2013.12.31最新的CCIE网络战1.1. QUESTION 1 Which command is used to enable EtherChannelhashing for Layer 3 IP and Layer 4 port-based CEF? 3 n8 Y, B& X- P8 E( n
d. @ A4 e- B( ?A. mplsip cef B. port-channelip cef C. mplsip port-channel cef D. port-channel load balance E. mplsip load-balance F. ipcef EtherChannel channel-id XOR L4 G. ipcef connection exchange / e9 X0 B) }# H
Correct Answer  Section: (none) Explanation
3 b: T! B( z& X" o6 nExplanation/Reference: Explanation: Port-channel load balance is normally used forenable etherchannel hashing for Layer 3 IP and Layer 4 port based CEF. 1.2. QUESTION 2 Which two statements are true about trafficshaping? (Choose two.) 9 B: l e1 O* B: x
A. Out-of-profile packets arequeued. B. Itcauses TCP retransmits. C. Marking/remarking is notsupported. D. Itdoes not respond to BECN and ForeSight Messages. E. Ituses a single/two-bucket mechanism for metering.
5 }. t4 v+ \/ y9 @$ g, d3 o, vCorrect Answer:AC Section: (none) Explanation $ }4 r+ J' ?% h( h9 a! A- L
2F%2Fstaffweb.itsligo.ie%2Fstaff%2Fpflynn%2FTelecoms%25203%2FSlides%2FONT%2520Mod% 25204%2520Lesson%25207.ppt&ei=LoDIUfTTGtO3hAeQz4HQCA&usg=AFQjCNGY24 UkAfy8tKIHlzEm9gfoIjv6fg&sig2=t4UIzkZ12wnO2988dEDyug&bvm=bv.48293060,d.ZG4(slide 6) / ^! r% L& B% h( A
1.3. QUESTION 5 In 802.1s, how is the VLAN to instance mappingrepresented in the BPDU? + K7 K- V0 t7 M) f+ J$ X% h3 J+ B
A. TheVLAN to instance mapping is a normal 16-byte field in the MST BPDU. B. TheVLAN to instance mapping is a normal 12-byte field in the MST BPDU. C. The VLAN to instance mapping is a 16-byteMD5 signature field in the MST BPDU. D. TheVLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
/ e3 l+ P y$ }+ \* q3 ~Correct Answer:C Section: (none) Explanation 0 ]( x- F- E$ z* J9 C- l/ V9 T
Explanation/Reference: Explanation: MST Configuration and MST Region Each switch running MST in the network has asingle MST configuration that consists of these three attributes: 1. An alphanumeric configuration name (32 bytes) 2. A configuration revision number (two bytes) 3. A 4096-element table that associates each ofthe potential 4096 VLANs supported on the chassis to a given instance.
6 W! O% y4 `# t1 gIn order to be part of a common MST region, agroup of switches must share the same configuration attributes. It is up to the network administrator to properlypropagate the configuration throughout the region. Currently, this step is onlypossible by the means of the command line interface (CLI) or through SimpleNetwork Management Protocol (SNMP). Other methods can beenvisioned, as the IEEE specification does not explicitly mention how toaccomplish that step. Note: If for any reason two switches differ onone or more configuration attribute, the switches are part of differentregions. For more information refer to the Region Boundary section of thisdocument.
& {: s( b$ [( fRegion Boundary In order to ensure consistent VLAN-to-instancemapping, it is necessary for the protocol to be able to exactly identify theboundaries of the regions. For that purpose, the characteristics of the regionare included in the BPDUs. The exactVLANs-to-instance mapping is not propagated in the BPDU, because the switchesonly need to know whether they are in the same region as a neighbor.
