Beruflich Dokumente
Kultur Dokumente
August 2019
Question 1
Refer to the exhibit. Your network uses an MPLS VPN backbone with OSPF routing between all
PE and CE routers and one the 10Mb backup links between the CE routers.
You notice that data between CE1 and CE3 is flowing over the backup links instead of the
higher bandwidth MPLS VPN backbone even when the backbone is up.
Answer: D
Question 2
Refer to the exhibit
The Main 1 and Branch 1 switches are connected directly over an MPLS pseudowire, and both
run UDLD. After router B1 reloads because of a power failure, the pseudowire. However the
Branch 1 switch is unable to reach the Main 1 switch. Which two actions can you take to
restore connectivity and problem from recurring? (Choose two)
B. Issue the shutdown and no shutdown commands on the Branch 1 switch uplink to the B1 router
only.
C. Configure a backup GRE tunnel between the Main I and Branch 1 switches.
D. Issue the shutdown and no shutdown commands on both the Branch 1 switch uplink to the B1
Answer: B,E
Question 3
Which two statements about 6PE are true? (Choose two.)
C. iBGP peering between the PE routers should be done using an IPv6 address.
Answer: B, D
Question 4
Which tunneling method can transmit IPv6 traffic over an MPLS infrastructure?
A. 6PE
B. 6to4
C. ISATAP
D. 6RD
Answer: A
Question 5
Which command can you enter to prevent a router from displaying Telnet
connection messages on the terminal? ( hostname / ip variants )
A. service telnet-zeroidle
D. no ip domain-lookup
E. ip telnet quiet
Answer: E
Question 6
Refer to the exhibit.
What conclusion can you draw from the given ping output?
A. The ping operation sent packets ranging from 505 to 1500 bytes in size.
B. The packet life was exceeded in 5 percent of the operations.
C. The Verbose option was set in the IP header.
D. Fragmentation failed during the ping operation.
Answer: D
Question 7
Answer: B [ C corrected ]
Question 8
What are IPv6 addresses of the form FC00::/7 known as?
C. link-local addresses
D. multicast RP addresses
Answer: A
Question 9
Which two statements about PfR are true? (Choose two.)
Answer: A E [ A C Corrected ]
Question 10
Which command sequence will configure an auto IP SLA scheduler that starts at
12:45AM onJanuary 1,ends after 1hour of inactivity, and repeats every 3 hours for
one week?
A. ip sla auto schedule Jan1 start-time 00:45 jan 1 frequency 360 life forever porbe-
interval
43200
B. ip sla schedule Jan1 start-time 12:45 jan 1 frequency 60 life 10800 porbe-interval
43200
C. ip sla schedule Jan1 start-time 00:45 jan 1 frequency 360 life 10800 porbe-interval
10800
D. ip sla schedule Jan1 start-time 12:45 jan 1 ageout 360 life 604800 porbe-interval
43200
E. ip sla auto schedule Jan1 start-time 00:45 jan 1 ageout 360 life 604800 porbe-interval
10800
Answer: E
Question 11
Which statement describes the operation of the Generalized TTL Security
Mechanism
A. An MD5 hash of the received TTL, source IP, destination IP, protocol , and shared key
must match
D. Both end systems compute an MD5 hash based on the TTL and a shared secret. If the
received and
Answer: C
Question 12
Which two statements about private VLAN communications are true? (Choose two)
Answer: A,C
Question 13
Which 1Pv6 solution provides network information to clients without providing an 1Pv6
host address?
A. autoconfiguration
B. stateless DHCPv6
C. stateful DHCPv6
D. prefix delegation
Answer: A
Question 14
Question about the difference between RSPAN and SPAN.
A. Monitor port
B. access port
C. forwarding Port
D. destination port
Answer: A
Question 15
Drag and drop each PHB on the left to the functionality it performs on the right.
Answer
Question 16
Which two statements about CoPP are true? (Choose two)
A. When a deny rule in an access list is used for MQC is matched, classification continues
on the next class
C. Access lists that are used with MQC policies for CoPP should omit the log and log-
input keywords
D. The mls qos command disables hardware acceleration so that CoPP handles all QoS
E. Access lists that use the log keyword can provide information about the device’s CPU
usage
Answer: A C
Question 17
Which two statements about PIM snooping are true? (Choose two)
B.Prune messages are forwarded to the router listed in the message payload
E.Traffic for groups operating in dense mode is forwarded to the downstream routers
Answer: A, B
Question 18
Ping and Traceroute extended options are very useful. What is the difference
between using the Record option with the ping command vs. the traceroute
command?
