F) Switch Virtual Interface
Use Space or
up arrow
down arrow
to flip the card.
Question
<strong>  Refer to the exhibit. Which statement about R1 is true?</strong> A) OSPF redistributes RIP routes only if they have a tag of one. B) RIP learned routes are distributed to OSPF with a tag value of one. C) R1 adds one to the metric for RIP learned routes before redistributing to OSPF. D) RIP routes are redistributed to OSPF without any changes. <div style=padding-top: 35px> Refer to the exhibit. Which statement about R1 is true?

A) OSPF redistributes RIP routes only if they have a tag of one.
B) RIP learned routes are distributed to OSPF with a tag value of one.
C) R1 adds one to the metric for RIP learned routes before redistributing to OSPF.
D) RIP routes are redistributed to OSPF without any changes.
Question
What is a prerequisite for configuring BFD?

A) Jumbo frame support must be configured on the router that is using BFD.
B) All routers in the path between two BFD endpoints must have BFD enabled.
C) Cisco Express Forwarding must be enabled on all participating BFD endpoints.
D) To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process. To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.
Question
Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop? <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>

A) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A) nonbroadcast multiaccess
B) packet switching
C) policy-based routing
D) forwarding information base
Question
Refer to the exhibit. What is the result of applying this configuration? <strong>Refer to the exhibit. What is the result of applying this configuration?  </strong> A) The router can form BGP neighborships with any other device. B) The router cannot form BGP neighborships with any other device. C) The router cannot form BGP neighborships with any device that is matched by the access list named BGP. D) The router can form BGP neighborships with any device that is matched by the access list named BGP. <div style=padding-top: 35px>

A) The router can form BGP neighborships with any other device.
B) The router cannot form BGP neighborships with any other device.
C) The router cannot form BGP neighborships with any device that is matched by the access list named "BGP".
D) The router can form BGP neighborships with any device that is matched by the access list named "BGP".
Question
<strong>  Refer to the exhibit. After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?</strong> A) Set the administrative distance 100 under the RIP process on R2. B) Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP. C) Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP. D) Redistribute the directly connected interfaces on R2. <div style=padding-top: 35px> Refer to the exhibit. After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

A) Set the administrative distance 100 under the RIP process on R2.
B) Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.
C) Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.
D) Redistribute the directly connected interfaces on R2.
Question
Refer to the exhibit. An engineer is trying to block the route to 192.168.2.2 from the routing table by using the configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route? <strong>Refer to the exhibit. An engineer is trying to block the route to 192.168.2.2 from the routing table by using the configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?  </strong> A) Use an extended access list instead of a standard access list. B) Change sequence 10 in the route-map command from permit to deny . Change sequence 10 in the route-map command from permit to deny . C) Use a prefix list instead of an access list in the route map. D) Add this statement to the route map: route-map RM-OSPF-DL deny 20 . Add this statement to the route map: route-map RM-OSPF-DL deny 20 <div style=padding-top: 35px>

A) Use an extended access list instead of a standard access list.
B) Change sequence 10 in the route-map command from permit to deny . Change sequence 10 in the route-map command from permit to deny .
C) Use a prefix list instead of an access list in the route map.
D) Add this statement to the route map: route-map RM-OSPF-DL deny 20 . Add this statement to the route map: route-map RM-OSPF-DL deny 20
Question
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to Isolated the cause of this fault and answer the following questions. On which device is the fault condition located?

A) R1
B) R2
C) R3
D) R4
E) DSW1
F) DSW2
G) ASW1
H) ASW2
Question
Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.) <strong>Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)  </strong> A) Change the mode from mode tunnel to mode transport on R3. Change the mode from mode tunnel to mode transport on R3. B) Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. C) Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. D) Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3. crypto isakmp key cisco address 0.0.0.0 E) Change the mode from mode transport to mode tunnel on R2. mode tunnel on R2. <div style=padding-top: 35px>

A) Change the mode from mode tunnel to mode transport on R3. Change the mode from mode tunnel to mode transport on R3.
B) Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3.
C) Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3.
D) Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3. crypto isakmp key cisco address 0.0.0.0
E) Change the mode from mode transport to mode tunnel on R2. mode tunnel on R2.
Question
Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?

A) shared risk link group-disjoint
B) linecard-disjoint
C) lowest-repair-path-metric
D) interface-disjoint
Question
<strong>  Refer to the exhibit. An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through router R2. Which debug command is used to troubleshoot this issue?</strong> A) debug ip flow B) debug ip sla error C) debug ip routing D) debug ip packet <div style=padding-top: 35px> Refer to the exhibit. An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through router R2. Which debug command is used to troubleshoot this issue?

A) debug ip flow
B) debug ip sla error
C) debug ip routing
D) debug ip packet
Question
Refer to the exhibit. An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the summary route does not show up in the routing table. Why is the summary route missing? <strong>Refer to the exhibit. An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the summary route does not show up in the routing table. Why is the summary route missing?  </strong> A) The summary-address command is used only for summarizing prefixes between areas. The summary-address command is used only for summarizing prefixes between areas. B) The summary route is visible only in the OSPF database, not in the routing table. C) There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated. D) The summary route is not visible on this router, but it is visible on other OSPF routers in the same area. <div style=padding-top: 35px>

A) The summary-address command is used only for summarizing prefixes between areas. The summary-address command is used only for summarizing prefixes between areas.
B) The summary route is visible only in the OSPF database, not in the routing table.
C) There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.
D) The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.
Question
Refer to the exhibit. R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised? <strong>Refer to the exhibit. R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?  </strong> A) R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients. B) Route reflector setup requires full IBGP mesh between the routers. C) In route reflector setup, only classful prefixes are advertised to other clients. D) In route reflector setups, prefixes are not advertised from one client to another. <div style=padding-top: 35px>

A) R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.
B) Route reflector setup requires full IBGP mesh between the routers.
C) In route reflector setup, only classful prefixes are advertised to other clients.
D) In route reflector setups, prefixes are not advertised from one client to another.
Question
Refer to the exhibit. An engineer configures a static route on a router, but when the engineer checks the route to the destination, a different next hop is chosen. What is the reason for this? <strong>Refer to the exhibit. An engineer configures a static route on a router, but when the engineer checks the route to the destination, a different next hop is chosen. What is the reason for this?  </strong> A) Dynamic routing protocols always have priority over static routes. B) The metric of the OSPF route is lower than the metric of the static route. C) The configured AD for the static route is higher than the AD of OSPF. D) The syntax of the static route is not valid, so the route is not considered. <div style=padding-top: 35px>

A) Dynamic routing protocols always have priority over static routes.
B) The metric of the OSPF route is lower than the metric of the static route.
C) The configured AD for the static route is higher than the AD of OSPF.
D) The syntax of the static route is not valid, so the route is not considered.
Question
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to isolated the cause of this fault and answer the following questions. What is the solution to the fault condition?

A) In Configuration mode, using the interface port-channel 13 command, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 20,200 commands.
B) In Configuration mode, using the interface port-channel 13, port-channel 23, then configure switchport trunk none allowed vlan none followed by switchport trunk allowed vlan 10,200 commands.
C) In Configuration mode, using the interface port-channel 23 command, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 20,200 commands.
D) In Configuration mode, using the interface port-channel 23, port-channel, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 10,20,200 commands.
Question
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A) multi-paths eibgp 2
B) maximum-paths 2
C) maximum-paths ibgp 2
D) multi-paths 2
Question
<strong>  Refer to the exhibit. In which circumstance does the BGP neighbor remain in the idle condition?</strong> A) if prefixes are not received from the BGP peer B) if prefixes reach the maximum limit C) if a prefix list is applied on the inbound direction D) if prefixes exceed the maximum limit <div style=padding-top: 35px> Refer to the exhibit. In which circumstance does the BGP neighbor remain in the idle condition?