. v+ a2 m, A: m' lTherefore, only a digest of the VLANs-toinstancemapping table is sent, along with the revision number and the name. Once aswitch receives a BPDU, the switch extracts the digest (a numerical valuederived from the VLAN-to-instance mapping table through a mathematicalfunction) and compares this digest with its own computed digest. If the digests differ, theport on which the BPDU was received is at the boundary of a region. In genericterms, a port is at the boundary of a region if the designated bridge on itssegment is in a different region or if it receives legacy 802.1d BPDUs. In thisdiagram, the port on B1 is at the boundary of region A, whereas the ports on B2and B3 are internal to region B:
7 J# ^! t _; K* t2 x7 nfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image002.jpg MST Instances According to the IEEE 802.1s specification, anMST bridge must be able to handle at least these two instances: One Internal Spanning Tree (IST) One or more Multiple Spanning Tree Instance(s)(MSTIs) The terminology continues to evolve, as 802.1s is actually in apre-standard phase. It is likely these names will change in the final releaseof 802.1s. The Cisco implementation supports 16 instances: one IST (instance 0)and 15 MSTIs. 4 ]. }% P5 d% p
show vtp status Cisco switches "show vtp status" FieldDescriptions has a MD5 digest field that is a 16-byte checksum of the VTP configuration as shown below Router# show vtp status VTP Version: 3 (capable)Configuration Revision: 1 Maximum VLANs supported locally: 1005 Number of existing VLANs: 37 VTP Operating Mode: Server VTP Domain Name:[smartports] VTP Pruning Mode: Disabled VTP V2 Mode: Enabled VTP Traps Generation: Disabled
+ [1 l* q P$ c' }! |Cisco 350-001 Exam 4 U% F5 x- d- F1 U" Y
MD5 digest : 0x26 0xEE 0x0D 0x84 0x73 0x0E 0x1B0x69 Configuration last modified by 172.20.52.19 at7-25-08 14:33:43 Local updater ID is 172.20.52.19 on interface Gi5/2 (first layer3interface fou) VTP version running: 2 2 r8 T) S4 t- H& ]) B9 g9 v# d
1.4. QUESTION 6 While you are troubleshooting network performanceissues, you notice that a switch is periodically flooding all unicast traffic.Further investigation reveals that periodically the switch is also havingspikes in CPU utilization, causing the MAC address table to be flushed andrelearned. What is the most likely cause of this issue?
* j* O, {5 h7 H5 B+ nA. arouting protocol that is flooding updates B. a flapping port that is generating BPDUswith the TCN bit set C. STPis not running on the switch D. auser that is downloading the output of the show-tech command E. acorrupted switch CAM table G. p. c5 K/ m. c: S: E
Correct Answer:B Section: (none) Explanation 8 Z3 ]* B; ~- e* g
Explanation/Reference: Explanation: Spanning-Tree Protocol Topology Changes Another common issue caused by flooding isSpanning-Tree Protocol (STP) Topology Change Notification (TCN). TCN isdesigned to correct forwarding tables after the forwarding topology haschanged. This is necessary to avoid a connectivity outage, as after a topologychange some destinations previously accessible via particular ports mightbecome accessible via different ports. TCN operates by shortening theforwarding table aging time, such that if the address is not relearned, it willage out and flooding will occur. TCNs are triggered by a port that istransitioning to or from the forwarding state. After the TCN, even if theparticular destination MAC address has aged out, flooding should not happen forlong in most cases since the address will be relearned. The issue might arisewhen TCNs are occurring repeatedly with short intervals. The switches willconstantly be fast-aging their forwarding tables so flooding will be nearlyconstant. Normally, a TCN is rare in a well-configured network. When the porton a switch goes up or down, there is eventually a TCN once the STPstate of the port is changing to or from forwarding. When the port is flapping,repetitive TCNs and flooding occurs. Ports with the STP portfast featureenabled will not cause TCNs when going to or from the forwarding state.Configuration of portfast on all end-device ports (such as printers, PCs,servers, and so on) should limit TCNs to a low amount. Refer to this documentfor more information on TCNs: Understanding Spanning-Tree Protocol TopologyChanges Note: In MSFC IOS, there is an optimization that will trigger VLANinterfaces to repopulate their ARP tables when there is a TCN in the respectiveVLAN. This limits flooding in case of TCNs, as there will be an ARP broadcast andthe host MAC address will be relearned as the hosts reply to ARP.
3 |7 ^0 a' d' r% k9 g8 |1 q) r/ p
, s1 i4 G" @! k# L9 ?- @6 @$ ~" r2 {. S6 m; _
1.5. QUESTION 8 Which two statements are true about 802.1s?(Choose two.) 0 A! P! e, Z' e' h* }+ A8 o) U1 R8 O( f
A. 802.1s supports a reduced number ofspanning-tree instances. B. 802.1shas better convergence times than 802.1w. C. 802.1sdoes not support load balancing over the same physical topology. D. The CPU utilization for 802.1s is lowerthan the CPU utilization for 802.1w.
