of 306 /306
CCIE Routing & Switching Written Exam v4.0 Number : 350-001 Passing Score : 790 Time Limit : 170 min File Version : 13.59 http://www.gratisexam.com/ Lead2 pass Cisco 350-001 350-001 CCIE Routing and Switching Written Exam v4.0

CCIE Routing & Switching Written Exam v4

  • Upload
    others

  • View
    16

  • Download
    0

Embed Size (px)

Text of CCIE Routing & Switching Written Exam v4

Cisco.Lead2Pass.350-001.v2012-12-10.by.Spike.489qCCIE Routing & Switching Written Exam v4.0
Number: 350-001 Passing Score: 790 Time Limit: 170 min File Version: 13.59
http://www.gratisexam.com/
350-001 CCIE Routing and Switching Written Exam v4.0
Sections 1. ACLs 2. BGP 3. Drag->Drop 4. EIGRP 5. IP Routing 6. IP Services 7. IPv6 8. MPLS 9. Multicast 10.OSPF 11.QOS 12.Security 13.STP 14.Switching 15.TShoot 16.VLAN & VTP
Exam A
QUESTION 1 In order to maintain security, with which hop count are IPv6 neighbor discovery packets sent?
A. 0 B. 1 C. 255 D. 256
Correct Answer: C Section: IPv6 Explanation
Explanation/Reference:
QUESTION 2 Which command will define a VRF with name 'CCIE' in IPv6?
A. ip vrf CCIE B. ipv6 vrf CCIE C. vrf definition CCIE D. ipv6 vrf definition CCIE
Correct Answer: C Section: QOS Explanation
Explanation/Reference:
QUESTION 3 For which routes does LDP advertise a label binding?
A. all routes in the routing table B. only the IGP and BGP routes in the routing table C. only the BGP routes in the routing table D. only the IGP routes in the routing table
Correct Answer: D Section: BGP Explanation
Explanation/Reference:
QUESTION 4 Which command can be used on a PE router to connect to a CE router (11.1.1.4) in VRF red?
A. telnet 11.1.1.4 /vrf-source red B. telnet 11.1.1.4 source /vrf red C. telnet 11.1.1.4 /source vrf red D. telnet 11.1.1.4 /vrf red E. telnet 11.1.1.4 vrf red
Correct Answer: D Section: QOS Explanation
Explanation/Reference:
QUESTION 5 Refer to the exhibit. This is an MPLS VPN network with OSPF as the PE-CE routing protocol. Which statement is correct?
A. The routing inside the VPN RED will never work correctly. B. The routing inside the VPN RED can be enabled by configuring virtual links between the PE routers. C. The routing inside the VPN RED can be enabled by configuring area 0 inside the VRF on the PE routers. D. The routing inside the VPN RED will work without any special OSPF configuration. E. The routing inside the VPN RED will work if the PE routers have a full mesh of sham-links configured for
VRF RED.
Explanation/Reference:
QUESTION 6 Which two statements are correct about Nonstop Forwarding? (Choose two.)
A. It allows the standby RP to take control of the device after a hardware or software fault on the active RP. B. It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable to users
following a switchover.
C. It is supported by the implementation of EIGRP, OSPF, RIPv2, and BGP protocols. D. It synchronizes startup configuration, startup variables, and running configuration. E. The main objective of NSF is to continue forwarding IP packets following a switchover. F. Layer 2 802.1w or 802.1s must be used, as 802.1d cannot process the Layer 2 changes. G. Routing protocol tuning parameters must be the same as the NSF parameters, or failover will be
inconsistent.
Explanation/Reference:
QUESTION 7 Which three fields are optional in an OSPFv3 external LSA? (Choose three.)
A. Forwarding Address B. External Route C. Reference Link-State ID D. Option E. Prefix Options
Correct Answer: ABC Section: OSPF Explanation
Explanation/Reference:
QUESTION 8 On a router, interface S0 is running EIGRPv6, and interface S1 is running OSPFv3. A redistribution command is issued under OSPFv3, redistribute EIGRP 1 metric 20 under ipv6 router ospf 1. What will happen after applying this redistribution command?
A. All routes showing up as D and D EX in the routing table will be redistributed into OSPFv3. B. All routes showing up as D, D EX, and C in the routing table will be redistributed into OSPFv3. C. All routes showing up as D and D EX in the routing table and the S0 interface will be redistributed into
OSPFv3. D. All routes showing up as D in the routing table will be redistributed into OSPFv3. E. All routes showing up as D EX in the routing table will be redistributed into OSPFv3.
Correct Answer: A Section: OSPF Explanation
Explanation/Reference:
http://www.gratisexam.com/
QUESTION 9 Which type of domains is interconnected using Multicast Source Discovery Protocol?
A. PIM-SM B. PIM-DM C. PIM-SSM D. DVMRP
Correct Answer: A Section: Multicast Explanation
Explanation/Reference:
QUESTION 10 Which two multicast address ranges are assigned as source-specific multicast destination addresses and are reserved for use by source-specific applications and protocols? (Choose two.)
A. 232.0.0.0/8 B. 239.0.0.0/8 C. 232.0.0.0/4 D. FF3x::/32 E. FF2x::/32 F. FF3x::/16
Correct Answer: AD Section: Multicast Explanation
Explanation/Reference: Source-specific multicast (SSM) is a method of delivering multicast packets in which the only packets that are delivered to a receiver are those originating from a specific source address requested by the receiver. By so limiting the source, SSM reduces demands on the network and improves security.
SSM requires that the receiver specify the source address and explicitly excludes the use of the (*, G) join for all multicast groups in RFC 3376, which is possible only in IPv4's IGMPv3 and IPv6's MLDv2. Source-specific multicast is best understood in contrast to any-source multicast (ASM). In the
ASM service model a receiver expresses interest in traffic to a multicast address. The multicast network must 1. discover all multicast sources sending to that address, and 2. route data from all sources to all interested receivers.
This behavior is particularly well suited to groupware applications where 1. all participants in the group want to be aware of all other participants, and 2. the list of participants is not known in advance. The source discovery burden on the network can become significant when the number of sources is large.
In the SSM service model, in addition to the receiver expressing interest in traffic to a multicast address, the receiver expresses interest in receiving traffic from only one specific source sending to that multicast address. This relieves the network of discovering many multicast sources and reduces the amount of multicast routing information that the network must maintain. SSM requires support in last-hop routers and in the receiver's operating system. SSM support is not required in other network components, including routers and even the sending host. Interest in multicast traffic from a specific source is conveyed from hosts to routers using IGMPv3 as specified in RFC 4607. SSM destination addresses must be in the ranges 232.0.0.0/8 for IPv4 or FF3x::/96 for IPv6.
Reference http://en.wikipedia.org/wiki/Source-specific_multicast
QUESTION 11 How is RPF used in multicast routing?
A. to prevent multicast packets from looping B. to prevent PIM packets from looping C. to instruct PIM where to send a (*,G) or (S,G) join message D. to prevent multicast packets from looping and to instruct PIM where to send a (*,G) or (S,G) join message
Correct Answer: D Section: Multicast Explanation
Explanation/Reference:
QUESTION 12 Refer to the exhibit. What does the incoming interface of the above (*,G) entry indicate?
A. the interface closest to the source, according to the unicast routing table B. the interface where an IGMP join has been received C. the interface with the highest IP address D. the last interface to hear a PIM (*,G) join E. the interface closest to the RP, according to the unicast routing table
Correct Answer: E Section: Multicast Explanation
Explanation/Reference:
QUESTION 13 Refer to the exhibit. Which interface(s) will show ip rpf 1.1.1.2 indicate as RPF interface(s)?
A. Ethernet 1/0 B. Ethernet 0/0 C. Both Ethernet 0/0 and Ethernet 1/0 D. RPF will fail
Correct Answer: A Section: Multicast Explanation
Explanation/Reference: When troubleshooting multicast routing, the primary concern is the source address. Multicast has a concept of Reverse Path Forwarding check (RPF check). When a multicast packet arrives on an interface, the RPF process checks to ensure that this incoming interface is the outgoing interface used by unicast routing to reach the source of the multicast packet. This RPF check process prevents loops. Multicast routing does not forward a packet unless the source of the packet passes a reverse path forwarding (RPF) check. Once a packet passes this RPF check, multicast routing forwards the packet based only upon the destination address.
Reference
http://www.cisco.com/en/US/tech/tk828/technologies_tech_note09186a0080094b55.shtml
QUESTION 14 Apart from interdomain multicast routing, what else is MSDP used for?
A. Source Specific Multicast and IGMPv2 B. Announcing multicast sources to BGP speakers C. Anycast RP D. Intradomain multicast routing
Correct Answer: C Section: Multicast Explanation
Explanation/Reference:
QUESTION 15 Which IGMPv2 message contains a non-zero "Max Response Time"?
A. Membership Query B. Membership Report C. Membership Delay D. Backward Compatible IGMPv1 Report Message
Correct Answer: A Section: Multicast Explanation
Explanation/Reference:
QUESTION 16 Refer to the exhibit. Which IGMPv2 message is displayed in the output of the packet capture?
A. General Query B. Membership Report C. Membership Query D. Membership Delay
Correct Answer: B Section: Multicast Explanation
Explanation/Reference:
QUESTION 17 What is Phantom RP used for?
