Beruflich Dokumente
Kultur Dokumente
a. Tunnel connectivity.
b. Irrelevant
c. Irrelevant
d. The NHRP.
Answer: A
2-GRE Tunnel cant form tunnel over WAN between to sites, why?
A: Firewall/Router ACL blocks TCP Port 57
B: Firewall/Router ACL blocks IP Protocol 57
C: Firewall/Router ACL blocks UDP Port 47
D: Firewall/Router ACL blocks IP Protocol 47
Answer:D
3-routers are connected and use the VRF, later on the new Lo address is added to one router but is not
able to see the rest of interfaces, what should the fix the issue (2 answers)
A. add static route to vrf
B. add Lo into the VRF
C. add dynamic routing between them
D. and other options
Answer:A,B
4-BGP ASN 64xxx. Which answer is correct?
A: Private AS 2-byte
B: Private AS 4-byte
C: Public AS 2-byte
D: Private AS 4-byte
PRIVATE: 64,512 to 65,534
PUPBLIC: 1
to 64495
2-byre
5-Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was
configured, but the tunnel is not coming up.
What did the TAC engineer configure incorrectly?
A. The crypto isakmp configuration is not correct.
B. The crypto map configuration is not correct.
C. The interface tunnel configuration is not correct.
D. The network configuration is not correct; network 172.16.1.0 is missing
Answer:A
http://www.digitaltut.com/ipsec-and-gre
Answer:D
7-When the CEF will receive the packet without FIB
a) will drop the packet
b) will find the same in the FIB table
c) will create new FIB
d) will forward it
Answer:A
8-DHCP client isn not able to reach the DHCP server and the issue should be fixed by adding the ip
helper on the Fa interface of the router connected to DHCP client
a) ip helper with the ip address of the DHCP server
b) ip helper with the ip address of the DHCP client
c) and two other options
Answer:A
9-A network engineer enters the command debug condition interface. Under which conditions will
the engineer see the debug output?
a) When the command logging buffer has been entered
b) When the interface is up and receives traffic
c) When the interface is down and receive traffic
d) When the interface is up and receives traffic on the main and subinterfaces
Answer:B
10-Company was subject to a DDoS Attack from IPv4 and IPv6 Addresses. What can you use to
INDENTIFY AN IPV6 HEADER, in order to mitigate future attacks on the network?a) Source Address
a) Destination Address
b) Source Address
c) Fragment Offset
d) Flow Label
e) Hop Limit
f) Traffic Class
Answer: D,E,F
11-What is the reason for using NTPv6?
a) IPv6 to IPv6 network prefix translation
b) IPv4 to IPv6 network address translation
c) Irrelevant
d) Irrelevant
Answer:A
12-You have NAT translation that is incorrect but when you try to remove you get error message in use
how do you remove select least impact?
a) Cant recall
b) Reload router
c) Clear IP NAT table
d) Clear IP NAT translation
Answer:D
Answer:C
Answer:A
15-According to the output showing below what is the IPV6 summarization will be?
The four routes was as I remember :
2001:db8:0:7
2001:db8:0:8
2001:db8:0:9
Answer:C
16-There was a screenshot with config and a question like what is true.
ip sla XXX
udp-jitter 172.29.139.134 dest-port 5000 num-packets 20
frequency 30
!
ip sla schedule 99 life 300 start-time after 00:05:00
a) Start time after 5 hours ???
b) Send 20 packets with des-port 5000
c) Start time 12:05:00 AM
d)send 20 packets every 30 seconds
Answer:D
Answer:A,B,C
Answer:D
19-Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was
configured, but the tunnel is not coming up.
What did the TAC engineer configure incorrectly?
A. The crypto map is not configured correctly.
B. The crypto ACL is not configured correctly.
C. The crypto map is not applied to the correct interface.
D. The OSPF network is not configured correctly.
Answer:B
http://www.digitaltut.com/ipsec-and-gre
20- Question: Which has authentication and encryption:
a. Auth
b. No Auth
c. Priv
d. Secret
Answer:C
Answer:B
22-A route is being advertised by four routing protocols which one will added to routing table:
a-OSPF
b-EIGRP
c-IBGP
d-RIP
Answer:B
23-Refer to the exhibit.The network setup is running the RIP routing protocol. Which two events will
occur following link failure between R2 and R3?
A. R1 will reply to R2 with the advertisement for network 192.168.2.0/27 with hop count of 16.
B. R2 will not send any advertisements and will remove route 192.168.2.0/27 from its routing table.
C. After communication fails and after hold-down timer expires, R1 will remove the 192.168.2.0/27 route from its
routing table.
D. R3 will not accept any further updates from R2, due to the dplit-horizon loop prevention mechanism.
E. R2 will advertise network 192.168.2.0/27 will a hop count of 16 to R1.
Answer:A,E
24-Which VPN tech use aaa for group policies, authorization and also can use xauth ?
(Choose 1
a) GREVPN
b) Cisco Easy VPN
c) DMVPN
d) cant remember (but was nonsense)
Answer:B
25-What 3 items can you monitor if you use IP SLA with 2 timestamps
(choose 3)
a) path
b) jitter
c) throughput
d) load
e) packet loss
f) delay
Answer:B,E,F
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/44sg/configuration/guide/Wrapper44SG/swipsla.html
Answers:A,B
I remember that the pool was like below structure (stateless DHCPV6)
27-Which traffic characteristic has a UDP Packet which contains voice and video traffic which is going
direct to the queue on a link with less than 768Kbit?
a) is fragmentet
b) is not fragmentet
c) somewhat
d) video are delayed (not exact so in exam)
e) somewhat
Answer:A
this link may help
No7 under QOS REQUIREMENTS IN THE WAN
http://www.cisco.com/en/US/technologies/tk543/tk879/technologies_white_paper0900aecd800a8561_ps6613_Pro
ducts_White_Paper.html
Answer:A
======================================
Not complete questions