" g8 B7 ]5 O- e5 I, t, `Correct Answer:AD Section: (none) Explanation
( F" p6 P0 t! W6 l" x
+ L6 \# V* ~1 W; F$ L, `
, b% |- U3 ~9 z* |+ n Q1.6. QUESTION 9 Which configuration is used to enable root guard? # @; ~/ ^" W& c, `9 _& _
A. interface gig3/1 spanning-treeguard root B. interfacegig3/1 spanning-tree root guard C. interfacegig3/1 spanning-tree root-guard D. interfacegig3/1 spanning-tree root-guard default 7 I/ {1 ]. F' x! g4 D6 h, @0 a/ d
Correct Answer:A Section: (none) Explanation
7 X- c9 W( p% x2 M- J. x% }# X6 K/ P9 K
1.7. QUESTION 12 You are using VTP (version 2) in your network to transportVLAN information between switches. When adding a switch to the network (thathas been used in the lab previously), you notice that a lot of the existingVLANs have been deleted or replaced with other names. What can you do toprevent this from happening in the future, without losing all VTP features thatyou are using today? + Z7 G1 k1 }3 p) e/ J& \2 S
A. configurea hard-to-guess VTP domain name B. usea hard-to-guess VTP password C. useVTP transparent mode D. implement VTP version 3 4 y# \1 Q9 \3 I9 f* y! t+ C
Correct Answer  Section: (none) Explanation
! H' v( _- `2 H; y& b* X
" }! L( r- ~. t1.8. QUESTION 8 Refer to the exhibit. What can be done to removethe summary routes to Null0 on R3?
4 x8 a, {0 i6 @/ d ifile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image004.jpg ( C0 `1 w8 J" b" ^& l
A. Configurethe EIGRP routing subcommand no auto-summary on 209.165.202.155. B. Configurethe EIGRP routing subcommand no auto-summary on 209.165.202.24. C. Configurethe EIGRP routing subcommand no auto-summary on both 209.165.202.155 and 209.165.202.242. D. Configure the EIGRP routing subcommand noauto-summary on R3. 1.9. QUESTION 9 Refer to the exhibit. R4 is configured as areceive-only EIGRP stub, and is adjacent with 209.165.202.139 (R3). However, R4is not learning about network 209.165.201.0/27 from R3. What could be the causeof this issue?
, T% c( _* w1 M* wfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image006.jpg
2 y9 f- s* t8 ~" {+ b0 T( E. Y* jA. R4should learn this route from 209.165.200.242, and not from R3. B. R3 is configured as a receive-only EIGRPstub. C. R3and R4 may be using different EIGRP process numbers. D. R3and R4 are asymmetrically adjacent neighbors.
) j% ^8 n3 o6 H4 G. v5 xCorrect Answer:B Section: (none) Explanation
3 a: Q3 v: z# z6 G% `" dExplanation/Reference: " D' h9 d2 ~9 S; G
- T8 \: `6 z; {# o2 Y9 f) L3 g1.10. QUESTION 14 Refer to the exhibit. R4 is configured as an OSPFstub; however, R4 should still be learning the OSPF LSA type 3 interarea routes from 209.165.202.130. Whichaction will solve this issue?
6 v. S9 [- y* J; N, l5 y3 sfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image008.jpg
4 p1 x: z) M# [, A" SA. Removeany route maps from R4 that are filtering the incoming OSPF updates. B. Enable sending summary LSA's by removingno-summary from the stub command on the ABR. C. Enablesending summary LSA's by removing no-summary from the stub command on the ASBR.D. Control of interarea routepropagation is best handled with EIGRP. 3 F, \/ @- X) Q7 L4 F
Correct Answer:B Section: (none) Explanation
0 h9 k3 r' L% T4 j3 d, D9 hExplanation/Reference: 1.11. QUESTION 19 Refer to the exhibit. Router 1 has three OSPFneighbors, but none of them have routes to the 10.10.10.0 network. Why? 2 A4 B2 l9 c: q3 c. @$ d [
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image010.jpg
( t5 Y; ]. Y) ?$ ]A. A metric is not defined on theredistribute statement B. . B. Redistribution cannot be done in a non-zero area. C. Thesubnets keyword should not be used D. Area 1 is a stub area. E. Area1 is a not-so-stubby area. F. Aroute map must be used on the redistribute statement to permit the10.10.10.0/24 route.