A. it is used for load balancing in bidirectional PIM B. it is used for redundancy in bidirectional PIM C. it is used for redundancy in PIM-SM D. it is used for load balancing in PIM-SM
Correct Answer: B Section: Multicast Explanation
Explanation/Reference: Phantom RP In Bidirectional PIM (Bidir-PIM), the RP does not have an actual protocol function. The RP acts as a routing vector in which all the traffic converges. The RP can be configured as an address that is not assigned to any particular device called a Phantom RP.
This means that the RP address does not need to reside on a physical router interface, but can just be an address in a subnet. The RP can also be a physical router, but it is not necessary.
Reference http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/whitepaper_c11-508498.html
QUESTION 18 Which three statements are true about TACACS+? (Choose three.)
A. It is a Cisco proprietary protocol. B. It runs on TCP port 59. C. Authentication and authorization are done at different stages. D. TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header. E. It is an industry standard protocol. F. TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
Correct Answer: ACD Section: Security Explanation
Explanation/Reference:
QUESTION 19 Refer to the exhibit. Which two statements are correct? (Choose two.)
A. The hexadecimal value of the number of packets that hit the access list is 0x723E6E12. B. The access list has logging enabled. C. The packet was discarded. D. The command ip access-list logging hash-generation is enabled. E. The Telnet connection is successfully set up.
Correct Answer: BD Section: ACLs Explanation
Explanation/Reference:
QUESTION 20 Refer to the exhibit. Which statement is correct?
A. This configuration is not valid. B. Control Plane Policing is configured; however you cannot determine on which interface it is configured. C. NTP is not configured on the router. D. Telnet traffic will be dropped.
Correct Answer: C Section: IP Services Explanation
Explanation/Reference:
QUESTION 21 What does Cisco recommend when you are enabling Cisco IOS IPS?
A. Do not enable all the signatures at the same time. B. Do not enable the ICMP signature. C. Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS. D. Disable CEF because it is not compatible with Cisco IOS IPS.
Correct Answer: A Section: Security Explanation
Explanation/Reference:
QUESTION 22 Refer to the exhibit. Which statement is correct?
A. OSPF peers are using Type 1 authentication B. OSPF peers are using Type 2 authentication C. Authentication is used, but there is a password mismatch D. The OSPF peer IP address is 172.16.10.36
Correct Answer: B Section: OSPF Explanation
Explanation/Reference:
QUESTION 23 Which two statements are true about Unicast Reverse Path Forwarding Loose Mode? (Choose two.)
A. It is used in multihome network scenarios. B. It can be used with BGP to mitigate DoS and DDoS. C. It does not need to have CEF enabled. D. It is enabled via the interface level command ip verify unicast reverse-path. E. It cannot be used with "classification" access lists.
Correct Answer: AB Section: QOS Explanation
Explanation/Reference:
QUESTION 24 Refer to the exhibit. What would be the security risk when you are using the above configuration?
A. The locally configured users would override the TACACS+ security policy. B. It would be impossible to log in to the router if the TACACS+ server is down. C. The default login policy would override the TACACS+ configuration. D. If the TACACS+ server failed, no authentication would be required.
Correct Answer: D Section: Security Explanation
Explanation/Reference:
QUESTION 25 Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router? (Choose three.)
A. SMTP B. ICMP C. BGP D. SSH E. RTP F. BitTorrent G. VTP
Correct Answer: BCD Section: QOS Explanation
Explanation/Reference:
QUESTION 26 What is true about IP Source Guard with port security?
A. Binding should be manually configured. B. It is not supported if IEEE 802.1x port-based authentication is enabled C. The DHCP server must support option 82, or the client is not assigned an IP address. D. It filters based on source IP address only.
Correct Answer: C Section: Security Explanation
Explanation/Reference:
QUESTION 27 Refer to the exhibit. Which option best describes how the virtual MAC address is composed?
A. based on a randomly generated number B. based on the burned-in MAC address of the router C. based on a number manually configured by the administrator D. based on the configured standby group number
Correct Answer: D Section: IP Routing Explanation
Explanation/Reference:
QUESTION 28 Which two commands are required to enable multicast on a router, knowing that the receivers only supports IGMPv2? (Choose Two)
A. IP PIM RP-address B. IP PIM ssm C. IP PIM Sparse-mode D. IP PIM Passive
Correct Answer: AC Section: Multicast Explanation
Explanation/Reference:
QUESTION 29 A branch router is configured with an egress QoS policy that was designed for a total number of 10 concurrent VOIP Calls. Due to Expansion, 15 VOIP Calls are now running over the link, but after the 14th call was established, all calls were affected and the voice quality was dramatically degraded. Assuming that there is enough bandwidth on the link for all of this traffic, which part of the QOS configuration should be updated due to the new traffic profile?
A. Increase the shaping rate for the priority queue. B. Remove the policer applied on the priority queue. C. Remove the shaper applied on the preiority queue. D. Increase the policing rate for the priority queue.
Correct Answer: D Section: QOS Explanation
Explanation/Reference:
QUESTION 30 A new Backup Connection is being deployed on a remote site router. the stability of the connection has been a concern. in order to provide more information to EIGRP Regarding this interface, You wish to incorporate the "Reliability" cost metric in the EIGRP Calculation with the command
metric weights 1 0 1 0 1.
What impact will this modification on the remote site router have for other existing EIGRP neighborships from the same EIGRP Domain?
A. Existing Neighbors will immediately begin using the new metric. B. Existing Neighbors will use the new metric after clearing the EIGRP Neighbors. C. Existing Neighbors will resync, maintaining the neighbor relationship D. All ecisting neighbor relationships will go down
Correct Answer: D Section: EIGRP Explanation
Explanation/Reference:
QUESTION 31 Refer to the exhibit. R1 has an EBGP session to ISP 1 and an EBGP session to ISP 2. R1 receives the same prefixes through both links. Which configuration should be applied so that the link between R1 and ISP 2 will be preferred for outgoing traffic (R1 to ISP 2)?
A. Increase local preference on R1 for routes received from ISP2. B. Decrease local preference on R1 for routes received from ISP2. C. Increase MED on ISP 2 for routes received from R1. D. Decrease MED on ISP 2 for routes received from R1.
Correct Answer: A Section: BGP Explanation
Explanation/Reference:
QUESTION 32 When you are troubleshooting duplex mismatches, which two errors are typically seen on the fullduplex end? (Choose two.)
A. runts B. FCS errors C. interface resets D. late collisions
Correct Answer: AB Section: TShoot Explanation
Explanation/Reference:
QUESTION 33 Which two options are contained in a VTP subset advertisement? (Choose two.)
A. followers field B. MD5 digest C. VLAN information D. sequence number
Correct Answer: CD Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 34 Which two statements are true about traffic shaping? (Choose two.)
A. Out-of-profile packets are queued. B. It causes TCP retransmits. C. Marking/remarking is not supported. D. It does not respond to BECN and ForeSight Messages. E. It uses a single/two-bucket mechanism for metering.
Correct Answer: AC Section: QOS
Explanation
Explanation/Reference:
QUESTION 35 Which three options are features of VTP version 3? (Choose three.)
A. VTPv3 supports 8K VLANs. B. VTPv3 supports private VLAN mapping. C. VTPv3 allows for domain discovery. D. VTPv3 uses a primary server concept to avoid configuration revision issues. E. VTPv3 is not compatible with VTPv1 or VTPv2. F. VTPv3 has a hidden password option.
Correct Answer: BDF Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 36 Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID B. lowest path cost to root bridge C. lowest sender bridge ID D. highest port ID E. highest root bridge ID F. highest path cost to root bridge
Correct Answer: ABC Section: STP Explanation
Explanation/Reference:
QUESTION 37 Refer to the exhibit. A small enterprise connects its office to two ISPs, using separate T1 links. A static route is used for the default route, pointing to both interfaces with a different administrative distance, so that one of the default routes is preferred. Recently the primary link has been upgraded to a new 10 Mb/s Ethernet link. After a few weeks, they experienced a failure. The link did not pass traffic, but the primary static route remained active. They lost their Internet connectivity, even though the backup link was operating. Which two possible solutions can be implemented to avoid this situation in the future? (Choose two.)
A. Implement HSRP link tracking on the branch router R1 B. Use a track object with an IP SLA probe for the static route on R1. C. Track the link state of the ethernet link using a track object on R1 D. Use a routing protocol between R1 and the upstream ISP
Correct Answer: BD Section: IP Routing Explanation
Explanation/Reference:
QUESTION 38 Why would a rogue host that is running a DHCP Server on a Campus LAN network present a security risk?
A. It may allocate IP addresses from an unknown subnet to the users B. all Multicast traffic can be sniffer y using the DHCO Multicasr capabilities C. the CPU utilization of the first hop router can be overloaded by exploiting DHCP Relay open ports D. A potential Man-in-the-middle Attack can be used against the clients.
Correct Answer: D Section: Security Explanation
Explanation/Reference:
QUESTION 39 Which Statement is true about TCN (802.1D) Propagation?
A. The originator of the TCN immediately floods this information through the network B. the TCN propagation is a two step process C. A TCN is generated and sent to the root bridge D. the root bridge must flood this information throught the network
Correct Answer: C Section: STP Explanation
Explanation/Reference:
QUESTION 40 Which statement is true about loop guard?
A. Loop Guard only operates on interfaces that are considered point-to-point by the spanning tree. B. Loop Guard only operates on root ports. C. Loop Guard only operates on designated ports D. Loop Guard only operates on edge ports
Correct Answer: A Section: Security Explanation
Explanation/Reference:
QUESTION 41 Which two are effects of connecting a network segment that is running 802.1D to a network segment that is running 802.1w? (Choose Two.)