C. When leveraged with the ping command, the Record option of this command not
only informs you of the hops that the echo request (ping) went through to get the
destination, but is also informs you of the hops it visited on the return path
D. When leveraged with the traceroute command, the Record option of this command
not only informs you of the hops that the echo request (ping) went through to get the
destination, but is also informs you of the hops it visited on the return path
Answer: C
Question 19
Which two statements about a flat single-hub DMVPN with NHRP are
true?(choose two)
B. NHRP dynamically provides informatlon about the spoke routers to the hub
D. The hub muter uses NHRP to initiate the GRE tunnel with spokes
Answer: A,B
Question 20
In a DMVPN solution, which component can the GRE tunnel source and
destination generate automatically?
A. policy maps
B. QoS markings
C. pre-shared keys
D. crypto ACLs
Answer: D
Question 21
Which two statements about VRF-lite are true? (Choose two)
Answer: A,B
Question 22
If a Layer 3 switch running OSPF in a VRF-lite configuration reports this error,
which action can you take to correct the problem?
C. Upgrade the Layer 3 switch to a model that can support more routes.
D. Configure the control plane with a larger memory allocation to support the Cisco
Express Forwarding Information Base.
Question 23
Which routing protocol is not supported with VRF-lite?
A. IS-IS
B. OSPF
C. EIGRP
D. BGP
Answer: A
Question 24
What are the two requirements for BGP to install a classful network into the BGP
routing table? (Choose two)
C. Auto-summary is enabled.
E. Synchronization is enabled.
F. Synchronization is disabled.
Answer: C,D
Question 25
Which technology uses MPLS to provide 1Pv6 connectivity o customers in the core
network without the need for dual stack?
A. 6to4
B. NAT64
C. NAT
D. SPE
Answer: D
Question 26
Which statement about NAT64 is true?
C. NAT64 provides address family translation and translates IPv4 to IPv6 and IPv6 to
IPv4.
D. NAT64 provides address family translation and can translate only IPv6 to IPv4.
Answer: D
Question 27
Which three values are used to generate a unique bridge ID for each VLAN in
PVST+? (Choose three.)
A . port cost
C . port priority
D . max age
E . extended system ID
F . switch priority
Answer: B, E, F
Question 28
You have been asked to connect a remote network with different DSCP mappings
to the primary network ofyour organization. How can you configure the network
devices so that the two networks worktogether seamlessly?
A. Configure the mls qos trust command on the trunk ports that internetwork two
networks
C. Configure an aggregate policewr on the ingres interfaces of the trunk ports that
interconnect the two networks
D. Configure a mutation map on the devices on the primary network that connect to the
network
Answer: A
Question 29
On a network with multiple VLANs, which three tasks must you perform to
configure IP source guard on VLAN 50 only?(choose three)
Question 30
While troubleshooting the failure of two devices to establish an IPSec tunnel, you
generated the given debug output on R2. What is the most likely reason the
tunnel failed?
Answer: C
Question 31
Which two statements about OSPF route filtering are true? (Choose two)
Answer: A,B
Question 32
The PC is experiencing intermittent connectivity failures to the internet. If ADSL-
R1 uses a PPPoE connection, what action can you take to correct the problem.
Answer: D
Question 33
If R1 and R2 cannot establish an EIGRP neighbor adjacency, which reason for the
problem is most likely true?
Answer: D
Question 34
Refer to the exhibit. Which statement is true?
B. The output shows an IPv6 multicast address that is used for unique local sources only.
C. The output shows an IPv6 multicast address that can be used for BIDIR-PIM only.
Answer D
Question 35
Which two effects of this configuration are true? (Choose two.)
Question 36
Which statement about the RPF interface in a BIDIR-PIM network is true?
A. In a BIDIR-PIM network the RPF interface can be the interface that is used reach the
PIM rendezvous or the interface that is used to reach the source.
B. In a BIDIR-PIM network the RPF interface is always the interface that is used to reach
the source.
D. In a BIDIR network the RPF interface is always the interface that is used to reach the
PIM rendezvous point.
Answer: D [ C Corrected ]
Question 37
What is the function of the command ip pim autorp listener?