& [* z3 P9 c2 t4 \9 ]5 gCorrect Answer  Section: (none) Explanation 6 R! x1 t' J% ` b Z
Explanation/Reference: 1.12. QUESTION 22 Which feature would prevent guest users fromgaining network access by unplugging an IP phone and connecting a laptopcomputer? 7 U$ [* E& `# b3 x0 K+ }$ D
A. IPSecVPN B. SSLVPN C. portsecurity D. portsecurity with statically configured MAC addresses
. M' P0 G: x" N. u, o* \; WE. privateVLANs
8 d' ]. G) k0 ~ ECorrect Answer  Section: (none) Explanation $ H* ?9 o. l: H( B" a: _
Explanation/Reference: 1.13. QUESTION 24 Refer to the exhibit. Clients that are connectedto Fa0/0 of RTA are only allowed to connect to the Internet and networks, butnot the networks on Fa1/0, Fa2/0, Fa3/0 and Fa4/0. To achieve this, you haveconfigured an ACL on RTA and applied it on the incoming direction of interfaceFa0/0. After you apply this ACL, you learn that some of these networks arestill accessible for clients that are connected to the 10.10.10.0/24network. What is the correct ACL configuration to solve this issue?
* }# m) X V# H- c% Kfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image012.jpg
0 C4 g9 {5 I, I9 AA. access-list101 deny ip any 10.1.0.0 0.0.1.255 access-list 101 permit ip any any B. access-list101 permit ip any 10.1.0.0 0.0.1.255 access-list 101 deny ip any any C. access-list101 deny ip any 10.1.0.0 0.0.252.255 access-list 101 permit ip any any D. access-list 101 deny ip any 10.1.0.00.0.3.255 access-list 101 permit ip any any 1.14. QUESTION 26 When troubleshooting the issue, you notice theelection of a new root bridge with an unknown MAC address. Knowing that allaccess ports have the PortFast feature enabled, what would be the easiest wayto resolve the issue without losing redundant links?
. W. e7 f2 W$ z. w2 A K2 z) {A. Enable bpduguard globally. B. Enablerootguard. C. Enableloopguard. D. Enablespanning tree. E. Enable UDLD. ( N) Y9 {1 r+ Z
Correct Answer:A Section: (none) Explanation 1 r. n5 v! Z. E1 i2 B3 z
Explanation/Reference: Which configuration would make an IP SLA probeuse a precedence value of 3? / h g2 ~" J- ^! W0 s/ q" L
A. ipsla 1 icmp-echo 1.1.1.1 tos 12 B. ip sla 1 icmp-echo1.1.1.1 tos 96 C. ipsla 1 icmp-echo 1.1.1.1 precedence 3 D. ipsla 1 icmp-echo 1.1.1.1 dscp 12 ; a. r! g9 J. @
Correct Answer:B Section: (none) 1.15. QUESTION 30 Refer to the exhibit. When would the EEM appletbe triggered?
. k5 ?6 J+ g& k( _file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image014.jpg - N! l, K2 ~% K- z" M
A. everytime that the input packet per second counter is below 10, 000 B. everytime that the input packet per second counter has increased by 1, 000 C. every time that the input packet persecond counter is above 10, 000 D. everytime that the input packet per second counter has decreased by 1, 000
: Y' @! t8 U0 y' c, hCorrect Answer:C Section: (none) Explanation 9 F9 T8 K4 D( c Z2 l- O$ n9 q
Explanation/Reference: 9 j8 A2 t2 O" S+ ? F) b
" M6 W0 e* ?' O: }- J/ T" X
1.16. QUESTION 31 Refer to the exhibit. Which of the followingoptions will trigger the applet?
1 J. E6 S, _: r4 Z2 ~1 ]file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image016.jpg $ {5 U, f6 a F* v, L0 Z3 `
A. anexternal Cisco IOS event B. a manually run policy event C. apreconfigured timer D. anautomated RPC call * k6 L. D% B* I
Correct Answer:B Section: (none) Explanation 2 V9 z) U- W& O J6 [
Explanation/Reference: 1.17. QUESTION 34 Which NetFlow version should be used to collectaccounting data for IPv6 traffic?