A. the entire network switches to 802.1D and generates BPDUs to determine root bridfe status. B. A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge comes up C. The entire network reconverges and a unique root briddge for the 802.1D segment, and a root bridge for the
802.1W segment, is chosen D. the first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility mode and
converts the BPDUs to either 802.1D or 802.1W segments of the network E. Classic 802.1D timers, Such as forward Delay and Max-age, will only be used as a backup, and will not be
necessary if point-to-point links and edge prots are properly identified and set by the administrator.
Correct Answer: BE Section: STP Explanation
Explanation/Reference: Lhttp://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml
QUESTION 42 Which command is used to enable Etherchannel hashing for layer 3 IP and Layer 4 Port-based CEF?
A. mpls ip cef B. port-channel ip cef C. mpls ip port-channel cef D. port-channel load balance E. mpls ip load-balance F. ip cef etherchannel channel-id XOR L4 G. ip cef connection exchange
Correct Answer: D Section: Switching Explanation
Explanation/Reference:
QUESTION 43 In 802.1s, how is the VLAN to instance mapping represented in the BPDU?
A. The VLAN to instance mapping is a normal 16-byte field in the MST BPDU. B. The VLAN to instance mapping is a normal 12-byte field in the MST BPDU. C. The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU. D. The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
Correct Answer: C Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 44 Which three combinations are valid LACP configurations that will set up a channel? (Choose three.)
A. On/On B. On/Auto C. Passive/Active D. Desirable/Auto E. Active/Active F. Desirable/Desirable
Correct Answer: ACE Section: Switching Explanation
Explanation/Reference:
QUESTION 45 Refer to the exhibit. Which statement is correct about the prefix 160.0.0.0/8?
A. The prefix has encountered a routing loop. B. The prefix is an aggregate with an as-set C. The prefix has been aggregated twice, once in AS 100 and once in AS 200. D. None of these statements is true.
Correct Answer: B Section: BGP Explanation
Explanation/Reference:
QUESTION 46 Which two options does Cisco PfR use to control the entrance link selection with inbound optimization? (Choose two.)
A. Prepend extra AS hops to the BGP prefix. B. Advertise more specific BGP prefixes (longer mask). C. Add (prepend) one or more communities to the prefix that is advertised by BGP. D. Have BGP dampen the prefix.
Correct Answer: AC Section: BGP Explanation
Explanation/Reference:
QUESTION 47 Refer to the exhibit. What is the potential issue with this configuration?
A. There is no potential issue; OSPF will work fine in any condition. B. Sub-optimal routing may occur since there is no area 1 adjacency between the ABRs. C. This is a wrong OSPF configuration because all routers must be in area 0 only. D. This is a wrong OSPF configuration because /30 requires 0.0.0.3 wild card.
Correct Answer: B Section: OSPF Explanation
Explanation/Reference:
QUESTION 48 Refer to the exhibit. What triggered the first SPF recalculation?
A. changes in a router LSA, subnet LSA, and external LSA B. changes in a router LSA, summary network LSA, and external LSA C. changes in a router LSA, summary network LSA, and summary ASBR LSA D. changes in a router LSA, summary ASBR LSA, and external LSA
Correct Answer: B Section: OSPF Explanation
Explanation/Reference: R - router link change N - network link change SN - summary network link change SA - ASBR summary change X - external change
Reference http://routingfreak.wordpress.com/2008/03/04/shortest-path-first-calculation-in-ospf-and-is-is/
QUESTION 49 Which two orders in the BGP Best Path Selection process are correct? (Choose two.)
A. Higher local preference, then lowest MED, then eBGP over iBGP paths B. Higher local preference, then highest weight, then lowest router ID C. Highest weight, then higher local preference, then shortest AS path D. Lowest origin type, then higher local preference, then lowest router ID E. Highest weight, then higher local preference, then highest MED
Correct Answer: AC Section: BGP Explanation
Explanation/Reference:
QUESTION 50 What is the first thing that happens when IPv6 is enabled on an interface on a host?
A. A router solicitation is sent on that interface. B. There is a duplicate address detection on the host interface. C. The link local address is assigned on the host interface. D. A neighbor redirect message is sent on the host interface.
Correct Answer: B Section: IPv6 Explanation
Explanation/Reference:
QUESTION 51 What is the flooding scope of an OSPFv3 LSA, if the value of the S2 bit is set to 1 and the S1 bit is set to 0?
A. link local B. area wide C. AS wide D. reserved
Correct Answer: C Section: OSPF Explanation
Explanation/Reference:
QUESTION 52 How will EIGRPv6 react if there is an IPv6 subnet mask mismatch between the Global Unicast addresses on a point-to-point link?
A. EIGRPv6 will form a neighbor relationship. B. EIGRPv6 will not form a neighbor relationship. C. EIGRPv6 will form a neighbor relationship, but with the log MSG: "EIGRPv6 neighbor not on a common
subnet." D. EIGRPv6 will form a neighbor relationship, but routes learned from that neighbor will not be installed in the
routing table.
Explanation/Reference:
QUESTION 53 Which two tunneling techniques support IPv6 multicasting? (Choose two.)
A. 6to4 B. 6over4 C. ISATAP D. 6PE
E. GRE
Explanation/Reference:
QUESTION 54 Which two OSPF LSA types are new in OSPF version 3? (Choose two.)
A. Link B. NSSA external C. Network link D. Intra-area prefix E. AS domain
Correct Answer: AD Section: OSPF Explanation
Explanation/Reference:
QUESTION 55 Refer to the exhibit. How will traffic be split between the routers, assuming that there are many hosts on this subnet?
A. All traffic will be sent to the primary router (10.1.1.100). B. Traffic will be split equally between the two routers (10.1.1.100 and 10.1.1.101). C. Traffic will be split 25% (10.1.1.101) / 75% (10.1.1.100) between the two routers. D. Traffic will be split 75% (10.1.1.101) / 25% (10.1.1.100) between the two routers.
Correct Answer: D Section: IP Routing Explanation
Explanation/Reference:
QUESTION 56 Refer to the exhibit. A packet from RTD with destination RTG, is reaching RTB. What is the path this packet will take from RTB to reach RTG?
A. RTB - RTA - RTG B. RTB - RTD - RTC - RTA - RTG C. RTB - RTF - RTE - RTA - RTG D. RTB will not be able to reach RTG since the OSPF configuration is wrong.
Correct Answer: C Section: OSPF Explanation
Explanation/Reference: RTB#traceroute 5.5.5.2 source 1.1.1.5
Type escape sequence to abort. Tracing the route to 5.5.5.2
1 4.4.4.5 16 msec 48 msec 8 msec 2 7.7.7.2 44 msec 20 msec 36 msec 3 4.4.4.1 20 msec 20 msec 36 msec 4 5.5.5.2 56 msec * 60 msec RTB#
QUESTION 57 Refer to the exhibit. Which path is selected as best path?
A. path 1, because it is learned from IGP B. path 1, because the metric is the lowest C. path 2, because it is external D. path 2, because it has the higher router ID
Correct Answer: B Section: BGP Explanation
Explanation/Reference:
QUESTION 58 What action will a BGP route reflector take when it receives a prefix marked with the community attribute NO ADVERTISE from a client peer?
A. It will advertise the prefix to all other client peers and non-client peers. B. It will not advertise the prefix to EBGP peers. C. It will only advertise the prefix to all other IBGP peers. D. It will not advertise the prefix to any peers.
Correct Answer: D Section: BGP Explanation
Explanation/Reference:
QUESTION 59 Refer to the exhibit. R1 is not learning about the 172.16.10.0 subnet from the BGP neighbor R2 (209.165.202.130). What can be done so that R1 will learn about this network?
A. Disable auto-summary on R2. B. Configure an explicit network command for the 172.16.10.0 subnet on R2. C. Subnet information cannot be passed between IBGP peers. D. Disable auto-summary on R1.
Correct Answer: B Section: BGP Explanation
Explanation/Reference:
QUESTION 60 Refer to the exhibit. After a link flap in the network, which two EIGRP neighbors will not be queried for alternative paths? (Choose two.)
A. 192.168.1.1 B. 192.168.3.7 C. 192.168.3.8 D. 192.168.3.6 E. 192.168.2.1 F. 192.168.3.9
Correct Answer: BC Section: EIGRP Explanation
Explanation/Reference:
QUESTION 61 Refer to the exhibit. Why is AS 65333 in parentheses?
A. It is an external AS. B. It is a confederation AS. C. It is the AS of a route reflector. D. It is our own AS. E. A route map has been applied to this route. F. The BGP next hop is unreachable.
Correct Answer: B Section: BGP Explanation
Explanation/Reference:
QUESTION 62 Refer to the exhibit. Which action would make the router the active VRRP router?
A. Recover interface Serial 1/0. B. Increase priority in the configuration to 100. C. Change the interface tracking priority to 100.
D. Recover interface Serial 1/1.
Correct Answer: A Section: IP Routing Explanation
Explanation/Reference:
QUESTION 63 Refer to the Exhibit. The displayed QoS configuration has been configured on a router. IPv6 is being implemented on the router, and it is required to convert the QoS policy to support both IPv4 and IPv6 on the same class. Which alternative configuration would allow matching DSCP AF41 for both IPv4 and IPv6 on the same class map?