A) if prefixes are not received from the BGP peer
B) if prefixes reach the maximum limit
C) if a prefix list is applied on the inbound direction
D) if prefixes exceed the maximum limit
Question
R2 has a locally originated prefix 192.168.130.0/24 and has these configurations: <strong>R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:   What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?</strong> A) R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away. B) R1 does not accept any routes other than 192.168.130.0/24 C) R1 does not forward traffic that is destined for 192.168.30.0/24 D) Network 192.168.130.0/24 is not allowed in the R1 table <div style=padding-top: 35px> What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A) R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.
B) R1 does not accept any routes other than 192.168.130.0/24
C) R1 does not forward traffic that is destined for 192.168.30.0/24
D) Network 192.168.130.0/24 is not allowed in the R1 table
Question
Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A) router ospfv3 1 address-family ipv4
B) Router(config-router)#ospfv3 1 ipv4 area 0
C) Router(config-if)#ospfv3 1 ipv4 area 0
D) address-family ipv4 unicast
Question
Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration? <strong>Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?  </strong> A) Add the aaa authentication login default none command to the global configuration. Add the aaa authentication login default none command to the global configuration. B) Replace the capital C with a lowercase c in the aaa authentication login Console local command. Replace the capital C with a lowercase c in the aaa authentication login Console local command. C) Add the aaa authentication login default group tacacs+ local-case command to the global configuration. aaa authentication login default group tacacs+ local-case D) Add the login authentication Console command to the line configuration login authentication Console command to the line configuration <div style=padding-top: 35px>

A) Add the aaa authentication login default none command to the global configuration. Add the aaa authentication login default none command to the global configuration.
B) Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command. Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command.
C) Add the aaa authentication login default group tacacs+ local-case command to the global configuration. aaa authentication login default group tacacs+ local-case
D) Add the login authentication Console command to the line configuration login authentication Console command to the line configuration
Question
Refer to the exhibit. What does the imp-null tag represent in the MPLS VPN cloud? <strong>Refer to the exhibit. What does the imp-null tag represent in the MPLS VPN cloud?  </strong> A) Pop the label B) Impose the label C) Include the EXP bit D) Exclude the EXP bit <div style=padding-top: 35px>

A) Pop the label
B) Impose the label
C) Include the EXP bit
D) Exclude the EXP bit
Question
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A) NHRP
B) IPsec
C) MP-BGP
D) OSPF
Question
<strong>  Refer to the exhibit. Why is the remote NetFlow server failing to receive the NetFlow data?</strong> A) The flow exporter is configured but is not used. B) The flow monitor is applied in the wrong direction. C) The flow monitor is applied to the wrong interface. D) The destination of the flow exporter is not reachable. <div style=padding-top: 35px> Refer to the exhibit. Why is the remote NetFlow server failing to receive the NetFlow data?

A) The flow exporter is configured but is not used.
B) The flow monitor is applied in the wrong direction.
C) The flow monitor is applied to the wrong interface.
D) The destination of the flow exporter is not reachable.
Question
Which transport layer protocol is used to form LDP sessions?

A) UDP
B) SCTP
C) TCP
D) RDP
Question
Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources? <strong>Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?  </strong> A) Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool B) Configure the DHCP lease time to a smaller value C) Configure the DHCP lease time to a bigger value D) Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool <div style=padding-top: 35px>

A) Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool
B) Configure the DHCP lease time to a smaller value
C) Configure the DHCP lease time to a bigger value
D) Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool
Question
An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A) sudo maglev-config update
B) sudo maglev install config update
C) sudo maglev reinstall
D) sudo update config install
Question
While troubleshooting connectivity issues to a router, these details are noticed: Standard pings to all router interfaces, including loopbacks, are successful. Data traffic is unaffected. SNMP connectivity is intermittent. SSH is either slow or disconnects frequently. Which command must be configured first to troubleshoot this issue?

A) show policy-map control-plane
B) show policy-map
C) show interface | inc drop
D) show ip route
Question
Refer to the exhibit. ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration? <strong>Refer to the exhibit. ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?  </strong> A) Start-time 00:00 B) Start-time 0 C) Start-time immediately D) Start-time now <div style=padding-top: 35px>

A) Start-time 00:00
B) Start-time 0
C) Start-time immediately
D) Start-time now
Question
Refer to the exhibit. Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue? <strong>Refer to the exhibit. Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?  </strong> A) Issue the eigrp stub command on R1. Issue the eigrp stub command on R1. B) Issue the no eigrp stub command on R1. no eigrp stub C) Issue the eigrp stub command on R2. command on R2. D) Issue the no eigrp stub command on R2. <div style=padding-top: 35px>

A) Issue the eigrp stub command on R1. Issue the eigrp stub command on R1.
B) Issue the no eigrp stub command on R1. no eigrp stub
C) Issue the eigrp stub command on R2. command on R2.
D) Issue the no eigrp stub command on R2.
Question
Which list defines the contents of an MPLS label?

A) 20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL
B) 32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL
C) 20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit
D) 32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit
Question
Which statement about route distinguishers in an MPLS network is true?

A) Route distinguishers allow multiple instances of a routing table to coexist within the edge router.
B) Route distinguishers are used for label bindings.
C) Route distinguishers make a unique VPNv4 address across the MPLS network.
D) Route distinguishers define which prefixes are imported and exported on the edge router.
Question
Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2? <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>

A) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
<strong>  Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?</strong> A) permit tcp port 443 B) permit udp port 465 C) permit tcp port 465 D) permit tcp port 22 <div style=padding-top: 35px> Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?

A) permit tcp port 443
B) permit udp port 465
C) permit tcp port 465
D) permit tcp port 22
Question
While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?

A) The device must be resynced to Cisco DNA Center.
B) The software image for the device is in install mode.
C) The device has lost connectivity to Cisco DNA Center.
D) The software image for the device is in bundle mode
Question
Which statement about MPLS LDP router ID is true?

A) If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.
B) The loopback with the highest IP address is selected as the router ID.
C) The MPLS LDP router ID must match the IGP router ID.
D) The force keyword changes the router ID to the specified address without causing any impact. The force keyword changes the router ID to the specified address without causing any impact.
Question
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A) Copy the file to the destination router with the copy tftp: flash: command Copy the file to the destination router with the copy tftp: flash: command
B) Enable the TFTP server on the source router with the tftp-server flash: command Enable the TFTP server on the source router with the tftp-server flash:
C) TFTP is not supported in recent IOS versions, so an alternative method must be used
D) Configure a user on the source router with the username tftp password tftp command Configure a user on the source router with the username tftp password tftp
E) Configure the TFTP authentication on the source router with the tftp-server authentication local command Configure the TFTP authentication on the source router with the tftp-server authentication local
Question
<strong>  Refer to the exhibit. Why is user authentication being rejected?</strong> A) The TACACS+ server expects user, but the NT client sends domain / user. B) The TACACS+ server refuses the user because the user is set up for CHAP. C) The TACACS+ server is down, and the user is in the local database. D) The TACACS+ server is down, and the user is not in the local database. <div style=padding-top: 35px> Refer to the exhibit. Why is user authentication being rejected?

A) The TACACS+ server expects "user", but the NT client sends "domain / user".
B) The TACACS+ server refuses the user because the user is set up for CHAP.
C) The TACACS+ server is down, and the user is in the local database.
D) The TACACS+ server is down, and the user is not in the local database.
Question
Which statement about IPv6 RA Guard is true?

A) It does not offer protection in environments where IPv6 traffic is tunneled.
B) It cannot be configured on a switch port interface in the ingress direction.
C) Packets that are dropped by IPv6 RA Guard cannot be spanned.
D) It is not supported in hardware when TCAM is programmed.
Question
Which statement about IPv6 ND inspection is true?

A) It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.
B) It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.
C) It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.
D) It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.
Question
<strong>  Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?</strong> A) policy-map SHAPE_BGP B) policy-map LIMIT_BGP C) policy-map POLICE_BGP D) policy-map COPP <div style=padding-top: 35px> Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?

A) policy-map SHAPE_BGP
B) policy-map LIMIT_BGP
C) policy-map POLICE_BGP
D) policy-map COPP
Question
Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router? <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>

A) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
<strong>  Refer to the exhibit. A router is receiving BGP routing updates from multiple neighbors for routes in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?</strong> A) The local preference value in another neighbor statement is higher than 250. B) The local preference value should be set to the same value as the weight in the route map. C) The route map is applied in the wrong direction. D) The weight value in another neighbor statement is higher than 200. <div style=padding-top: 35px> Refer to the exhibit. A router is receiving BGP routing updates from multiple neighbors for routes in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

A) The local preference value in another neighbor statement is higher than 250.
B) The local preference value should be set to the same value as the weight in the route map.
C) The route map is applied in the wrong direction.
D) The weight value in another neighbor statement is higher than 200.
Question
When provisioning a device in Cisco DNA Center, the engineer sees the error message "Cannot select the device. Not compatible with template". What is the reason for the error?

A) The template has an incorrect configuration.
B) The software version of the template is different from the software version of the device.
C) The changes to the template were not committed.
D) The tag that was used to filter the templates does not match the device tag.
Question
<strong>  Refer to the exhibit. Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)</strong> A) Configure SNMP rw permission in addition to community ciscotest. Configure SNMP rw permission in addition to community ciscotest. B) Modify access list 1 and allow operations subnet in the access list. C) Modify access list 1 and allow SNMP in the access list. D) Configure SNMP rw permission in addition to version 1. permission in addition to version 1. E) Configure SNMP rw permission in addition to community ciscotest 1. permission in addition to community ciscotest 1. <div style=padding-top: 35px> Refer to the exhibit. Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)

A) Configure SNMP rw permission in addition to community ciscotest. Configure SNMP rw permission in addition to community ciscotest.
B) Modify access list 1 and allow operations subnet in the access list.
C) Modify access list 1 and allow SNMP in the access list.
D) Configure SNMP rw permission in addition to version 1. permission in addition to version 1.
E) Configure SNMP rw permission in addition to community ciscotest 1. permission in addition to community ciscotest 1.
Question
Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop? <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>

A) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
<strong>  Refer to the exhibits. Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two commands are missing? (Choose two.)</strong> A) The ip nhrp redirect command is missing on the spoke routers. The ip nhrp redirect command is missing on the spoke routers. B) The ip nhrp shortcut command is missing on the spoke routers. ip nhrp shortcut C) The ip nhrp redirect command is missing on the hub router. ip nhrp redirect command is missing on the hub router. D) The ip nhrp shortcut command is missing on the hub router. ip nhrp shortcut E) The ip nhrp map command is missing on the hub router. ip nhrp map command is missing on the hub router. <div style=padding-top: 35px> Refer to the exhibits. Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two commands are missing? (Choose two.)