A. It allows the mapping agents to accept autorp information from the PIM rendezvous
point.
B. It allows a BSR to accept autorp information and translate it into BSR messages.
D. It allows a border PIM spare-mode router to accept autorp information from another
autonomous system.
Answer: C
Question 38
Which statement about a type 4 LSA in OSPF is true? .
A. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a
route to the ABR.
B. It is an LSA that is originated by an ASBR, that is flooded throughout the area, and that describes
a route to ASBR
C. It is an LSA that is originated by an ASBR, that is flooded throughout the AS, and that describes a
route to the ASBR
D. It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a
route to the ASBR
E. It is an LSA that is originated by an ABR, that is flooded throughout the area, and that describes a
route to the ASBR
Answer: E
Question 39
Which prefix list matches and permits all RFC 1918 network 10.0.0.0 routes that have masks
of /16 through /24?
Question 40
Drag and drop the OSPF network type on the left to the correct category of timers on the
right.
Answer
Question 41
Which values does EIGRP use to determine the metric for a summary address?
Answer: C
Question 42
Which command can you enter to configure a Cisco router running OSPF to propagate the static
default route 0.0.0.0 0.0.0.0 172.31.15.1 within the OSPF process?
A. Default-information originate
B. Redistribute static
C. Redistribute static subnets
D. Redistribute static metric 1 subnets
Answer: A
Question 43
Which two conditions must be met by default to implement the BGP multipath feature? (Choose
two)
Answer: C, E
Question 44
Which two statements about OSPFv3 are true? (Choose two.)
Question 45
Which two statements about IPv6 6to4 tunnels are true? (Choose two)
Answer: C, D [ A B Corrected ]
Question 46
Which description correctly describes Git?
Answer: A
Question 47
One of your clients which is in the manufacture area, is after a solution in order to manage all his
fog nodes. Which management tools best suits his needs?
Answer: D [ B Corrected ]
Question 48
Which statement correctly describes Ansible operations and playbooks?
Answer: B
Question 49
Which three benefits of virtualizing the DMZ are true? (Choose three)
A. Orchestration
B. Usage-based consumption model
C. Service catalog
D. Dynamic and automated service insertion with focus on security
E. Analytics
F. Per-app network functions and operation
Answer: D, E, F
Question 50
Which three campus fabric nodes is SD-Access architecture are true? (Choose three)
Answer: B, C, F
Question 51
Which three connectivity models for vEdge Site Architecture are true? (Choose three)
A. Augmentation model
B. Hybrid with FallBack
C. Secure tunnel
D. Secure virtual connectivity
E. Cloud provider
F. Full SD-WAN
Answer: B, C, E
Question 52
Which three basics types of SD-WAN deployment are out on the market? (Choose three)
Answer: C, D, E
Question 53
Which three statements correctly describe the encoding used by NETCONF and RESTCONF?
(Choose three)
Question 54
Answer: B,E
Question 55
Which two statements about root guard and loop guard are true? (Choose two)
A. When loop guard is enabled, the port is transitional to the root-inconsistent state
B. Loop guard uses BPDU keepalives to determine unidirectional traffic
C. Root guard should be enabled on an upstream interface
D. Root guard disables an interface only when a superior BPDU is received
E. Loop guard uses its own keepalives to prevent loops by detecting failures
F. Loop guard uses its own keepalives to determine unidirectional traffic
Answer: B, D
Question 56
Drag and drop the BGP attributes on the left to the correct category on the right
Answer
Question 57
Which two statements about IPv4 and IPv6 networks are true? (Choose two.)
Answer: A, B
Question 58
Which two options are restrictions of BGP Outbound Route Filtering? (Choose two.)
Question 59
Which DHCP message type does the DHCP server send to a client to confirm its allocated IP
address?
A. DHCPDISCOVER
B. DHCPOFFER
C. DHCPACK
D. DHCPREQUEST
Answer: C
Question 60
Which two statements about native VLANs are true? (Choose two)
Question 61
Which tunneling method can transmit IPv6 traffic over an MPLS infrastructure?
A. 6PE
B. 6to4
C. ISATAP
D. 6RD
Answer: A
Question 62
Refer to the exhibit. Provided that routing is configured correctly, what command can a user on
R1 enter to telnet to R2? [ This question is different in the exam , please help update ]
Answer: B
Question 63
Drag each NTP command on the left to its effect on the right
Answer
Question 64
Company A has two remote sites, which are connected to a common ISP by BGP. At each site,
Company A is using the same autonomous system number. Which BGP feature can you
implement to enable routing between the two sites?