A. Class-map match-all CLASS1 Match dscp af41
B. Class-map match-all CLASS1 Match ip dscp af41 Match ipv6 dscp af41
C. Class-map match-any CLASS1 Match ip dscp af41 Match ipv6 dscp af41
D. Class-map match-any CLASS1 Match qos-group af41
Correct Answer: A Section: QOS Explanation
Explanation/Reference:
QUESTION 64 Voice quality is bad due to high delay and jitter on a link. Which two actions will improve the quality of voice calls? (Choose two.)
A. Increase the queue size of the voice class. B. Guarantee bandwidth during congestion to the voice class with a bandwidth command. C. Increase the tx-ring of the egress interface. D. Implement LLQ for the voice class. E. Decrease the rx-ring of the egress interface. F. Decrease the queue size of the voice class.
Correct Answer: DF Section: QOS Explanation
Explanation/Reference:
QUESTION 65 Refer to the exhibit. On what will the config class-map VOICE match?
A. only on UDP traffic between port ranges 16384 and 32767 B. only on DSCP EF traffic C. on UDP traffic between port ranges 16384 and 32767, and on DSCP EF traffic D. only on EF traffic that is UDP and within the UDP range of 16384 and 32767
Correct Answer: C Section: QOS Explanation
Explanation/Reference:
QUESTION 66 Refer to the exhibit. Assuming that the routing protocol for this network is EIGRP, if the link between R1 and R3 failed, what would R4 receive from R3?
A. R4 would receive an update noting R3's higher cost to reach 172.30.1.0/24. B. R4 would not receive any updates or queries, since R3 would simply move to the path through R2. C. R4 would receive a query, since R3 would mark 172.30.1.0/24 as active when the link between R1 and R4
failed. D. R4 would not receive any packets, since R3 is not using the link to R1 to reach 172.30.1.0/24.
Correct Answer: A Section: EIGRP Explanation
Explanation/Reference:
QUESTION 67 Which three statements accurately describe a link-state routing protocol? (Choose three.)
A. Each router sends routing information to all nodes in the flooding domain. B. Each router sends all or some portion of its routing table to neighboring routers. C. Each router individually builds a picture of the entire flooding domain. D. Each router has knowledge of all other routers in the flooding domain. E. Each router is only aware of neighboring routers. F. Each router installs routes directly from the routing updates into the routing table.
Correct Answer: ACD Section: IP Routing Explanation
Explanation/Reference:
QUESTION 68 Refer to the exhibit. What is true about the configuration in this exhibit?
A. It is an invalid configuration because it includes both an application layer match and and a Layer 3 ACL. B. It will create a class map that matches the content of ACL 101 and the HTTP protocol, and will then create
an inspection policy that will drop packets at the class map. C. It will create a class map that matches the content of ACL 101 and the HTTP protocol, and will then create
an inspection policy that will allow packets at the class map. D. It will create a class map that matches the content of ACL 101 or the HTTP protocol (depending on the zone
of the interface), and will then create an inspection policy that will drop packets at the class map. E. It will create a class map that matches the content of ACL 101 or the HTTP protocol (depending on the zone
of the interface), and will then create an inspection policy that will allow packets at the class map. F. It is an invalid configuration because the class map and policy map names must match.
Correct Answer: B Section: QOS Explanation
Explanation/Reference:
QUESTION 69 Refer to the exhibit. Users that are connected to switch SWD are complaining about slow performance when they are doing large file transfers from a server connected to switch SWB. All switches are running PVST+. Which option will improve the performance of the file transfers?
A. Reconnect the clients from switch SWD to switch SWA. B. Reconnect the clients from switch SWD to switch SWC. C. Change PVST+ to RSTP. D. Change the STP root switch from switch SWA to switch SWB. E. Configure an EtherChannel between switch SWB and switch SWC.
Correct Answer: D Section: STP Explanation
Explanation/Reference:
QUESTION 70 Refer to the exhibit. Clients in VLAN 10 complain that they cannot access network resources and the Internet. When you try to ping the default gateway from one of the affected clients, you get ping timeouts. What is the most likely cause of this issue?
A. VLAN 10 is only enabled on trunk interfaces. B. VLAN 10 is not created in the switch database. C. STP is not running on the switch. D. IP routing is disabled on the switch. E. The switch CAM table is corrupted.
Correct Answer: B Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 71 While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?
A. a routing protocol that is flooding updates B. a flapping port that is generating BPDUs with the TCN bit set C. STP is not running on the switch D. a user that is downloading the output of the show-tech command E. a corrupted switch CAM table
Correct Answer: B Section: STP Explanation
Explanation/Reference:
QUESTION 72 Your network is suffering from regular outages. After troubleshooting, you learn that the transmit lead of a fiber uplink was damaged. Which two features can prevent the same issues in the future? (Choose two.)
A. root guard B. loop guard C. BPDU guard D. UDLD E. BPDU skew detection
Correct Answer: BD Section: TShoot Explanation
Explanation/Reference:
QUESTION 73 Refer to the exhibit. You are trying to police down to 100 Mb/s. While testing, you notice that you rarely exceed 70-80 Mb/s. What do you need to change in your MQC configuration to allow for 100 Mb/s speeds?
A. Change the CIR value from 100 Mb/s to 200 Mb/s. B. Change the Bc value to allow for a large enough burst. C. Change the QoS queue from default to priority. D. Change the exceed-action to transmit.
Correct Answer: B Section: QOS Explanation
Explanation/Reference:
QUESTION 74 Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?
A. IPSec VPN B. SSL VPN C. port security D. port security with statically configured MAC addresses E. private VLANs
Correct Answer: D Section: Security Explanation
Explanation/Reference:
QUESTION 75 Refer to the exhibit. Clients that are connected to Fa0/0 of RTA are only allowed to connect to the Internet and networks, but not the networks on Fa1/0, Fa2/0, Fa3/0 and Fa4/0. To achieve this, you have configured an ACL on RTA and applied it on the incoming direction of interface Fa0/0. After you apply this ACL, you learn that some of these networks are still accessible for clients that are connected to the 10.10.10.0/24 network. What is the
correct ACL configuration to solve this issue?
A. access-list 101 deny ip any 10.1.0.0 0.0.1.255 access-list 101 permit ip any any
B. access-list 101 permit ip any 10.1.0.0 0.0.1.255 access-list 101 deny ip any any
C. access-list 101 deny ip any 10.1.0.0 0.0.252.255 access-list 101 permit ip any any
D. access-list 101 deny ip any 10.1.0.0 0.0.3.255 access-list 101 permit ip any any
Correct Answer: D Section: ACLs Explanation
Explanation/Reference:
QUESTION 76 After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with
"%SEC-6-IPACCESSLOG"
appeared on the Syslog server. What can be done to resolve this situation?
A. Increase memory allocation for ACLs. B. Remove all entries from the ACL and use a single permit ip any any statement. C. Remove the log keyword from each ACL entry. D. Reboot the device after the ACL has been applied.
Correct Answer: C Section: ACLs Explanation
Explanation/Reference:
QUESTION 77 You are the network administrator of a medium-sized company, and users are complaining that they cannot send emails to some organizations. During your troubleshooting, you notice that your DNS MX record is blacklisted by several public blacklist filters. After clearing these listings for your IP address, and assuming that your email server has the right virus protection in place, what are two possible solutions to prevent this from happening in the future? (Choose two.)
A. Change your Internet provider. B. Change your public IP address. C. Allow the email server to send traffic only to TCP port 25. D. Put your email server in a DMZ. E. Use a separate public IP address for your email server only.
Correct Answer: CE Section: Security Explanation
Explanation/Reference:
QUESTION 78 Refer to the exhibit. What can be done to remove the summary routes to Null0 on R3?
A. Configure the EIGRP routing subcommand no auto-summary on 209.165.202.155. B. Configure the EIGRP routing subcommand no auto-summary on 209.165.202.24. C. Configure the EIGRP routing subcommand no auto-summary on both 209.165.202.155 and
209.165.202.242. D. Configure the EIGRP routing subcommand no auto-summary on R3.
Correct Answer: D Section: EIGRP Explanation
Explanation/Reference:
QUESTION 79 Refer to the exhibit. R4 is configured as a receive-only EIGRP stub, and is adjacent with 209.165.202.139 (R3). However, R4 is not learning about network 209.165.201.0/27 from R3. What could be the cause of this issue?
A. R4 should learn this route from 209.165.200.242, and not from R3. B. R3 is configured as a receive-only EIGRP stub. C. R3 and R4 may be using different EIGRP process numbers. D. R3 and R4 are asymmetrically adjacent neighbors.
Correct Answer: B Section: EIGRP Explanation
Explanation/Reference:
QUESTION 80 Refer to the exhibit. R4 is a remote office router that is running EIGRP; the decision has been made to change EIGRP to use static EIGRP adjacencies. However, once the configuration change was applied, the adjacency between R4 and 209.165.202.139 (HQ) seems to disappear. What could be the cause of this issue?
A. Static EIGRP neighbor configuration is symmetric; it causes the interface to stop processing inbound multicast packets and stop sending multicast packets.
B. Static EIGRP neighbors are not displayed with the show ip eigrp neighbors command. C. A distance (internal 90 or external 170) must also be configured for the static neighbor. D. The neighbor 209.165.202.139 should be changed to run under EIGRP autonomous system 0.