A) The ip nhrp redirect command is missing on the spoke routers. The ip nhrp redirect command is missing on the spoke routers.
B) The ip nhrp shortcut command is missing on the spoke routers. ip nhrp shortcut
C) The ip nhrp redirect command is missing on the hub router. ip nhrp redirect command is missing on the hub router.
D) The ip nhrp shortcut command is missing on the hub router. ip nhrp shortcut
E) The ip nhrp map command is missing on the hub router. ip nhrp map command is missing on the hub router.
Question
Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error? <strong>Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?  </strong> A) An authentication error with the NTP server results in an incorrect timestamp. B) The keyword localtime is not defined on the timestamp service command. The keyword localtime is not defined on the timestamp service command. C) The NTP server is in a different time zone. D) The system clock is set incorrectly to summer-time hours. <div style=padding-top: 35px>

A) An authentication error with the NTP server results in an incorrect timestamp.
B) The keyword localtime is not defined on the timestamp service command. The keyword localtime is not defined on the timestamp service command.
C) The NTP server is in a different time zone.
D) The system clock is set incorrectly to summer-time hours.
Question
<strong>  Refer to the exhibit. A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log messages stream, it is impossible to capture the problem. Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two.)</strong> A) debug condition ospf neighbor B) debug condition interface C) debug condition session-id ADJCHG D) debug condition all <div style=padding-top: 35px> Refer to the exhibit. A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log messages stream, it is impossible to capture the problem. Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two.)

A) debug condition ospf neighbor
B) debug condition interface
C) debug condition session-id ADJCHG
D) debug condition all
Question
<strong>  Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?</strong> A) 10.2.2.0/24 B) 10.1.4.0/26 C) 10.1.2.0/24 D) 10.2.3.0/26 <div style=padding-top: 35px> Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?

A) 10.2.2.0/24
B) 10.1.4.0/26
C) 10.1.2.0/24
D) 10.2.3.0/26
Question
Which configuration enables the VRF that is labeled "Inet" on FastEthernet0/0?

A) R1(config)# ip vrf Inet R1(config-vrf)#ip vrf FastEthernet0/0
B) R1(config)#ip vrf Inet FastEthernet0/0
C) R1(config-vrf)#interface FastEthernet0/0 R1(config-if)#ip vrf forwarding Inet
D) R1(config)#router ospf 1 vrf Inet R1(config-router)#ip vrf forwarding FastEthernet0/0
Question
<strong>  Refer to the exhibit. An engineer is trying to redistribute OSPF to BGP, but not all of the routes are redistributed. What is the reason for this issue?</strong> A) By default, only internal routes and external type 1 routes are redistributed into BGP B) Only classful networks are redistributed from OSPF to BGP C) BGP convergence is slow, so the route will eventually be present in the BGP table D) By default, only internal OSPF routes are redistributed into BGP <div style=padding-top: 35px> Refer to the exhibit. An engineer is trying to redistribute OSPF to BGP, but not all of the routes are redistributed. What is the reason for this issue?

A) By default, only internal routes and external type 1 routes are redistributed into BGP
B) Only classful networks are redistributed from OSPF to BGP
C) BGP convergence is slow, so the route will eventually be present in the BGP table
D) By default, only internal OSPF routes are redistributed into BGP
Question
<strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px> Refer to the exhibit. The R1 and R2 configurations are: <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px> The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px>
B) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px>
C) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px>
D) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px>
E) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   <div style=padding-top: 35px>
Question
Which command displays the IP routing table information that is associated with VRF-Lite?

A) show ip vrf
B) show ip route vrf
C) show run vrf
D) show ip protocols vrf
Question
A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A) service timestamps log uptime
B) clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00
C) service timestamps log datetime localtime show-timezone
D) clock calendar-valid
Question
<strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   <div style=padding-top: 35px> Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?

A) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
What are two functions of IPv6 Source Guard? (Choose two.)

A) It works independent from IPv6 neighbor discovery.
B) It denies traffic from unknown sources or unallocated addresses.
C) It uses the populated binding table for allowing legitimate traffic.
D) It denies traffic by inspecting neighbor discovery packets for specific patterns.
E) It blocks certain traffic by inspecting DHCP packets for specific sources.
Question
<strong>  Refer to the exhibit. An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?</strong> A) Configure the service timestamps log uptime command in global configuration mode. Configure the service timestamps log uptime command in global configuration mode. B) Configure the logging clock synchronize command in global configuration mode. logging clock synchronize C) Configure the service timestamps log datetime localtime command in global configuration mode. service timestamps log datetime localtime D) Make sure that the clock on the device is synchronized with an NTP server. <div style=padding-top: 35px> Refer to the exhibit. An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A) Configure the service timestamps log uptime command in global configuration mode. Configure the service timestamps log uptime command in global configuration mode.
B) Configure the logging clock synchronize command in global configuration mode. logging clock synchronize
C) Configure the service timestamps log datetime localtime command in global configuration mode. service timestamps log datetime localtime
D) Make sure that the clock on the device is synchronized with an NTP server.
Question
Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64? <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>

A) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
Refer to the exhibit. An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device? <strong>Refer to the exhibit. An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?  </strong> A) no ip ssh disable B) ip ssh enable C) ip ssh version 2 D) crypto key generate rsa <div style=padding-top: 35px>

A) no ip ssh disable
B) ip ssh enable
C) ip ssh version 2
D) crypto key generate rsa
Question
<strong>  Refer to the exhibit. BGP is flapping after the CoPP policy is applied. What are the two solutions to fix the issue? (Choose two.)</strong> A) Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . B) Configure a higher value for CIR under the default class to allow more packets during peak traffic. C) Configure BGP in the COPP-CRITICAL-7600 ACL. Configure BGP in the COPP-CRITICAL-7600 ACL. D) Configure IP CEF for CoPP policy and BGP to work. E) Configure a three-color policer instead of two-color policer under Class COPP-CRITICAL-7600 . Configure a three-color policer instead of two-color policer under <div style=padding-top: 35px> Refer to the exhibit. BGP is flapping after the CoPP policy is applied. What are the two solutions to fix the issue? (Choose two.)

A) Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . Configure a higher value for CIR under the Class COPP-CRITICAL-7600 .
B) Configure a higher value for CIR under the default class to allow more packets during peak traffic.
C) Configure BGP in the COPP-CRITICAL-7600 ACL. Configure BGP in the COPP-CRITICAL-7600 ACL.
D) Configure IP CEF for CoPP policy and BGP to work.
E) Configure a three-color policer instead of two-color policer under Class COPP-CRITICAL-7600 . Configure a three-color policer instead of two-color policer under
Question
An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

A) set ip next-hop
B) set ip default next-hop
C) set ip next-hop recursive
D) set ip next-hop verify-availability
Question
<strong>  Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?</strong> A) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP. B) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to allow when redistributing OSPF into EIGRP. C) Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain. D) Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF. <div style=padding-top: 35px> Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.
B) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to allow when redistributing OSPF into EIGRP.
C) Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.
D) Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.
Question
<strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px> Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A) match the passwords
B) match the hello timers
C) match the MTUs
D) match the network types
Question
<strong>  Refer to the exhibit. An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?</strong> A) Use the icmp-echo command to track both default routes. B) Use the same AD for both default routes. C) Start IP SLA by matching numbers for track and ip sla commands. D) Start IP SLA by defining frequency and scheduling it. <div style=padding-top: 35px> Refer to the exhibit. An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A) Use the icmp-echo command to track both default routes.
B) Use the same AD for both default routes.
C) Start IP SLA by matching numbers for track and ip sla commands.
D) Start IP SLA by defining frequency and scheduling it.
Question
<strong>  Refer to the exhibit. Which action resolves intermittent connectivity observed with the SNMP trap rackets?</strong> A) Decrease the committed burst size of the mgmt class map. B) Increase the CIR of the mgmt class map. C) Add one new entry in the ACL 120 to permit the UDP port 161. D) Add a new class map to match TCP traffic. <div style=padding-top: 35px> Refer to the exhibit. Which action resolves intermittent connectivity observed with the SNMP trap rackets?

A) Decrease the committed burst size of the mgmt class map.
B) Increase the CIR of the mgmt class map.
C) Add one new entry in the ACL 120 to permit the UDP port 161.
D) Add a new class map to match TCP traffic.
Question
What is an advantage of using BFD?