, V4 c. W9 b+ f6 ~3 F: DA. version1 B. version5 C. version7 D. version8 E. version 9 ! I" o _& O _: I& n: ?, K
Correct Answer:E Section: (none) Explanation
' T% a3 F9 G' t1 NExplanation/Reference: ference: 4 j9 b6 x- t8 S* J" g4 B* t) o
$ ^- Y+ d( o' S7 U8 _8 S
1.18. QUESTION 37 Refer to the exhibit. Based on the abovecommands, when will the output of the show log command be saved?
( R0 y2 |% K$ R- O" w' v' b0 }! efile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image018.jpg
1 ?& m* k5 S( g3 xA. Eachtime the total CPU utilization goes below 50 percent B. Eachtime the total CPU utilization goes above 80 percent C. Every5 minutes while the total CPU utilization is above 80 percent D. Every5 seconds while the total CPU utilization is above 80 percent E. Every5 minutes while the total CPU utilization is below 50 percent F. Every 5 seconds while the total CPUutilization is below 50 percent 1.19. QUESTION 47 Drag the DSCP values on left to the correctclasses on the right. Not all DSCP values will be used. . `# r# E4 Q7 H9 l( {! H
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image020.jpg 1 E5 `$ |' N3 w ]- ~, R A" ^ a" Q
/ J" y! [9 U/ J T, @1 k4 D" s# hA. B. C. D. % T: {0 d6 ?: M( L* P# i; |
Correct Answer: Section: (none) Explanation ]9 O* [( y" K1 e# }
Explanation/Reference: file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image022.jpg 1.20. QUESTION 50 Which statement is correct about an OSPFsham-link?
- a1 b2 q( p% l# Y$ x6 }6 y# t. R; g( @A. Asham-link is a logical link between PE routers that provides an OSPF adjacencybetween the PE routers and forwards customer traffic across it. B. A sham-link is a logical link between PErouters that provides an OSPF adjacency between the PE routers and carriesOSPF LSAs. C. Asham-link is a logical link between PE routers that carries OSPF LSAs andforwards customer traffic across it. D. Asham-link is a point-to-multipoint link that provides an OSPF adjacency betweenthe PE routers and carries OSPF LSAs. E. Asham-link is a point-to-multipoint link that provides an OSPF adjacency betweenthe PE routers and forwards customer traffic across it.
& N1 {, P2 m) [# ?5 Q1 D4 {Correct Answer:B Section: (none) Explanation + y7 S2 |! {" g
Explanation/Reference: 1.21. QUESTION 51 Refer to the exhibit. AS65000 has core networkP1-P6. The eBGP peers to another AS are through ASBR1-2 and ASBR3-4. All business and residentialcustomer POPs currently are connected to the P1-P2 core. Which pair of routersis the best positioned to become a BGP route reflector? : M+ B" s) Q2 k8 x
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image024.jpg ( O; J. g |9 b/ C# G
A. P1 and P2, as they have the same view ofthe exit point from the AS B. ASBR1and ASBR2, as they have eBGP peers to another AS C. ASBR3and ASBR4, as they have more eBGP peers D. anew pair of routers (RR1 and RR2) that are dedicated as a BGP route reflectorthat is connected to P1 and P3 3 J2 p3 s. k# T) ?: x; E! o
Correct Answer:A Section: (none) Explanation
: S4 B r8 J! G9 p m- dExplanation/Reference: 1.22. QUESTION 52 Refer to the exhibit. R1 has two eBGP sessions toISP1 and ISP2 (one to each ISP router), and R1 receives the same prefixesthrough both links. Which configuration should be applied for the link betweenR1 and ISP2 to be preferred for incoming traffic (ISP2 to R1)?