Correct Answer: A Section: EIGRP Explanation
Explanation/Reference: R1#sh ip eigrp neigh R1#sh ip eigrp neighbors IP-EIGRP neighbors for process 100 H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 0 209.165.202.139 Fa1/0 10 00:03:14 208 1872 0 7 R1#
R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router eigrp 100 R1(config-router)#neighbor 209.165.202.139 fa1/0 R1(config-router)# *Mar 1 00:31:42.343: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 100: Neighbor 209.165.202.139 (FastEthernet1/0) is down: Static peer configured R1(config-router)#
R1# *Mar 1 00:31:49.051: %SYS-5-CONFIG_I: Configured from console by console R1#sh ip eigrp neighbors IP-EIGRP neighbors for process 100 R1#
QUESTION 81 Refer to the exhibit. What problem does the debug ip ospf event output from R3 indicate?
A. 209.165.202.140 and R3 are not both configured as OSPF stubs. B. 209.165.202.140 and R3 are not configured in the same OSPF area. C. 209.165.202.140 is configured as a no-summary stub. D. Transit area OSPF hello packets are not processed by design.
Correct Answer: A Section: OSPF Explanation
Explanation/Reference:
QUESTION 82 Refer to the exhibit. R4 is configured as an OSPF stub; however, R4 should still be learning the OSPF LSA type 3 interarea routes from 209.165.202.130. Which action will solve this issue?
Exhibit:
A. Remove any route maps from R4 that are filtering the incoming OSPF updates. B. Enable sending summary LSA's by removing no-summary from the stub command on the ABR. C. Enable sending summary LSA's by removing no-summary from the stub command on the ASBR. D. Control of interarea route propagation is best handled with EIGRP.
Correct Answer: B Section: OSPF Explanation
Explanation/Reference: By default the no-summary command should NOT be enabled on the ABR as this would make Area 20 a Totally Stubby Area not a Stub area. And R4 should receive routes fro 209.165.202.130 as it is directly connected to Area 0 based off of the exhibit. This would mean that Answer A would actually be the most correct. However, if the exhibit is off and if Area 20 is a Totally stubby area than answer B would be correct. As the question is specific to OSPF LSA Type 3 routes we must assume that latter is correct and option B is the correct answer as Route Maps would more than likely not just filter Type 3 LSA's unless configured specifically for each Type 3 LSA Address.
QUESTION 83 Refer to the exhibit. An OSPF virtual link is configured between R4 and R3. Based upon the show command output, why is the virtual-link down?
A. Virtual links cannot transit area 0. B. The cost of the virtual link needs to be configured as 1. C. The timer intervals for virtual links need to be aggressive (2, 8, 8, and 1). D. The virtual interface VL1 is shut down.
Correct Answer: A Section: OSPF Explanation
Explanation/Reference:
QUESTION 84 Refer to the exhibit. An OSPF virtual link is configured between RTB and RTA. Based upon the exhibit, why is the virtual link on RTB down?
A. The cost on each end of the OSPF virtual link must be identical. B. There is a unidirectional physical layer issue from RTB to RTA. C. The OSPF virtual link neighbor IP address on RTB is incorrect. D. The virtual link state on FastEthernet0/0 of RTA must be point-to-multipoint.
Correct Answer: C Section: OSPF Explanation
Explanation/Reference:
QUESTION 85 Refer to the exhibit. Router 1 has three OSPF neighbors, but none of them have routes to the 10.10.10.0 network. Why?
A. A metric is not defined on the redistribute statement. B. Redistribution cannot be done in a non-zero area. C. The subnets keyword should not be used. D. Area 1 is a stub area. E. Area 1 is a not-so-stubby area. F. A route map must be used on the redistribute statement to permit the 10.10.10.0/24 route.
Correct Answer: D Section: OSPF Explanation
Explanation/Reference:
QUESTION 86 When troubleshooting the issue, you notice the election of a new root bridge with an unknown MAC address. Knowing that all access ports have the PortFast feature enabled, what would be the easiest way to resolve the issue without losing redundant links?
A. Enable bpduguard globally. B. Enable rootguard. C. Enable loopguard. D. Enable spanning tree. E. Enable UDLD.
Correct Answer: A Section: STP Explanation
Explanation/Reference:
QUESTION 87 You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?
A. Upgrade the switches
B. Configure BPDU guard C. Configure VLAN access lists D. Configure port security E. Configure Dynamic ARP inspection
Correct Answer: D Section: Security Explanation
Explanation/Reference:
QUESTION 88 On a router that is configured with multiple IP SLA probes, which command can be used to manage the CPU load that was created by the periodic probing?
A. ip sla monitor low-memory B. ip sla group schedule C. ip sla reaction-trigger D. ip sla enable timestamp
Correct Answer: B Section: TShoot Explanation
Explanation/Reference:
QUESTION 89 Which configuration would make an IP SLA probe use a precedence value of 3?
A. ip sla 1 icmp-echo 1.1.1.1 tos 12
B. ip sla 1 icmp-echo 1.1.1.1 tos 96
C. ip sla 1 icmp-echo 1.1.1.1 precedence 3
D. ip sla 1 icmp-echo 1.1.1.1 dscp 12
Correct Answer: B Section: TShoot Explanation
Explanation/Reference:
QUESTION 90 Refer to the exhibit. When would the EEM applet be triggered?
A. every time that the input packet per second counter is below 10,000 B. every time that the input packet per second counter has increased by 1,000 C. every time that the input packet per second counter is above 10,000 D. every time that the input packet per second counter has decreased by 1,000
Correct Answer: C Section: TShoot Explanation
Explanation/Reference:
QUESTION 91 Refer to the exhibit. Which of the following options will trigger the applet?
A. an external Cisco IOS event B. a manually run policy event C. a preconfigured timer D. an automated RPC call
Correct Answer: B Section: TShoot Explanation
Explanation/Reference:
QUESTION 92 Refer to the exhibit. Which output will the EEM applet in the exhibit produce?
A. The output of show version will be executed every 5 hours. B. The output of show log will be executed every 5 hours. C. The output of show log will be executed every 5 days. D. The output of show log will be executed every 5 minutes.
Correct Answer: C
Section: TShoot Explanation
Explanation/Reference: event_register_timer Create a timer and register for a timer event as both a publisher and a subscriber. Use this keyword when there is a need to trigger a policy that is time specific or timer based. This event timer is both an event publisher and a subscriber. The publisher part indicates the conditions under which the named timer is to go off. The subscriber part identifies the name of the timer to which it is subscribing.
Note Both the CRON and absolute time specifications work on local time.
Syntax event_register_timer watchdog|countdown|absolute|cron [name ?] [cron_entry ?] (for cron timer) [time ?] (for other types of timer) [priority low|normal|high] [maxrun ?] [nice 0|1]
Arguments
Reference http://www.cisco.com/en/US/docs/ios/12_3t/12_3t14/feature/guide/w_eempol.html
QUESTION 93 Which NetFlow version should be used to collect accounting data for IPv6 traffic?
A. version 1 B. version 5 C. version 7 D. version 8 E. version 9
Correct Answer: E Section: TShoot Explanation
Explanation/Reference:
QUESTION 94 To troubleshoot network issues more accurately, milliseconds should be included in the syslog of the router. Which command will achieve this?
A. service timestamps log datetimec msec B. logging timestamps msec C. syslog timestamps hour minute second miliseconds D. service logging timestamp msec E. logging service timestamp msec
Correct Answer: A Section: TShoot Explanation
Explanation/Reference:
QUESTION 95 Refer to the exhibit. Based on the above commands, when will the output of the show log command be saved?
A. Each time the total CPU utilization goes below 50 percent B. Each time the total CPU utilization goes above 80 percent C. Every 5 minutes while the total CPU utilization is above 80 percent D. Every 5 seconds while the total CPU utilization is above 80 percent E. Every 5 minutes while the total CPU utilization is below 50 percent F. Every 5 seconds while the total CPU utilization is below 50 percent
Correct Answer: F Section: TShoot Explanation
Explanation/Reference:
QUESTION 96 What is the purpose of an explicit "deny any" statement at the end of an ACL?
A. none, since it is implicit B. to enable Cisco IOS IPS to work properly; however, it is the deny all traffic entry that is actually required C. to enable Cisco IOS Firewall to work properly; however, it is the deny all traffic entry that is actually required D. to allow the log option to be used to log any matches E. to prevent sync flood attacks F. to prevent half-opened TCP connections
Correct Answer: D Section: ACLs Explanation
Explanation/Reference:
QUESTION 97 Which of these is mandatory when configuring Cisco IOS Firewall?
A. Cisco IOS IPS enabled on the untrusted interface B. NBAR enabled to perform protocol discovery and deep packet inspection C. a route map to define the trusted outgoing traffic D. a route map to define the application inspection rules E. an inbound extended ACL applied to the untrusted interface
Correct Answer: E Section: Security Explanation
Explanation/Reference:
QUESTION 98 Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?
A. The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSR.
B. TTL propagation cannot be disabled in an MPLS domain. C. TTL propagation is only disabled on the ingress edge LSR. D. The TTL field of the MPLS label header is set to 255. E. The TTL field of the IP packet is set to 0.