A) It detects local link failure at layer 1 and updates the routing table.
B) It detects local link failure at layer 3 and updates the routing protocols.
C) It has sub-second failure detection for layer 1 and layer 3 problems.
D) It has sub-second failure detection for layer 1 and layer 2 problems.
Question
<strong>  Refer to the exhibit. A network administrator wants to block all traffic toward the Internet after business hours and on weekends. When the administrator applies an access list on interface Gi0/1, all traffic is blocked and there is no access to the Internet at any time. Which action resolves the issue?</strong> A) Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. B) Add the permit ip any any statement after the deny icmp any any time-range no-conn command in the access list. permit ip any any deny icmp any any time-range no-conn command in the access list. C) Add the permit allowed time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. Add the permit allowed time-range no-conn statement after the D) Add the permit ip any any time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. <div style=padding-top: 35px> Refer to the exhibit. A network administrator wants to block all traffic toward the Internet after business hours and on weekends. When the administrator applies an access list on interface Gi0/1, all traffic is blocked and there is no access to the Internet at any time. Which action resolves the issue?

A) Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list.
B) Add the permit ip any any statement after the deny icmp any any time-range no-conn command in the access list. permit ip any any deny icmp any any time-range no-conn command in the access list.
C) Add the permit allowed time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. Add the permit allowed time-range no-conn statement after the
D) Add the permit ip any any time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list.
Question
<strong>  Refer to the exhibit. R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?</strong> A) Fix route dampening configured on the router. B) Replace the SFP module because it is not supported. C) Fix IP Event Dampening configured on the interface. D) Correct the IP SLA probe that failed. <div style=padding-top: 35px> Refer to the exhibit. R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A) Fix route dampening configured on the router.
B) Replace the SFP module because it is not supported.
C) Fix IP Event Dampening configured on the interface.
D) Correct the IP SLA probe that failed.
Question
<strong>  Refer to the exhibit. An IT staff member comes into the office during normal office hours and cannot access devices through SSH. Which action should be taken to resolve this issue?</strong> A) Modify the access list to use the correct IP address. B) Configure the correct time range. C) Modify the access list to correct the subnet mask. D) Configure the access list in the outbound direction. <div style=padding-top: 35px> Refer to the exhibit. An IT staff member comes into the office during normal office hours and cannot access devices through SSH. Which action should be taken to resolve this issue?

A) Modify the access list to use the correct IP address.
B) Configure the correct time range.
C) Modify the access list to correct the subnet mask.
D) Configure the access list in the outbound direction.
Question
What are two functions of LDP? (Choose two.)

A) It advertises labels per Forwarding Equivalence Class.
B) It uses Forwarding Equivalence Class.
C) It is defined in RFC 3038 and 3039.
D) It requires MPLS Traffic Engineering.
E) It must use Resource Reservation Protocol.
Question
<strong>  Refer to the exhibit. A client is concerned that passwords are visible when running this show archive log config all . Which router configuration is needed to resolve this issue?</strong> A) MASS-RTR(config)# aaa authentication arap MASS-RTR(config)# aaa authentication arap B) MASS-RTR(config-archive-log-cfg)# password encryption aes MASS-RTR(config-archive-log-cfg)# password encryption aes C) MASS-RTR(config)# service password-encryption service password-encryption D) MASS-RTR(config-archive-log-cfg)# hidekeys hidekeys <div style=padding-top: 35px> Refer to the exhibit. A client is concerned that passwords are visible when running this show archive log config all . Which router configuration is needed to resolve this issue?

A) MASS-RTR(config)# aaa authentication arap MASS-RTR(config)# aaa authentication arap
B) MASS-RTR(config-archive-log-cfg)# password encryption aes MASS-RTR(config-archive-log-cfg)# password encryption aes
C) MASS-RTR(config)# service password-encryption service password-encryption
D) MASS-RTR(config-archive-log-cfg)# hidekeys hidekeys
Question
What does the PE router convert the IPv4 prefix to within an MPLS VPN?

A) eBGP path association between the PE and CE sessions
B) prefix that combines the ASN, PE router-id, and IP prefix
C) 48-bit route combining the IP and PE router-id
D) VPN-IPv4 prefix combined with the 64-bit route distinguisher
Question
An engineer configured access list NON-CISCO in a policy to influence routes. <strong>An engineer configured access list NON-CISCO in a policy to influence routes.   What are the two effects of this route map configuration? (Choose two.)</strong> A) Packets are forwarded using normal route lookup. B) Packets are forwarded to the default gateway. C) Packets are dropped by the access list. D) Packets are evaluated by sequence 10. E) Packets are not evaluated by sequence 10. <div style=padding-top: 35px> What are the two effects of this route map configuration? (Choose two.)

A) Packets are forwarded using normal route lookup.
B) Packets are forwarded to the default gateway.
C) Packets are dropped by the access list.
D) Packets are evaluated by sequence 10.
E) Packets are not evaluated by sequence 10.
Question
An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME, WRONGDIGEST". Which action resolves the issue?

A) Configure the correct authentication password using SNMPv3 authNoPriv.
B) Configure correct authentication and privacy passwords using SNMPv3 authPriv.
C) Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.
D) Configure the correct authentication password using SNMPv3 authPriv.
Question
<strong>  Refer to the exhibit. An engineer wanted to set a tag of 30 to route 10.1.80.65/32 but it failed. How is the issue fixed?</strong> A) Modify route-map ospf-to-eigrp permit10 and match prefix-list ccnp2. B) Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32. C) Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24. D) Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2. <div style=padding-top: 35px> Refer to the exhibit. An engineer wanted to set a tag of 30 to route 10.1.80.65/32 but it failed. How is the issue fixed?

A) Modify route-map ospf-to-eigrp permit10 and match prefix-list ccnp2.
B) Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32.
C) Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24.
D) Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.
Question
<strong>    Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?</strong> A) Change the administrative distance of the external EIGRP to 90. B) Apply the outbound distribution list on R5 toward R4 in OSPF. C) Change the administrative distance of OSPF to 200 on R5. D) Redistribute OSPF into EIGRP on R4. <div style=padding-top: 35px> <strong>    Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?</strong> A) Change the administrative distance of the external EIGRP to 90. B) Apply the outbound distribution list on R5 toward R4 in OSPF. C) Change the administrative distance of OSPF to 200 on R5. D) Redistribute OSPF into EIGRP on R4. <div style=padding-top: 35px> Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A) Change the administrative distance of the external EIGRP to 90.
B) Apply the outbound distribution list on R5 toward R4 in OSPF.
C) Change the administrative distance of OSPF to 200 on R5.
D) Redistribute OSPF into EIGRP on R4.
Question
Which protocol does MPLS use to support traffic engineering?

A) Tag Distribution Protocol (TDP)
B) Resource Reservation Protocol (RSVP)
C) Label Distribution Protocol (LDP)
D) Border Gateway Protocol (BGP)
Question
How are MPLS Layer 3 VPN services deployed?

A) The RD and RT values must match under the VRF.
B) The import and export RT values under a VRF must always be the same.
C) The label switch path must be available between the local and remote PE routers.
D) The RD and RT values under a VRF must match on the remote PE router.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/114
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Implementing Cisco Enterprise Advanced Routing and Services (ENARSI)
1
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to isolated the cause of this fault and answer the following questions. The fault condition is related to which technology?

A) NTP
B) Switch-to-Switch Connectivity
C) Access Vlans
D) Port Security
E) VLAN ACL / Port ACL
F) Switch Virtual Interface
Switch-to-Switch Connectivity
2
<strong>  Refer to the exhibit. Which statement about R1 is true?</strong> A) OSPF redistributes RIP routes only if they have a tag of one. B) RIP learned routes are distributed to OSPF with a tag value of one. C) R1 adds one to the metric for RIP learned routes before redistributing to OSPF. D) RIP routes are redistributed to OSPF without any changes. Refer to the exhibit. Which statement about R1 is true?

A) OSPF redistributes RIP routes only if they have a tag of one.
B) RIP learned routes are distributed to OSPF with a tag value of one.
C) R1 adds one to the metric for RIP learned routes before redistributing to OSPF.
D) RIP routes are redistributed to OSPF without any changes.
RIP learned routes are distributed to OSPF with a tag value of one.
3
What is a prerequisite for configuring BFD?

A) Jumbo frame support must be configured on the router that is using BFD.
B) All routers in the path between two BFD endpoints must have BFD enabled.
C) Cisco Express Forwarding must be enabled on all participating BFD endpoints.
D) To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process. To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.
Cisco Express Forwarding must be enabled on all participating BFD endpoints.
4
Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop? <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)

A) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
B) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
C) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
D) <strong>Refer to the exhibit. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
5
Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?

A) nonbroadcast multiaccess
B) packet switching
C) policy-based routing
D) forwarding information base
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
6
Refer to the exhibit. What is the result of applying this configuration? <strong>Refer to the exhibit. What is the result of applying this configuration?  </strong> A) The router can form BGP neighborships with any other device. B) The router cannot form BGP neighborships with any other device. C) The router cannot form BGP neighborships with any device that is matched by the access list named BGP. D) The router can form BGP neighborships with any device that is matched by the access list named BGP.