A. communities
B. allowas-in
C. AS path prepending
D. Peer groups
Answer: B
Question 65
Which IPv4 feature can limit indiscriminate flooding of multicast traffic on a VLAN?
A. PIM snooping
B. IGMP snooping
C. IGMP filtering
D. MLD Filtering
Answer: B
Question 66
Which two statements about IGPs are true? (Choose two)
Answer: B, E
Question 67
How are the Cisco express forwarding table and the FIB related each other?
A. Cisco express forwarding uses a FIB to make IP destination prefix-based switching decisions.
B. There can be only one FIB but multiple Cisco Express forwarding tables on ISO devices.
C. The Cisco express forwarding table allows route lookups to be forwarding to the route processor
before they are sent to the FIB.
D. The FIB is used to populate the Cisco Express forwarding table.
Answer: A
Question 68
Which two methods can you use to limit the range for EIGRP queries? (Choose two.)
Answer: C, F
Question 69
Which two OSPF network types require the use of a DR and BDR? (Choose two.)
A. non-broadcast networks
B. point-to-point networks
C. point-to-multipoint networks
D. broadcast networks
E. point-to-multipoint non-broadcast networks
Answer: A, D
Question 70
Refer to the exhibit. After you applied this configuration to R1 and R2, they failed to form an
IS-IS adjacency. Which reason for the problem is most likely true?
Question 71
Which two statements about redistribution are true? (Choose two)
A. When OSPF traffic is redistributed into BGP, internal and external routes are redistributed
B. When BGP traffic is redistributed into OSPF, the metric is set to 1 unless the metric is defined
C. When EIGRP routes on a CE are redistributed through a PE into BGP, the Cost Community POI is
set automatically
D. When BGP traffic is redistributed into OSPF, eBGP and iBGP routes are advertised
E. iBGP routes automatically redistribute into the IGP if the routes are in the routing table
Answer: B, C
Question 72
Refer to the exhibit. Which statement is true?
A. R1 routes this pseudowire over MPLS TE tunnel 1 with transport label 20.
B. The default route 0.0.0.0/0 is available in the IPv4 routing table.
C. R1 is using an MPLS TE tunnel for this pseudowire, because the IP path is not available.
D. R1 has preferred-path configured for the pseudowire.
Answer: D
Question 73
Refer to the exhibit. After you apply the given configurations to R1 and R2. Which networks
does R2 advertise to R1?
A. 172.16.0.0/16 only
B. Both 172.16.32.0/20 and 172.16.33.0/24
C. 172.16.32.0/20 only
D. 172.16.33.0/24 only
Answer: A
Question 74
How does MSTP maintain compatibility with RSTP?
A. RSTP encodes region information from an MSTP BPDU into a single instance.
B. MSTP supports five port states in the same way as RSTP.
C. MSTP sends all spanning-tree information in one BPDU.
D. RSTP implements a TTL that is compatible with the MSTP max age timer
Answer: C
Question 75
Select and Place:
Answer
Question 76
What is the correct multicast destination address for IGMPv2 leave-group messages?
A. 224.0.0.2
B. 224.0.0.1
C. 239.0.0.1
D. 239.0.0.2
Correct Answer: A
Question 77
Which two statements about NetFlow version 9 are true? (Choose two)
A. Each flow monitor supports up to 10 exporters.
B. It supports both encryption and authentication.
C. It supports export over TCP and UDP.
D. It supports export over UDP only.
E. It supports up to 6 exporters per cache.
F. It supports up to 2 exporters per cache.
Correct Answer: AC
Question 78
Drag each IPv4 host address on the left to the matching networks on the right
Select and Place:
Question 79
Which GDOI key is responsible for encrypting control plane traffic?
D. the key-chain
Correct Answer: C
Question 80
Which tow factors contribute to traffic starvation when TCP and UDP flows area includes
in a
A. UDP flows continually lower their transmission rates when congestion is detected.
B. TCP flows continually lower their transmission rates when congestion occurs on a
link.
C. TCP flows continually reduce the windows size when congestion occurs on a link
D. UDP flows continually reduce the windows size when congestion occurs on a ink.
link.
link.