Correct Answer: D Section: MPLS Explanation
Explanation/Reference: Time-to-Live (TTL) is a 8-bit field in the MPLS label header which has the same function in loop detection of the IP TTL field. Recall that the TTL value is an integer from 0 to 255 that is decremented by one every time the packet transits a router. If the TTL value of an IP packet becomes zero, the router discards the IP packet, and an ICMP message stating that the “TTL expired in transit” is sent to the source IP address of the IP packet. This mechanism prevents an IP packet from being routed continuously in case of a routing loop. By default, the TTL propagation is enabled so a user can use “traceroute” command to view all of the hops in the network. We can disable MPLS TTL propagation with the “no mpls ip propagate-ttl” command under global configuration. When entering a label-switched path (LSP), the edge router will use a fixed TTL value (255) for the first label. This increases the security of your MPLS network by hiding provider network from customers.
QUESTION 99 Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?
A. Attempt to TELNET from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If telnet works, BGP will work, since telnet and BGP both use TCP to transport data.
B. Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport packets.
C. There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work or not, other than trying to start the peering session.
D. There is no way to make BGP work across a firewall.
Correct Answer: C Section: BGP Explanation
Explanation/Reference:
QUESTION 100 Spanning Tree Protocol IEEE 802.1s defines the ability to deploy which of these?
A. one global STP instance for all VLANs B. one STP instance for each VLAN C. one STP instance per set of VLANs D. one STP instance per set of bridges
Correct Answer: C Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 101
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree Protocol IEEE 802.1D? (Choose two.)
A. Designated Root Cost B. bridge ID priority C. max age D. bridge ID MAC address E. Designated Root Priority F. forward delay
Correct Answer: BD Section: STP Explanation
Explanation/Reference:
QUESTION 102 If a port configured with STP loop guard stops receiving BPDUs, the port will be put into which state?
A. learning state B. listening state C. forwarding state D. root-inconsistent state
Correct Answer: D Section: STP Explanation
Explanation/Reference: Loop Guard protects a switch trunk port from causing loops. It prevents switch ports from wrongly moving from a blocking to a forwarding state when a unidirectional link exists in the network. Unidirectional links are simply links for which one of the two transmission paths on the link has failed, but not both. This can happen as a result of miscabling, cutting one fiber cable, unplugging one fiber or other reasons. Let’s consider an example.
The network consists of 3 switches without Loop Guard feature. Switch 1 is the root switch. A port on Switch 3 is in blocking state, other ports are forwarding normally.
Suppose that Switch 3 does not receive BPDUs (Hellos) from Switch 2 due to unidirectional link failure on the link between switch 2 and switch 3. Switch 3 then transitions to forwarding state, and now all trunks on all switches are forwarding. Well, we have a loop!
With Loop Guard feature turned on, the blocking port on switch 3 will not transition to forwarding state but will fall into an STP loop-inconsistent state (same as blocking state).
(Reference: http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094640.shtml & CCIE Routing and Switching Official Exam Certification)
QUESTION 103 What is the purpose of the STP PortFast BPDU guard feature?
A. enforce the placement of the root bridge in the network B. ensure that a port is transitioned to a forwarding state quickly if a BPDU is received C. enforce the borders of an STP domain
D. ensure that any BPDUs received are forwarded into the STP domain
Correct Answer: C Section: STP Explanation
Explanation/Reference:
QUESTION 104 When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new bridge priority be changed to?
A. 8192 B. 16384 C. 49152 D. 65535
Correct Answer: C Section: STP Explanation
Explanation/Reference:
QUESTION 105 Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"?
A. VTP updates are ignored and forwarded out all ports. B. VTP updates are ignored and forwarded out trunks only. C. VTP updates are made to the VLAN database and are forwarded out trunks only. D. VTP updates are ignored and are not forwarded.
Correct Answer: B Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 106 Refer to the exhibit. In this network, R1 has been configured to advertise a summary route, 192.168.0.0/22, to R2. R2 has been configured to advertise a summary route, 192.168.0.0/21, to R1. Both routers have been configured to remove the discard route (the route to null created when a summary route is configured) by setting the administrative distance of the discard route to 255. What will happen if R1 receives a packet destined to 192.168.3.1?
A. The packet will loop between R1 and R2. B. It is not possible to set the administrative distance on a summary to 255. C. The packet will be forwarded to R2, where it will be routed to null0. D. The packet will be dropped by R1, since there is no route to 192.168.3.1.
Correct Answer: A Section: EIGRP Explanation
Explanation/Reference: Indeed, when you change the administrative distance of the discard route to 255, this prevents the route to be installed in the routing table but this does not prevent the route to be advertised to the other peer!
From the Cisco website: "You can configure a summary aggregate address for a specified interface. If there are any more specific routes in the routing table, EIGRP will advertise the summary address out the interface with a metric equal to the minimum of all more specific routes"
And don't forget YOU HAVE a directly connected route 192.168.1/24 in R1 and .4/24 in R2.
Then your summary is advertised, and the packet loop between R1 and R2. If you do the test with GNS3, you will see via "show ip eigrp topology" that you FD of your local subnet 192.168.1.0/24 in R1 become the metric of the summary route "192.168.0.0/22 advertise to R2 ! And viceversa. Numerically, an administrative distance is an integer from 0 to 255. In general, the higher the value, the lower the trust rating. An administrative distance of 255 means that the routing information source cannot be trusted at all and should be ignored. http:// www.cisco.com/en/US/docs/ios/12_3/iproute/command/reference/ip2_c1g.html A route with an AD of 255 would never be installed in the RIB. It is much better for the router to forward a packet to null0 following the default route than for the router to find out it has no route to destination, drop the packet and probably to send an ICMP unreachable message back to the source of that packet.
https://supportforums.cisco.com/thread/192416 You should not use the ip summary-address eigrp summarization command to generate the default route (0.0.0.0) from an interface. This causes the creation of an EIGRP summary default route to the null 0 interface with an administrative distance of 5. The low administrative distance of this default route can cause this route to displace default routes learned from other neighbors from the routing table. If the default route learned from the neighbors is displaced by the summary default route, or if the summary route is the only default route present, all traffic destined for the default route will not leave the router, instead, this traffic will be sent to the null 0 interface where it is dropped.
http://www.cisco.com/en/US/docs/ios/12_0/np1/configuration/guide/1ceigrp.html#wp4937
QUESTION 107 Refer to the exhibit. In this network, R1 is configured not to perform autosummarization within EIGRP.
What routes will R3 learn from R2 through EIGRP?
A. 172.30.1.0/24 and 10.1.2.0/24; EIGRP only performs autosummarization at the edge between two major networks.
B. 172.30.0.0/16 and 10.1.2.0/24; R2 will perform autosummarization, although R1 will not. C. Since R2 is configured without autosummarization, it will not propagate the 172.30.1.0/24 route. D. 172.30.0.0/8 and 10.0.0.0/8.
Correct Answer: A Section: EIGRP Explanation
Explanation/Reference: Explanation: R1 is not configured for auto-summary but R2 is configured for auto-summary as auto-summary is enabled by default. Therefore although 172.30.1.0 is not summarized by R1 it will be summarized by R2 when R2 advertises this route to R3. However, both of R2's interfaces are on the 10.x.x.x network and so is R3's single interface. As auto summary is performed based on classful network boundaries R2 will advertise the classless network addresses of both interfaces to R3. Auto-Summarization EIGRP performs an auto-summarization each time it crosses a border between two different major networks. For example, in Figure 13, Router Two advertises only the 10.0.0.0/8 network to Router One, because the interface Router Two uses to reach Router One is in a different major network.
Reference http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094cb7.shtml#summarization
QUESTION 108 The classic Spanning Tree Protocol (802.1D 1998) uses which sequence of variables to determine the best received BPDU?
A. 1) lowest root bridge id, 2) lowest sender bridge id, 3) lowest port id, 4) lowest root path cost B. 1) lowest root path cost, 2) lowest root bridge id, 3) lowest sender bridge id, 4) lowest sender port id C. 1) lowest root bridge id, 2) lowest sender bridge id, 3) lowest root path cost 4) lowest sender port id D. 1) lowest root bridge id, 2) lowest root path cost, 3) lowest sender bridge id, 4) lowest sender port id
Correct Answer: D Section: STP Explanation
Explanation/Reference:
Configuration bridge protocol data units (BPDUs) are sent between switches for each port. Switches use a fourstep process to save a copy of the best BPDU seen on every port. When a port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds (default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID) Step 2 Lowest Path cost to Root Bridge Step 3 Lowest Sender BID Step 4 Lowest Port ID
QUESTION 109 Which three port states are used by RSTP 802.1w? (Choose three.)
A. Listening B. Learning C. Forwarding D. Blocking E. Discarding F. Disabled
Correct Answer: BCE Section: STP Explanation
Explanation/Reference: Rapid Spanning Tree (RSTP) 802.1w is a standards-based, non-proprietary way of speeding STP convergence. Switch ports exchange an explicit handshake when they transition to forwarding. RSTP describes different port states than regular STP as described below:
QUESTION 110 Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2. What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails, without using any type of EtherChannel link-bundling?
A. Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B. Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C. Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D. Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.
Correct Answer: B Section: VLAN & VTP Explanation
Explanation/Reference:
QUESTION 111 Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?
A. GE-1/2 and GE 2/1 B. GE-1/1 and GE-2/2 C. GE-3/2 and GE 4/1 D. no ports are in the blocking state E. There is not enough information to determine which ports are in the blocking state.
Correct Answer: D Section: STP
Explanation
Explanation/Reference:
QUESTION 112 Refer to the exhibit. In the diagram, the switches are running IEEE 802.1w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?