A) The router can form BGP neighborships with any other device.
B) The router cannot form BGP neighborships with any other device.
C) The router cannot form BGP neighborships with any device that is matched by the access list named "BGP".
D) The router can form BGP neighborships with any device that is matched by the access list named "BGP".
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
7
<strong>  Refer to the exhibit. After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?</strong> A) Set the administrative distance 100 under the RIP process on R2. B) Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP. C) Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP. D) Redistribute the directly connected interfaces on R2. Refer to the exhibit. After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

A) Set the administrative distance 100 under the RIP process on R2.
B) Filter the prefix 10.1.1.0/24 when redistributed from OSPF to EIGRP.
C) Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.
D) Redistribute the directly connected interfaces on R2.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
8
Refer to the exhibit. An engineer is trying to block the route to 192.168.2.2 from the routing table by using the configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route? <strong>Refer to the exhibit. An engineer is trying to block the route to 192.168.2.2 from the routing table by using the configuration that is shown. The route is still present in the routing table as an OSPF route. Which action blocks the route?  </strong> A) Use an extended access list instead of a standard access list. B) Change sequence 10 in the route-map command from permit to deny . Change sequence 10 in the route-map command from permit to deny . C) Use a prefix list instead of an access list in the route map. D) Add this statement to the route map: route-map RM-OSPF-DL deny 20 . Add this statement to the route map: route-map RM-OSPF-DL deny 20

A) Use an extended access list instead of a standard access list.
B) Change sequence 10 in the route-map command from permit to deny . Change sequence 10 in the route-map command from permit to deny .
C) Use a prefix list instead of an access list in the route map.
D) Add this statement to the route map: route-map RM-OSPF-DL deny 20 . Add this statement to the route map: route-map RM-OSPF-DL deny 20
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
9
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to Isolated the cause of this fault and answer the following questions. On which device is the fault condition located?

A) R1
B) R2
C) R3
D) R4
E) DSW1
F) DSW2
G) ASW1
H) ASW2
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
10
Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.) <strong>Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing. Which two actions resolve the issue? (Choose two.)  </strong> A) Change the mode from mode tunnel to mode transport on R3. Change the mode from mode tunnel to mode transport on R3. B) Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. C) Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. D) Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3. crypto isakmp key cisco address 0.0.0.0 E) Change the mode from mode transport to mode tunnel on R2. mode tunnel on R2.

A) Change the mode from mode tunnel to mode transport on R3. Change the mode from mode tunnel to mode transport on R3.
B) Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3.
C) Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3.
D) Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3. crypto isakmp key cisco address 0.0.0.0
E) Change the mode from mode transport to mode tunnel on R2. mode tunnel on R2.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
11
Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?

A) shared risk link group-disjoint
B) linecard-disjoint
C) lowest-repair-path-metric
D) interface-disjoint
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
12
<strong>  Refer to the exhibit. An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through router R2. Which debug command is used to troubleshoot this issue?</strong> A) debug ip flow B) debug ip sla error C) debug ip routing D) debug ip packet Refer to the exhibit. An IP SLA was configured on router R1 that allows the default route to be modified in the event that Fa0/0 loses reachability with the router R3 Fa0/0 interface. The route has changed to flow through router R2. Which debug command is used to troubleshoot this issue?

A) debug ip flow
B) debug ip sla error
C) debug ip routing
D) debug ip packet
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
13
Refer to the exhibit. An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the summary route does not show up in the routing table. Why is the summary route missing? <strong>Refer to the exhibit. An engineer is trying to generate a summary route in OSPF for network 10.0.0.0/8, but the summary route does not show up in the routing table. Why is the summary route missing?  </strong> A) The summary-address command is used only for summarizing prefixes between areas. The summary-address command is used only for summarizing prefixes between areas. B) The summary route is visible only in the OSPF database, not in the routing table. C) There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated. D) The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.

A) The summary-address command is used only for summarizing prefixes between areas. The summary-address command is used only for summarizing prefixes between areas.
B) The summary route is visible only in the OSPF database, not in the routing table.
C) There is no route for a subnet inside 10.0.0.0/8, so the summary route is not generated.
D) The summary route is not visible on this router, but it is visible on other OSPF routers in the same area.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
14
Refer to the exhibit. R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised? <strong>Refer to the exhibit. R2 is a route reflector, and R1 and R3 are route reflector clients. The route reflector learns the route to 172.16.25.0/24 from R1, but it does not advertise to R3. What is the reason the route is not advertised?  </strong> A) R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients. B) Route reflector setup requires full IBGP mesh between the routers. C) In route reflector setup, only classful prefixes are advertised to other clients. D) In route reflector setups, prefixes are not advertised from one client to another.

A) R2 does not have a route to the next hop, so R2 does not advertise the prefix to other clients.
B) Route reflector setup requires full IBGP mesh between the routers.
C) In route reflector setup, only classful prefixes are advertised to other clients.
D) In route reflector setups, prefixes are not advertised from one client to another.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
15
Refer to the exhibit. An engineer configures a static route on a router, but when the engineer checks the route to the destination, a different next hop is chosen. What is the reason for this? <strong>Refer to the exhibit. An engineer configures a static route on a router, but when the engineer checks the route to the destination, a different next hop is chosen. What is the reason for this?  </strong> A) Dynamic routing protocols always have priority over static routes. B) The metric of the OSPF route is lower than the metric of the static route. C) The configured AD for the static route is higher than the AD of OSPF. D) The syntax of the static route is not valid, so the route is not considered.

A) Dynamic routing protocols always have priority over static routes.
B) The metric of the OSPF route is lower than the metric of the static route.
C) The configured AD for the static route is higher than the AD of OSPF.
D) The syntax of the static route is not valid, so the route is not considered.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
16
The implementations group has been using the test bed to do a 'proof-of-concept' that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241. After several changes to the network addressing, routing scheme, DHCP services, NTP services, and FHRP services, a trouble ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241 address. Use the supported commands to isolated the cause of this fault and answer the following questions. What is the solution to the fault condition?

A) In Configuration mode, using the interface port-channel 13 command, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 20,200 commands.
B) In Configuration mode, using the interface port-channel 13, port-channel 23, then configure switchport trunk none allowed vlan none followed by switchport trunk allowed vlan 10,200 commands.
C) In Configuration mode, using the interface port-channel 23 command, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 20,200 commands.
D) In Configuration mode, using the interface port-channel 23, port-channel, then configure switchport trunk allowed vlan none followed by switchport trunk allowed vlan 10,20,200 commands.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
17
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?

A) multi-paths eibgp 2
B) maximum-paths 2
C) maximum-paths ibgp 2
D) multi-paths 2
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
18
<strong>  Refer to the exhibit. In which circumstance does the BGP neighbor remain in the idle condition?</strong> A) if prefixes are not received from the BGP peer B) if prefixes reach the maximum limit C) if a prefix list is applied on the inbound direction D) if prefixes exceed the maximum limit Refer to the exhibit. In which circumstance does the BGP neighbor remain in the idle condition?

A) if prefixes are not received from the BGP peer
B) if prefixes reach the maximum limit
C) if a prefix list is applied on the inbound direction
D) if prefixes exceed the maximum limit
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
19
R2 has a locally originated prefix 192.168.130.0/24 and has these configurations: <strong>R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:   What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?</strong> A) R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away. B) R1 does not accept any routes other than 192.168.130.0/24 C) R1 does not forward traffic that is destined for 192.168.30.0/24 D) Network 192.168.130.0/24 is not allowed in the R1 table What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

A) R1 sees 192.168.130.0/24 as two AS hops away instead of one AS hop away.
B) R1 does not accept any routes other than 192.168.130.0/24
C) R1 does not forward traffic that is destined for 192.168.30.0/24
D) Network 192.168.130.0/24 is not allowed in the R1 table
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
20
Which configuration adds an IPv4 interface to an OSPFv3 process in OSPFv3 address family configuration?

A) router ospfv3 1 address-family ipv4
B) Router(config-router)#ospfv3 1 ipv4 area 0
C) Router(config-if)#ospfv3 1 ipv4 area 0
D) address-family ipv4 unicast
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
21
Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration? <strong>Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?  </strong> A) Add the aaa authentication login default none command to the global configuration. Add the aaa authentication login default none command to the global configuration. B) Replace the capital C with a lowercase c in the aaa authentication login Console local command. Replace the capital C with a lowercase c in the aaa authentication login Console local command. C) Add the aaa authentication login default group tacacs+ local-case command to the global configuration. aaa authentication login default group tacacs+ local-case D) Add the login authentication Console command to the line configuration login authentication Console command to the line configuration

A) Add the aaa authentication login default none command to the global configuration. Add the aaa authentication login default none command to the global configuration.
B) Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command. Replace the capital "C" with a lowercase "c" in the aaa authentication login Console local command.
C) Add the aaa authentication login default group tacacs+ local-case command to the global configuration. aaa authentication login default group tacacs+ local-case
D) Add the login authentication Console command to the line configuration login authentication Console command to the line configuration
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
22
Refer to the exhibit. What does the imp-null tag represent in the MPLS VPN cloud? <strong>Refer to the exhibit. What does the imp-null tag represent in the MPLS VPN cloud?  </strong> A) Pop the label B) Impose the label C) Include the EXP bit D) Exclude the EXP bit

A) Pop the label
B) Impose the label
C) Include the EXP bit
D) Exclude the EXP bit
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
23
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?