Correct Answer: BF
Question 81
A. to respond to an SIA query that the router is still waiting on replies from its peers.
Correct Answer: A
Question 82
Correct Answer: A
Question 83
Refer to the exhibit, Each router is a PIM RP in its own domain and all routers are MSDP
peers. When the multicast source in PIM Domain A begins sending traffic, which three
Question 84
Which two statements about migrating a network from PVST +to MST are true? (Choose
Two)
B. Loop guard and BPDU filter are disabled automatically during the migration.
C. While the migration is underway, unmigrated switches treat migrated switches in the
D. Before migrating to MST, all PVST +switches must first be migrated to Rapid-PVST +
Correct Answer: AC
Question 85
Answer: AB
Question 86
Answer
Question 87
Which two conclusions can you draw from this output? (Choose two.)
A. The device that produced the output uses the same interface to send and receive traffic to and from the
device at
10.9.132.254
B. The device at 192.168.5.119 is on the same subnet as the next hop for the device at 10.9.132.254
C. The device at the 192.168.5.119 routing table has an ARP entry for the device at 10.9.132.254
D. The device that produced the output uses different interfaces to send and receive traffic to and from the
device at
10.9.132.254
E. The packet was source-routed
Correct Answer: AB
Question 88
Which two actions can you take to allow the network 172.29.224.0./24 to be reachable from peer
192.168.250.53?
(Choose two)
Correct Answer: AC
Question 89
Which two statements about HDLC operations in asynchronous balanced mode are true? (Choose two.)
Question 90
Which two statements about EIGRP load balancing are true? (Choose Two)
A. EIGRP supports unequal-cost paths by default
B. EIGRP supports 6 unequal-cost paths
C. Cisco Express Forwarding is required to load-balance across interfaces
D. A path can be used for load balancing only if it is a feasible successor
E. Any path in the EIGRP topology table can be used for unequal-cost load balancing
Correct Answer: BD
Question 91
Question 92
Question 93
Which three connectivity models for vEdge Site Architecture are tru
A. hybrid with Fallback
B. augmentation model
C. full Sd-WAN
D. secure virtual connectivity
E. secure tunnel
F. Cloud provider
Correct Answer: ACD
Question 94
Which three statements about bridge assurance are true? (Choose three)
A. Bridge assurance can be enabled on one end of a link or on the both ends.
B. If a bridge assurance ports failed to receive a BPDU after a timeout, the port is put into an error disabled
state.
C. If a bridge assurance ports failed to receive a BPDU after a timeout, the port is put into a blocking state.
Question 95
Which three basic types of SD-WAN deployments are out on the market? (Choose three.)
A. SD-WAN as-a-Service
B. secure SD-WAN service
C. internet-based SD-WAN
D. policy-based SD-WAN
E. managed service SD-WAN
F. MPLS-based
Answer: ABC
Question 96
Which are the three recommended steps to implement your Risk-Based loT Security
Program? (Choose three)
A. Analyze
B. Troubleshoot
C. Implement
D. Formalize
E. Optimize
F. Assess
Question 97
Correct Answer: BC
Question 98
In a GETVPN environment, which protocol is used by the key server and group members to
manage group keys?
A. STP
B. FTP
C. SSH
D. SFTP
E. GDOI
F. SNMP
Correct Answer: E
Question 99
Refer to the exhibit. When you apply this configuration to the router, which effect is true?
Question 100
Which two statements about debugging on Cisco routers are true? (Choose two)
A. Using console logging can reduce the performance impact of the debug command
D. The debug ip packet command can debug IP traffic that is fast-switched on the router
Correct Answer: BF
Question 101
What is the default behavior for a manual summary route when a component route of the
summary disappears?
A. If the component route previously had the best composite metric, the same summary
Question 102
In the DMVPN topology, which value can be used to authentication spoke routers to the
hub?
A. pre-shared key
8. username
C. IP address
D. hostname
Correct Answer: A
Question 103
Which three campus fabric nodes in SD-Access architecture are true? (Choose three)
A. virtual edge nodes
B. fabric wireless access point
C. data plane nodes
D. fabric boarder nodes
E. control plane nodes
F. fabric edge nodes
Correct Answer: DEF
Question 104
Question 105
Which two additional configurations are required to enable Router1 and Router 2 to established the
tunnel? (Choose two)