A. GE-3/1, GE-3/2 B. FE-2/1, FE-3/2 C. GE-1/1, GE-1/2 D. GE-4/1, GE-4/2 E. GE-2/1, GE-2/2 F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2
Correct Answer: F Section: STP Explanation
Explanation/Reference:
QUESTION 113 Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? (Choose two.)
A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD
cannot. B. UDLD protects against STP failures caused by cabling problems that create one-way links. C. Loop guard detects and protects against duplicate packets being received and transmitted on different
ports. D. UDLD protects against unidirectional cabling problems on copper and fiber media. E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a
designated switch port.
Explanation/Reference:
QUESTION 114 Refer to the exhibit. Voice traffic is marked "precedence 5." How much bandwidth is allocated for voice traffic during periods of congestion?
A. a minimum of 48 kb/s B. a maximum of 48 kb/s C. a minimum of 48% of the available bandwidth D. a maximum of 48% of the available bandwidth
Correct Answer: B Section: QOS Explanation
Explanation/Reference:
QUESTION 115 Refer to the exhibit. Which of these is applied to the Bearer class?
A. WRED B. traffic shaping C. packet marking D. packet classification
E. FIFO queuing within the class
Correct Answer: E Section: QOS Explanation
Explanation/Reference: The default mechanism on most interfaces is First In First Out (FIFO). Some traffic types have more demanding delay/jitter requirements. Thus, one of the following alternative queueing mechanisms should be configured or is enabled by default:
Weighted Fair Queueing (WFQ) Class-Based Weighted Fair Queueing (CBWFQ) Low Latency Queueing (LLQ), which is in fact CBWFQ with a Priority Queue (PQ) (known as PQCBWFQ) Priority Queueing (PQ) Custom Queueing (CQ)
Reference http://www.cisco.com/en/US/tech/tk543/tk545/technologies_q_and_a_item09186a00800cdfab.shtml
QUESTION 116 Refer to the exhibit. What is the overall type of queuing being used on the outgoing data for interface Ethernet0/1?
A. LLQ B. FIFO C. CBWFQ D. priority queuing E. weighted fair queuing F. IP RTP priority queuing
Correct Answer: A Section: QOS Explanation
Explanation/Reference:
QUESTION 117 Which two of these are differences between traffic policing and traffic shaping? (Choose two.)
A. with traffic shaping, a router stores excess traffic in packet buffers until bandwidth is available again
B. with policing you can tune the buffer usage for traffic exceeding the specified CIR C. with shaping you can tune the buffer usage for traffic exceeding the specified CIR D. shaping should only be applied for ingress traffic, policing only for egress E. policing uses a token bucket algorithm, shaping uses an SPD algorithm
Correct Answer: AC Section: QOS Explanation
Explanation/Reference:
QUESTION 118 Which of these is a valid differentiated services PHB?
A. Guaranteed PHB B. Class-Selector PHB C. Reserved Forwarding PHB D. Discard Eligible PHB E. Priority PHB
Correct Answer: B Section: QOS Explanation
Explanation/Reference: Differentiated Services Definition Differentiated Services is a multiple service model that can satisfy differing QoS requirements. With Differentiated Services, the network tries to deliver a particular kind of service based on the QoS specified by each packet. This specification can occur in different ways, for example, using the 6-bit differentiated services code point (DSCP) setting in IP packets or source and destination addresses. The network uses the QoS specification to classify, mark, shape, and police traffic and to perform intelligent queuing.
Differentiated Services is used for several mission-critical applications and for providing end-to- end QoS.
Typically, Differentiated Services is appropriate for aggregate flows because it performs a relatively coarse level of traffic classification.
DS Field Definition A replacement header field, called the DS field, is defined by Differentiated Services. The DS field supersedes the existing definitions of the IP version 4 (IPv4) type of service (ToS) octet (RFC 791) and the IPv6 traffic class octet. Six bits of the DS field are used as the DSCP to select the Per-Hop Behavior (PHB) at each interface. A currently unused 2-bit (CU) field is reserved for explicit congestion notification (ECN). The value of the CU bits is ignored by DS-compliant interfaces when determining the PHB to apply to a received packet.
Per-Hop Behaviors RFC 2475 defines PHB as the externally observable forwarding behavior applied at a DiffServ- compliant node to a DiffServ Behavior Aggregate (BA). With the ability of the system to mark packets according to DSCP setting, collections of packets with the same DSCP setting that are sent in a particular direction can be grouped into a BA. Packets from multiple sources or applications can belong to the same BA.
In other words, a PHB refers to the packet scheduling, queueing, policing, or shaping behavior of a node on any given packet belonging to a BA, as configured by a service level agreement (SLA) or a policy map.
The following sections describe the four available standard PHBs:
Default PHB Class-Selector PHB (as defined in RFC 2474) Assured Forwarding PHB (as defined in RFC 2597) Expedited Forwarding PHB (as defined in RFC 2598) For more information about default PHB, see RFC 2474, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. Class-Selector PHB To preserve backward-compatibility with any IP precedence scheme currently in use on the network, DiffServ has defined a DSCP value in the form xxx000, where x is either 0 or 1. These DSCP values are called Class- Selector Code Points. (The DSCP value for a packet with default PHB 000000 is also called the Class-Selector Code Point.) The PHB associated with a Class-Selector Code Point is a Class-Selector PHB. These Class- Selector PHBs retain most of the forwarding behavior as nodes that implement IP Precedence- based classification and forwarding. For example, packets with a DSCP value of 11000 (the equivalent of the IP Precedence-based value of 110) have preferential forwarding treatment (for scheduling, queueing, and so on), as compared to packets with a DSCP value of 100000 (the equivalent of the IP Precedence-based value of 100). These Class-Selector PHBs ensure that DS-compliant nodes can coexist with IP Precedence-based nodes.
For more information about Class-Selector PHB, see RFC 2474, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers.
Reference http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfdfsrv_ps1835_TSD_Produc ts_Configuration_Guide_Chapter.html#wp998695
QUESTION 119 An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each, terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs, and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue. What action will likely fix this problem?
A. mark VOIP traffic with IP precedence 6 and configure only 'fair-queue' on the links B. configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles C. enable class-based traffic shaping on the VoIP traffic class D. enable Layer 2 fragmentation and interleaving on the links E. enable Frame Relay on the links and send voice and data on different Frame Relay PVCs
Correct Answer: D Section: QOS Explanation
Explanation/Reference:
QUESTION 120 You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?
A. data marked with DSCP AF21, VOIP marked with DSCP EF B. data marked with DSCP AF51, VOIP marked with DSCP EF C. data marked with the DE-bit, VOIP marked with the CLP-bit D. data marked with DSCP EF, VOIP marked with DSCP AF31
E. data marked with IP precedence 5, VOIP marked with DSCP EF
Correct Answer: A Section: QOS Explanation
Explanation/Reference: Expedited Forwarding RFC 2598 defines the Expedited Forwarding (EF) PHB: "The EF PHB can be used to build a low loss, low latency, low jitter, assured bandwidth, end-to-end service through DS (Diffserv) domains. Such a service appears to the endpoints like a point-to- point connection or a "virtual leased line." This service has also been described as Premium service." Codepoint 101110 is recommended for the EF PHB, which corresponds to a DSCP value of 46. Vendor- specific mechanisms need to be configured to implement these PHBs. Refer to RFC 2598 for more information about EF PHB. DSCP was designed to be more granular and more scalable than IP precedence BUT with backward compatibility.
The priority field (or type of service, ToS) was originally 3 bits, giving it the IP prec values 0-7 (0 being the lowest priority, 7 the highest). DSCP has an 8 bit field, of which 6 bits are used for markings (the 6th bit is always 0). This gives it a larger number of values (both for per hop behavior, or PHB, and drop precedence. More on this later) The last 2 bits are used for ECN or explicit congestion notification. This is a brand new feature (as of Windows Vista) and is purportedly going to revolutionize internetwork traffic flow.
With the 6 bits allotted to DSCP, the first three (left to right) are used for Major Class, or Per Hop Behavior. These match up with the old IP Prec values of 0-7. The second 3 bits identify the drop precedence. Higher = more likely to be dropped. This means that a DSCP marking of AF21 (major class 2, drop precedence of 1) will be preferred over AF22 or AF23. An AF3x will beat any AF1x or AF2x–the major class of 3 is higher than the major class, or PHB, of 2.
It is important to note the drop precedence is only used on classes 1-4. (Here is a table from Wikipedia) A marking of 0 indicates ‘best effort’
The notation DSCP xx is the bit notation. Eg AF12 = 001 100 which is a decimal value of 12. Here’s another one. AF43 = 100 110 (38) EF, which it equal to IP Prec of 5 is assigned a major class of 5 and a drop precedence of 3 (this is odd, I don’t know why this was done) The decimal value for EF is DSCP 46 or 101 110.
QUESTION 121 Refer to the exhibit. When applying this hierarchical policy map on the on the tunnel1 interface, you measure high jitter for traffic going through class 1234. What is the most likely cause of this jitter?
A. The configuration of a hierarchical policy map on a tunnel interface is not supported. B. Class 5555 and class 5554 are both taking up 100% of the bandwidth, leaving nothing for class 1234. C. The burst size for the traffic shaping is wrongly configured to 15000; this would require an interface capable
of sending at 150Mb/s. D. The burst size for the traffic shaping has been wrongly configured; it should be set as low as possible. E. The burst size for the traffic shaping has been wrongly configured; it should be set as high as possible.