A) NHRP
B) IPsec
C) MP-BGP
D) OSPF
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
24
<strong>  Refer to the exhibit. Why is the remote NetFlow server failing to receive the NetFlow data?</strong> A) The flow exporter is configured but is not used. B) The flow monitor is applied in the wrong direction. C) The flow monitor is applied to the wrong interface. D) The destination of the flow exporter is not reachable. Refer to the exhibit. Why is the remote NetFlow server failing to receive the NetFlow data?

A) The flow exporter is configured but is not used.
B) The flow monitor is applied in the wrong direction.
C) The flow monitor is applied to the wrong interface.
D) The destination of the flow exporter is not reachable.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
25
Which transport layer protocol is used to form LDP sessions?

A) UDP
B) SCTP
C) TCP
D) RDP
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
26
Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources? <strong>Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?  </strong> A) Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool B) Configure the DHCP lease time to a smaller value C) Configure the DHCP lease time to a bigger value D) Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool

A) Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool
B) Configure the DHCP lease time to a smaller value
C) Configure the DHCP lease time to a bigger value
D) Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool Add the network 192.168.2.0 255.255.255.0 command to the DHCP pool
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
27
An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?

A) sudo maglev-config update
B) sudo maglev install config update
C) sudo maglev reinstall
D) sudo update config install
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
28
While troubleshooting connectivity issues to a router, these details are noticed: Standard pings to all router interfaces, including loopbacks, are successful. Data traffic is unaffected. SNMP connectivity is intermittent. SSH is either slow or disconnects frequently. Which command must be configured first to troubleshoot this issue?

A) show policy-map control-plane
B) show policy-map
C) show interface | inc drop
D) show ip route
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
29
Refer to the exhibit. ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration? <strong>Refer to the exhibit. ISP 1 and ISP 2 directly connect to the Internet. A customer is tracking both ISP links to achieve redundancy and cannot see the Cisco IOS IP SLA tracking output on the router console. Which command is missing from the IP SLA configuration?  </strong> A) Start-time 00:00 B) Start-time 0 C) Start-time immediately D) Start-time now

A) Start-time 00:00
B) Start-time 0
C) Start-time immediately
D) Start-time now
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
30
Refer to the exhibit. Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue? <strong>Refer to the exhibit. Users in the branch network of 2001:db8:0:4::/64 report that they cannot access the Internet. Which command is issued in IPv6 router EIGRP 100 configuration mode to solve this issue?  </strong> A) Issue the eigrp stub command on R1. Issue the eigrp stub command on R1. B) Issue the no eigrp stub command on R1. no eigrp stub C) Issue the eigrp stub command on R2. command on R2. D) Issue the no eigrp stub command on R2.

A) Issue the eigrp stub command on R1. Issue the eigrp stub command on R1.
B) Issue the no eigrp stub command on R1. no eigrp stub
C) Issue the eigrp stub command on R2. command on R2.
D) Issue the no eigrp stub command on R2.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
31
Which list defines the contents of an MPLS label?

A) 20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL
B) 32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL
C) 20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit
D) 32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
32
Which statement about route distinguishers in an MPLS network is true?

A) Route distinguishers allow multiple instances of a routing table to coexist within the edge router.
B) Route distinguishers are used for label bindings.
C) Route distinguishers make a unique VPNv4 address across the MPLS network.
D) Route distinguishers define which prefixes are imported and exported on the edge router.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
33
Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2? <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)

A) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)
B) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)
C) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)
D) <strong>Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?  </strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
34
<strong>  Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?</strong> A) permit tcp port 443 B) permit udp port 465 C) permit tcp port 465 D) permit tcp port 22 Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?

A) permit tcp port 443
B) permit udp port 465
C) permit tcp port 465
D) permit tcp port 22
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
35
While working with software images, an engineer observes that Cisco DNA Center cannot upload its software image directly from the device. Why is the image not uploading?

A) The device must be resynced to Cisco DNA Center.
B) The software image for the device is in install mode.
C) The device has lost connectivity to Cisco DNA Center.
D) The software image for the device is in bundle mode
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
36
Which statement about MPLS LDP router ID is true?

A) If not configured, the operational physical interface is chosen as the router ID even if a loopback is configured.
B) The loopback with the highest IP address is selected as the router ID.
C) The MPLS LDP router ID must match the IGP router ID.
D) The force keyword changes the router ID to the specified address without causing any impact. The force keyword changes the router ID to the specified address without causing any impact.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
37
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)

A) Copy the file to the destination router with the copy tftp: flash: command Copy the file to the destination router with the copy tftp: flash: command
B) Enable the TFTP server on the source router with the tftp-server flash: command Enable the TFTP server on the source router with the tftp-server flash:
C) TFTP is not supported in recent IOS versions, so an alternative method must be used
D) Configure a user on the source router with the username tftp password tftp command Configure a user on the source router with the username tftp password tftp
E) Configure the TFTP authentication on the source router with the tftp-server authentication local command Configure the TFTP authentication on the source router with the tftp-server authentication local
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
38
<strong>  Refer to the exhibit. Why is user authentication being rejected?</strong> A) The TACACS+ server expects user, but the NT client sends domain / user. B) The TACACS+ server refuses the user because the user is set up for CHAP. C) The TACACS+ server is down, and the user is in the local database. D) The TACACS+ server is down, and the user is not in the local database. Refer to the exhibit. Why is user authentication being rejected?

A) The TACACS+ server expects "user", but the NT client sends "domain / user".
B) The TACACS+ server refuses the user because the user is set up for CHAP.
C) The TACACS+ server is down, and the user is in the local database.
D) The TACACS+ server is down, and the user is not in the local database.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
39
Which statement about IPv6 RA Guard is true?

A) It does not offer protection in environments where IPv6 traffic is tunneled.
B) It cannot be configured on a switch port interface in the ingress direction.
C) Packets that are dropped by IPv6 RA Guard cannot be spanned.
D) It is not supported in hardware when TCAM is programmed.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
40
Which statement about IPv6 ND inspection is true?

A) It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.
B) It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.
C) It learns and secures bindings for stateful autoconfiguration addresses in Layer 3 neighbor tables.
D) It learns and secures bindings for stateful autoconfiguration addresses in Layer 2 neighbor tables.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
41
<strong>  Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?</strong> A) policy-map SHAPE_BGP B) policy-map LIMIT_BGP C) policy-map POLICE_BGP D) policy-map COPP Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?

A) policy-map SHAPE_BGP
B) policy-map LIMIT_BGP
C) policy-map POLICE_BGP
D) policy-map COPP
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
42
Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router? <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)

A) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)
B) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)
C) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)
D) <strong>Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?  </strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
43
<strong>  Refer to the exhibit. A router is receiving BGP routing updates from multiple neighbors for routes in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?</strong> A) The local preference value in another neighbor statement is higher than 250. B) The local preference value should be set to the same value as the weight in the route map. C) The route map is applied in the wrong direction. D) The weight value in another neighbor statement is higher than 200. Refer to the exhibit. A router is receiving BGP routing updates from multiple neighbors for routes in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

A) The local preference value in another neighbor statement is higher than 250.
B) The local preference value should be set to the same value as the weight in the route map.
C) The route map is applied in the wrong direction.
D) The weight value in another neighbor statement is higher than 200.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
44
When provisioning a device in Cisco DNA Center, the engineer sees the error message "Cannot select the device. Not compatible with template". What is the reason for the error?

A) The template has an incorrect configuration.
B) The software version of the template is different from the software version of the device.
C) The changes to the template were not committed.
D) The tag that was used to filter the templates does not match the device tag.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
45
<strong>  Refer to the exhibit. Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)</strong> A) Configure SNMP rw permission in addition to community ciscotest. Configure SNMP rw permission in addition to community ciscotest. B) Modify access list 1 and allow operations subnet in the access list. C) Modify access list 1 and allow SNMP in the access list. D) Configure SNMP rw permission in addition to version 1. permission in addition to version 1. E) Configure SNMP rw permission in addition to community ciscotest 1. permission in addition to community ciscotest 1. Refer to the exhibit. Network operations cannot read or write any configuration on the device with this configuration from the operations subnet. Which two configurations fix the issue? (Choose two.)