Correct Answer: D Section: QOS Explanation
Explanation/Reference:
QUESTION 122 Refer to the exhibit. When applying this policy map on the tunnel1 interface, you see packet loss for the TCP class starting at around 100000 b/s, instead of the configured 150000 b/s. What is the most likely cause of the discrepancy?
A. The violate-action command should not be configured. B. The current configuration of the load-interval command on the tunnel interface is preventing proper policing
calculations. C. The burst size is too low. D. Policing on tunnel interfaces is not supported. E. The CIR keyword is missing in the policer.
Correct Answer: C Section: QOS Explanation
Explanation/Reference: Configuration Tasks See the following sections for configuration tasks for the Configuring Burst Size in Low Latency Queueing feature. Each task in the list is identified as optional or required.
Configuring the LLQ Bandwidth (Required) Configuring the LLQ Burst Size (Required) Verifying the LLQ Burst Size (Optional)
Configuring the LLQ Bandwidth To configure the LLQ bandwidth, use the following command in policy-map class configuration mode:
Configuring the LLQ Burst Size To configure the LLQ burst size, use the following command in policy-map class configuration mode:
Verifying the LLQ Burst Size To verify the LLQ burst size, use one of the following commands in EXEC mode:
Reference: http://www.cisco.com/en/US/docs/ios/12_1t/12_1t3/feature/guide/dtcfgbst.html#wp1015329
QUESTION 123 Refer to the exhibit. As a network administrator, you have configured a dual-rate, dual-bucket policer in accordance with RFC 2698 on the serial interface of you router, connecting to your provider. The SLA with your provider states that you should only send AF31 (limited to 150 kb/s), AF32 (limited to 50 kb/ s)and AF33 (best effort). Your service provider claims you are not conforming to the SLA. Which two things are wrong with this configuration? (Choose two.)
A. The configuration of a service policy on half-duplex Ethernet interfaces is not supported. B. The class class-default sub-command of the policy-map limit command should be set to the DSCP default. C. The violate action is wrong. D. This policer configuration is not implementing RFC 2698 dual-bucket, dual-rate. E. The policer is configured in the wrong class.
Correct Answer: CE Section: QOS Explanation
Explanation/Reference:
QUESTION 124 Refer to the exhibit. You have noticed that several users in the network are consuming a great deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is still heavily oversubscribing the interface. What is the cause of this problem?
A. CEF needs to be enabled for NBAR. B. In class Kazaa2, you should configure a policer instead of a drop command. C. The server class should have a priority of 100. D. The bandwidth parameter on serial 0/0 is wrong. E. Kazaa2 is not a valid protocol.
Correct Answer: A Section: QOS Explanation
Explanation/Reference: You need to enable Cisco Express Forwarding (CEF) in order to use NBAR. How do you configure Cisco IOS NBAR?
Keep in mind that in its simplest form NBAR is a traffic identification and marking system. What you do with the marked packets is up to you. For example, you could choose to drop them or choose to give them a higher quality of service.
Configuring and using NBAR to identify and block traffic is actually very easy. Let's walk through the steps.
Step 1 Make sure that CEF is on using the following command: Router(config)# ip cef
Step 2 Create a class-map, identifying the traffic you want to block. Here's an example that would stop any HTTP or MIME e-mail that contains the Readme.exe program:
Router(config)#class-map match-any bad-traffic Router(config-cmap)# match protocol http url "*readme.exe*" Router(config-cmap)# match protocol http mime "*readme.exe*"
I want to stress here that HTTP is just one of the many applications that NBAR can identify. For list of NBAR applications recognized with IOS version 12.3, use the following commands: Router(config)#class-map match-all nbar Router(config-cmap)#match pro ?
Step 3 Create a policy to mark the traffic. Here's an example: Router(config)# policy-map mark-bad-traffic Router(config-pmap)# class bad-traffic Router(config-pmap)# set ip dscp 1
Step 4 Apply the policy to the interface that faces the Internet or the source of the traffic that you want to block. This marks the traffic when it enters the router. Here's an example: Router(config)# interface serial 0/0 Router(config-if)#service-policy input mark-bad-traffic
Step 5 Create an access control list (ACL) that denies the marked traffic. Here's an example: Router(config)# access-list 190 deny ip any any dscp 1 Router(config)# access-list 190 permit ip any any
Step 6 Deny the marked traffic as it's about to exit your router by applying the ACL to an interface. Here's an example: Router(config)# interface GigabitEthernet 0/0 Router(config-if)# ip access-group 190 out When you've finished applying the configuration, you can check to see if the router marked and dropped any traffic that met this criteria. To do this, use the show access-lists command. Summary NBAR is a very powerful application-layer firewall that you may already have installed on your Cisco router.
While traditional firewalls can only recognize traffic based on IOS Layers 3 or 4, Cisco's NBAR can go all the way to Layer 7.
Reference http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a00800fc176.shtml http://www.techrepublic.com/blog/networking/what-can-ciscos-network-based-application- recognition-nbar- dofor-you/399 http://www.cisco.com/en/US/products/ps6616/products_ios_protocol_group_home.html
QUESTION 125 All of these are fundamental building blocks of a differentiated services Traffic Conditioner Block except which one?
A. dropper B. classifier
Correct Answer: D Section: QOS Explanation
Explanation/Reference:
QUESTION 126 Refer to the exhibit. You would like to guarantee 7 Mb/s for FTP traffic in your LAN, as it seems that peer-to-peer traffic is taking up a large amount of bandwidth. When testing the configuration, you notice that FTP traffic doesn't reach 7 Mb/s. What is the problem?
A. The Ethernet interface should have keepalives enabled. B. The duplex settings are wrong on the Ethernet interface. C. The qos pre-classify command should be removed from the tunnel interfaces. D. the priority queue for the voice class is probably taking all the bandwidth E. there are probably not enough interface buffers; they should be tuned.
Correct Answer: B Section: QOS Explanation
Explanation/Reference:
QUESTION 127 Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is not configured as a route reflector?
A. prefixes received from any other BGP peer and prefixes locally originated via network statements or redistributed
B. all prefixes in its routing table C. prefixes received from EBGP peers and prefixes locally originated via network statements or redistributed D. prefixes received from EBGP peers and prefixes received from route reflectors E. prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes redistributed to
BGP F. prefixes received from other IBGP peers and prefixes received from route reflectors
Correct Answer: C Section: BGP Explanation
Explanation/Reference:
QUESTION 128 You have two EBGP peers connected via two parallel serial lines. What should you do to be able to load-balance between two EBGP speakers over the parallel serial lines in both directions?
A. nothing, BGP automatically load-balances the traffic between different autonomous systems on all available links
B. peer between the eBGP speaker's loopbacks, configuring eBGP multihop as required, and use an IGP to load-share between the two equal-cost paths between the loopback addresses
C. configure a loopback as update source for both EBGP peers and have on each AS an IGP to introduce two equal-cost paths to reach the EBGP peer loopback address; it is also necessary to use the next-hop-self command
D. use the ebgp-load-balance command on the neighbor statement on both sides E. configure a loopback as update source for both EBGP peers and have on each AS an IGP to introduce two
equal-cost paths to reach the peer loopback address; it is also necessary to use the ebgp-multihop and next-hop-self commands
Correct Answer: B Section: BGP Explanation
Explanation/Reference: eBGP Multihop (Load Balancing)
RTA# int loopback 0 ip address 150.10.1.1 255.255.255.0 router bgp 100 neighbor 160.10.1.1 remote-as 200 neighbor 160.10.1.1 ebgp-multihop neighbor 160.10.1.1 update-source loopback 0 network 150.10.0.0 ip route 160.10.0.0 255.255.0.0 1.1.1.2 ip route 160.10.0.0 255.255.0.0 2.2.2.2
RTB# int loopback 0 ip address 160.10.1.1 255.255.255.0 router bgp 200 neighbor 150.10.1.1 remote-as 100 neighbor 150.10.1.1 update-source loopback 0 neighbor 150.10.1.1 ebgp-multihop network 160.10.0.0 ip route 150.10.0.0 255.255.0.0 1.1.1.1 ip route 150.10.0.0 255.255.0.0 2.2.2.1
This example illustrates the use of loopback interfaces, update-source, and ebgp-multihop. The example is a workaround in order to achieve load balancing between two eBGP speakers over parallel serial lines. In normal situations, BGP picks one of the lines on which to send packets, and load balancing does not happen. With the introduction of loopback interfaces, the next hop for eBGP is the loopback interface. You use static routes, or an IGP, to introduce two equal?cost paths to reach the destination. RTA has two choices to reach next hop 160.10.1.1: one path via 1.1.1.2 and the other path via 2.2.2.2. RTB has the same choices.
QUESTION 129 Which three of these statements about penultimate hop popping are true? (Choose three.)
A. It is used only for directly connected subnets or aggregate routes. B. It can only be used with LDP. C. It is only used when two or more labels are stacked. D. It enables the Edge LSR to request a label pop operation from its upstream neighbors. E. It is requested through TDP using a special label value that is also called the implicit-null value. F. It is requested through LDP using a special label value that is also called the implicit-null value.
Correct Answer: ADF Section: MPLS Explanation
Explanation/Reference: In order to implement penultimate hop popping, the edge LSR requests a label pop operation from its upstream neighbor via LDP or TDP using a special implicit-null label. This label has a value of 3 for LDP and 1 for TDP.
QUESTION 130 Which of these best identifies the types