A) Configure SNMP rw permission in addition to community ciscotest. Configure SNMP rw permission in addition to community ciscotest.
B) Modify access list 1 and allow operations subnet in the access list.
C) Modify access list 1 and allow SNMP in the access list.
D) Configure SNMP rw permission in addition to version 1. permission in addition to version 1.
E) Configure SNMP rw permission in addition to community ciscotest 1. permission in addition to community ciscotest 1.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
46
Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop? <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)

A) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
B) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
C) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
D) <strong>Refer to the exhibits. The output of the trace route from R5 shows a loop in the network. Which configuration prevents this loop?  </strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
47
<strong>  Refer to the exhibits. Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two commands are missing? (Choose two.)</strong> A) The ip nhrp redirect command is missing on the spoke routers. The ip nhrp redirect command is missing on the spoke routers. B) The ip nhrp shortcut command is missing on the spoke routers. ip nhrp shortcut C) The ip nhrp redirect command is missing on the hub router. ip nhrp redirect command is missing on the hub router. D) The ip nhrp shortcut command is missing on the hub router. ip nhrp shortcut E) The ip nhrp map command is missing on the hub router. ip nhrp map command is missing on the hub router. Refer to the exhibits. Phase-3 tunnels cannot be established between spoke-to-spoke in DMVPN. Which two commands are missing? (Choose two.)

A) The ip nhrp redirect command is missing on the spoke routers. The ip nhrp redirect command is missing on the spoke routers.
B) The ip nhrp shortcut command is missing on the spoke routers. ip nhrp shortcut
C) The ip nhrp redirect command is missing on the hub router. ip nhrp redirect command is missing on the hub router.
D) The ip nhrp shortcut command is missing on the hub router. ip nhrp shortcut
E) The ip nhrp map command is missing on the hub router. ip nhrp map command is missing on the hub router.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
48
Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error? <strong>Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?  </strong> A) An authentication error with the NTP server results in an incorrect timestamp. B) The keyword localtime is not defined on the timestamp service command. The keyword localtime is not defined on the timestamp service command. C) The NTP server is in a different time zone. D) The system clock is set incorrectly to summer-time hours.

A) An authentication error with the NTP server results in an incorrect timestamp.
B) The keyword localtime is not defined on the timestamp service command. The keyword localtime is not defined on the timestamp service command.
C) The NTP server is in a different time zone.
D) The system clock is set incorrectly to summer-time hours.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
49
<strong>  Refer to the exhibit. A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log messages stream, it is impossible to capture the problem. Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two.)</strong> A) debug condition ospf neighbor B) debug condition interface C) debug condition session-id ADJCHG D) debug condition all Refer to the exhibit. A network administrator is troubleshooting OSPF adjacency issue by going through the console logs in the router, but due to an overwhelming log messages stream, it is impossible to capture the problem. Which two commands reduce console log messages to relevant OSPF neighbor problem details so that the issue can be resolved? (Choose two.)

A) debug condition ospf neighbor
B) debug condition interface
C) debug condition session-id ADJCHG
D) debug condition all
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
50
<strong>  Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?</strong> A) 10.2.2.0/24 B) 10.1.4.0/26 C) 10.1.2.0/24 D) 10.2.3.0/26 Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?

A) 10.2.2.0/24
B) 10.1.4.0/26
C) 10.1.2.0/24
D) 10.2.3.0/26
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
51
Which configuration enables the VRF that is labeled "Inet" on FastEthernet0/0?

A) R1(config)# ip vrf Inet R1(config-vrf)#ip vrf FastEthernet0/0
B) R1(config)#ip vrf Inet FastEthernet0/0
C) R1(config-vrf)#interface FastEthernet0/0 R1(config-if)#ip vrf forwarding Inet
D) R1(config)#router ospf 1 vrf Inet R1(config-router)#ip vrf forwarding FastEthernet0/0
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
52
<strong>  Refer to the exhibit. An engineer is trying to redistribute OSPF to BGP, but not all of the routes are redistributed. What is the reason for this issue?</strong> A) By default, only internal routes and external type 1 routes are redistributed into BGP B) Only classful networks are redistributed from OSPF to BGP C) BGP convergence is slow, so the route will eventually be present in the BGP table D) By default, only internal OSPF routes are redistributed into BGP Refer to the exhibit. An engineer is trying to redistribute OSPF to BGP, but not all of the routes are redistributed. What is the reason for this issue?

A) By default, only internal routes and external type 1 routes are redistributed into BGP
B) Only classful networks are redistributed from OSPF to BGP
C) BGP convergence is slow, so the route will eventually be present in the BGP table
D) By default, only internal OSPF routes are redistributed into BGP
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
53
<strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   Refer to the exhibit. The R1 and R2 configurations are: <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

A) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)
B) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)
C) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)
D) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)
E) <strong>  Refer to the exhibit. The R1 and R2 configurations are:   The neighbor relationship is not coming up. Which two sets of configurations bring the neighbors up? (Choose two.)</strong> A)   B)   C)   D)   E)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
54
Which command displays the IP routing table information that is associated with VRF-Lite?

A) show ip vrf
B) show ip route vrf
C) show run vrf
D) show ip protocols vrf
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
55
A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the clock on the device?

A) service timestamps log uptime
B) clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00
C) service timestamps log datetime localtime show-timezone
D) clock calendar-valid
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
56
<strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)   Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?

A) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)
B) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)
C) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)
D) <strong>  Refer to the exhibit. The network administrator configured VRF lite for customer A. The technician at the remote site misconfigured VRF on the router. Which configuration will resolve connectivity for both sites of customer_a ?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
57
What are two functions of IPv6 Source Guard? (Choose two.)

A) It works independent from IPv6 neighbor discovery.
B) It denies traffic from unknown sources or unallocated addresses.
C) It uses the populated binding table for allowing legitimate traffic.
D) It denies traffic by inspecting neighbor discovery packets for specific patterns.
E) It blocks certain traffic by inspecting DHCP packets for specific sources.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
58
<strong>  Refer to the exhibit. An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?</strong> A) Configure the service timestamps log uptime command in global configuration mode. Configure the service timestamps log uptime command in global configuration mode. B) Configure the logging clock synchronize command in global configuration mode. logging clock synchronize C) Configure the service timestamps log datetime localtime command in global configuration mode. service timestamps log datetime localtime D) Make sure that the clock on the device is synchronized with an NTP server. Refer to the exhibit. An engineer is troubleshooting BGP on a device but discovers that the clock on the device does not correspond to the time stamp of the log entries. Which action ensures consistency between the two times?

A) Configure the service timestamps log uptime command in global configuration mode. Configure the service timestamps log uptime command in global configuration mode.
B) Configure the logging clock synchronize command in global configuration mode. logging clock synchronize
C) Configure the service timestamps log datetime localtime command in global configuration mode. service timestamps log datetime localtime
D) Make sure that the clock on the device is synchronized with an NTP server.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
59
Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64? <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)

A) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)
B) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)
C) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)
D) <strong>Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?  </strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
60
Refer to the exhibit. An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device? <strong>Refer to the exhibit. An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?  </strong> A) no ip ssh disable B) ip ssh enable C) ip ssh version 2 D) crypto key generate rsa

A) no ip ssh disable
B) ip ssh enable
C) ip ssh version 2
D) crypto key generate rsa
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
61
<strong>  Refer to the exhibit. BGP is flapping after the CoPP policy is applied. What are the two solutions to fix the issue? (Choose two.)</strong> A) Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . B) Configure a higher value for CIR under the default class to allow more packets during peak traffic. C) Configure BGP in the COPP-CRITICAL-7600 ACL. Configure BGP in the COPP-CRITICAL-7600 ACL. D) Configure IP CEF for CoPP policy and BGP to work. E) Configure a three-color policer instead of two-color policer under Class COPP-CRITICAL-7600 . Configure a three-color policer instead of two-color policer under Refer to the exhibit. BGP is flapping after the CoPP policy is applied. What are the two solutions to fix the issue? (Choose two.)

A) Configure a higher value for CIR under the Class COPP-CRITICAL-7600 . Configure a higher value for CIR under the Class COPP-CRITICAL-7600 .
B) Configure a higher value for CIR under the default class to allow more packets during peak traffic.
C) Configure BGP in the COPP-CRITICAL-7600 ACL. Configure BGP in the COPP-CRITICAL-7600 ACL.
D) Configure IP CEF for CoPP policy and BGP to work.
E) Configure a three-color policer instead of two-color policer under Class COPP-CRITICAL-7600 . Configure a three-color policer instead of two-color policer under
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
62
An engineer is configuring a network and needs packets to be forwarded to an interface for any destination address that is not in the routing table. What should be configured to accomplish this task?

A) set ip next-hop
B) set ip default next-hop
C) set ip next-hop recursive
D) set ip next-hop verify-availability
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
63
<strong>  Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?</strong> A) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP. B) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to allow when redistributing OSPF into EIGRP. C) Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain. D) Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF. Refer to the exhibit. A network administrator configured mutual redistribution on R1 and R2 routers, which caused instability in the network. Which action resolves the issue?

A) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to deny when redistributing OSPF into EIGRP.
B) Set a tag in the route map when redistributing EIGRP into OSPF on R1, and match the same tag on R2 to allow when redistributing OSPF into EIGRP.
C) Apply a prefix list of EIGRP network routes in OSPF domain on R1 to propagate back into the EIGRP routing domain.
D) Advertise summary routes of EIGRP to OSPF and deny specific EIGRP routes when redistributing into OSPF.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
64
<strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)   Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)
B) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)
C) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)
D) <strong>  Refer to the exhibit. A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there is still a backup link over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
65
An engineer needs dynamic routing between two routers and is unable to establish OSPF adjacency. The output of the show ip ospf neighbor command shows that the neighbor state is EXSTART/EXCHANGE. Which action should be taken to resolve this issue?

A) match the passwords
B) match the hello timers
C) match the MTUs
D) match the network types
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
66
<strong>  Refer to the exhibit. An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?</strong> A) Use the icmp-echo command to track both default routes. B) Use the same AD for both default routes. C) Start IP SLA by matching numbers for track and ip sla commands. D) Start IP SLA by defining frequency and scheduling it. Refer to the exhibit. An engineer is monitoring reachability of the configured default routes to ISP1 and ISP2. The default route from ISP1 is preferred if available. How is this issue resolved?

A) Use the icmp-echo command to track both default routes.
B) Use the same AD for both default routes.
C) Start IP SLA by matching numbers for track and ip sla commands.
D) Start IP SLA by defining frequency and scheduling it.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
67
<strong>  Refer to the exhibit. Which action resolves intermittent connectivity observed with the SNMP trap rackets?</strong> A) Decrease the committed burst size of the mgmt class map. B) Increase the CIR of the mgmt class map. C) Add one new entry in the ACL 120 to permit the UDP port 161. D) Add a new class map to match TCP traffic. Refer to the exhibit. Which action resolves intermittent connectivity observed with the SNMP trap rackets?

A) Decrease the committed burst size of the mgmt class map.
B) Increase the CIR of the mgmt class map.
C) Add one new entry in the ACL 120 to permit the UDP port 161.
D) Add a new class map to match TCP traffic.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
68
What is an advantage of using BFD?

A) It detects local link failure at layer 1 and updates the routing table.
B) It detects local link failure at layer 3 and updates the routing protocols.
C) It has sub-second failure detection for layer 1 and layer 3 problems.
D) It has sub-second failure detection for layer 1 and layer 2 problems.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
69
<strong>  Refer to the exhibit. A network administrator wants to block all traffic toward the Internet after business hours and on weekends. When the administrator applies an access list on interface Gi0/1, all traffic is blocked and there is no access to the Internet at any time. Which action resolves the issue?</strong> A) Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. B) Add the permit ip any any statement after the deny icmp any any time-range no-conn command in the access list. permit ip any any deny icmp any any time-range no-conn command in the access list. C) Add the permit allowed time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. Add the permit allowed time-range no-conn statement after the D) Add the permit ip any any time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. Refer to the exhibit. A network administrator wants to block all traffic toward the Internet after business hours and on weekends. When the administrator applies an access list on interface Gi0/1, all traffic is blocked and there is no access to the Internet at any time. Which action resolves the issue?

A) Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list. Add the permit ip any any time-range no-conn statement after the deny udp any any time-range no-conn command in the access list.
B) Add the permit ip any any statement after the deny icmp any any time-range no-conn command in the access list. permit ip any any deny icmp any any time-range no-conn command in the access list.
C) Add the permit allowed time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list. Add the permit allowed time-range no-conn statement after the
D) Add the permit ip any any time-range no-conn statement after the deny icmp any any time-range no-conn command in the access list.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
70
<strong>  Refer to the exhibit. R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?</strong> A) Fix route dampening configured on the router. B) Replace the SFP module because it is not supported. C) Fix IP Event Dampening configured on the interface. D) Correct the IP SLA probe that failed. Refer to the exhibit. R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?

A) Fix route dampening configured on the router.
B) Replace the SFP module because it is not supported.
C) Fix IP Event Dampening configured on the interface.
D) Correct the IP SLA probe that failed.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
71
<strong>  Refer to the exhibit. An IT staff member comes into the office during normal office hours and cannot access devices through SSH. Which action should be taken to resolve this issue?</strong> A) Modify the access list to use the correct IP address. B) Configure the correct time range. C) Modify the access list to correct the subnet mask. D) Configure the access list in the outbound direction. Refer to the exhibit. An IT staff member comes into the office during normal office hours and cannot access devices through SSH. Which action should be taken to resolve this issue?

A) Modify the access list to use the correct IP address.
B) Configure the correct time range.
C) Modify the access list to correct the subnet mask.
D) Configure the access list in the outbound direction.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
72
What are two functions of LDP? (Choose two.)

A) It advertises labels per Forwarding Equivalence Class.
B) It uses Forwarding Equivalence Class.
C) It is defined in RFC 3038 and 3039.
D) It requires MPLS Traffic Engineering.
E) It must use Resource Reservation Protocol.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
73
<strong>  Refer to the exhibit. A client is concerned that passwords are visible when running this show archive log config all . Which router configuration is needed to resolve this issue?</strong> A) MASS-RTR(config)# aaa authentication arap MASS-RTR(config)# aaa authentication arap B) MASS-RTR(config-archive-log-cfg)# password encryption aes MASS-RTR(config-archive-log-cfg)# password encryption aes C) MASS-RTR(config)# service password-encryption service password-encryption D) MASS-RTR(config-archive-log-cfg)# hidekeys hidekeys Refer to the exhibit. A client is concerned that passwords are visible when running this show archive log config all . Which router configuration is needed to resolve this issue?

A) MASS-RTR(config)# aaa authentication arap MASS-RTR(config)# aaa authentication arap
B) MASS-RTR(config-archive-log-cfg)# password encryption aes MASS-RTR(config-archive-log-cfg)# password encryption aes
C) MASS-RTR(config)# service password-encryption service password-encryption
D) MASS-RTR(config-archive-log-cfg)# hidekeys hidekeys
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
74
What does the PE router convert the IPv4 prefix to within an MPLS VPN?

A) eBGP path association between the PE and CE sessions
B) prefix that combines the ASN, PE router-id, and IP prefix
C) 48-bit route combining the IP and PE router-id
D) VPN-IPv4 prefix combined with the 64-bit route distinguisher
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
75
An engineer configured access list NON-CISCO in a policy to influence routes. <strong>An engineer configured access list NON-CISCO in a policy to influence routes.   What are the two effects of this route map configuration? (Choose two.)</strong> A) Packets are forwarded using normal route lookup. B) Packets are forwarded to the default gateway. C) Packets are dropped by the access list. D) Packets are evaluated by sequence 10. E) Packets are not evaluated by sequence 10. What are the two effects of this route map configuration? (Choose two.)

A) Packets are forwarded using normal route lookup.
B) Packets are forwarded to the default gateway.
C) Packets are dropped by the access list.
D) Packets are evaluated by sequence 10.
E) Packets are not evaluated by sequence 10.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
76
An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME, WRONGDIGEST". Which action resolves the issue?

A) Configure the correct authentication password using SNMPv3 authNoPriv.
B) Configure correct authentication and privacy passwords using SNMPv3 authPriv.
C) Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.
D) Configure the correct authentication password using SNMPv3 authPriv.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
77
<strong>  Refer to the exhibit. An engineer wanted to set a tag of 30 to route 10.1.80.65/32 but it failed. How is the issue fixed?</strong> A) Modify route-map ospf-to-eigrp permit10 and match prefix-list ccnp2. B) Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32. C) Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24. D) Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2. Refer to the exhibit. An engineer wanted to set a tag of 30 to route 10.1.80.65/32 but it failed. How is the issue fixed?

A) Modify route-map ospf-to-eigrp permit10 and match prefix-list ccnp2.
B) Modify prefix-list ccnp3 to add 10.1.64.0/20 ge 32.
C) Modify prefix-list ccnp3 to add 10.1.64.0/20 le 24.
D) Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
78
<strong>    Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?</strong> A) Change the administrative distance of the external EIGRP to 90. B) Apply the outbound distribution list on R5 toward R4 in OSPF. C) Change the administrative distance of OSPF to 200 on R5. D) Redistribute OSPF into EIGRP on R4. <strong>    Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?</strong> A) Change the administrative distance of the external EIGRP to 90. B) Apply the outbound distribution list on R5 toward R4 in OSPF. C) Change the administrative distance of OSPF to 200 on R5. D) Redistribute OSPF into EIGRP on R4. Refer to the exhibits. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?

A) Change the administrative distance of the external EIGRP to 90.
B) Apply the outbound distribution list on R5 toward R4 in OSPF.
C) Change the administrative distance of OSPF to 200 on R5.
D) Redistribute OSPF into EIGRP on R4.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
79
Which protocol does MPLS use to support traffic engineering?

A) Tag Distribution Protocol (TDP)
B) Resource Reservation Protocol (RSVP)
C) Label Distribution Protocol (LDP)
D) Border Gateway Protocol (BGP)
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
80
How are MPLS Layer 3 VPN services deployed?

A) The RD and RT values must match under the VRF.
B) The import and export RT values under a VRF must always be the same.
C) The label switch path must be available between the local and remote PE routers.
D) The RD and RT values under a VRF must match on the remote PE router.
Unlock Deck
Unlock for access to all 114 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 114 flashcards in this deck.