1 ]5 R* g9 ?1 P, }% L, gfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image026.jpg 7 B; Z$ V* J* A5 G" _4 }" @$ ]* [
A. increaselocal preference on R1 for sent routes B. decreaselocal preference on R1 for sent routes C. increaseMED on ISP2 for sent routes D. decrease MED on ISP2 for sent routes
# J6 i: y3 Q" I* MCorrect Answer  Section: (none) Explanation " W$ u! U! v# e
Explanation/Reference:
( ]6 l2 c: p6 w+ n* P& ~1 ? U: t
! Y' \! Z% T0 b+ r, q l1.23. QUESTION 55 Drag the statements on the left to the correctOSPF network type on the right. 1 q! b$ [) C9 p6 C! |: i& o
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image028.jpg A. B. C. D. 2 X) F5 |/ Q. y r! X
Correct Answer: Section: (none) Explanation
0 P/ y7 g, m6 w2 |' f; hExplanation/Reference: file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image030.jpg * ]5 \; l2 |. Q, u# h4 K9 S
1.24. QUESTION 61 Refer to the exhibit. An enterprise network hasan upstream connection to two different ISPs that are using eBGP and a publiclyassigned PI network. ISP1 is used as the primary provider, while ISP2 is usedfor backup. Due to packet loss on the link to ISP1, the network engineerschanged the default route on R1 to point to ISP2, but they could not establishany connection until they changed the default route to point back at ISP1.Which two are possible root causes of the issue? (Choose two.) ) G+ M% O- g2 t" P* _3 d
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image032.jpg & U) a/ Y5 u% x5 r
A. "ip verify unicast sourcereachable-via rx" is configured on the R1 uplinks. B. "ipverify unicast source reachable-via any" is configured on the R1 uplinks. C. "ipverify unicast source reachable-via rx" is configured on the ISP1 link toR1. D. "ipverify unicast source reachable-via any" is configured on the ISP1 link toR1. E. "ip verify unicast sourcereachable-via rx" is configured on the ISP2 link to R1. F. "ipverify unicast source reachable-via any" is configured on the ISP2 link toR1.
; a5 f; s) j6 ]. W$ a$ A6 nCorrect Answer:AE Section: (none) Explanation
5 l0 X+ |$ x, SExplanation/Reference: 1.25. QUESTION 63 Refer to the exhibit. On what will the class-mapVOICE match?
2 A/ t9 }4 `, {/ y8 N, Afile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image034.jpg
7 C# E8 q/ U7 `4 }A. onlyUDP traffic between port ranges 16384 and 32787 B. onlyDSCP EF traffic C. bothUDP traffic between port ranges 16384 and 32787 and DSCP EF traffic D. only EF traffic that is UDP and is withinthe UDP range 16384-32787 1.26. QUESTION 64 Which two statements are true about bandwidthguarantee? (Choose two.)
8 [' c8 ?- l8 n6 ^2 `6 \. ^A. When congestion is present, the prioritycommand doesn't allow exceeding the allocated rate B. Whencongestion isn't present, the priority command doesn't allow exceeding theallocated rate C. Whencongestion is present, the priority command allows exceeding the allocated rate D. When congestion isn't present, the prioritycommand allows exceeding the allocated rate % t0 N/ }; i" F. s0 f f
Correct Answer:AD Section: (none) Explanation 1.27. QUESTION 65 Which three protocols should be explicitlymanaged by using Control Plane Policing on an Internet border router? (Choosethree.) 3 o1 }6 m" N+ y( i
A. LDAP B. ICMP C. RTP D. BGP E. SSH F. RDP
3 _" v1 k$ r1 s' V' ]' A; {% bCorrect Answer:BDE Section: (none) Explanation 1.28. QUESTION 66 Refer to the exhibit. A new link has beenprovisioned between routers RTA and RTC. After all routing is configured andconnectivity is established, you are facing an application performance issuebetween network 10.2.0.0/24 and 10.3.0.0/24. When you check the routing tableof router RTC, you find out that packets toward network 10.3.3.0/24 are sentout via the slower path out of the Fa0/0 interface. What would you do to solvethis issue? file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image036.jpg , ?/ A0 F: f8 } h( w; `: R
A. changeGi0/0 on RTA to area 3 and Gi0/0 on RTC to area 2 B. changeGi0/0 on RTA to area 0 and Gi0/0 on RTC to area 2 C. changeGi0/0 on RTA to area 3 and Gi0/0 on RTC to area 0 D. change Gi0/0 on RTA to area 0 and Gi0/0 onRTC to area 0 E. changeGi0/0 on RTA to area 1 and Gi0/0 on RTC to area 1 e% Y2 ?/ h: d. _
Correct Answer  Section: (none) Explanation ' L7 J% S) C8 q ~+ ~3 o M" _
Explanation/Reference: 1.29. QUESTION 68 Which type of domains is interconnected usingMulticast Source Discovery Protocol?
: d) t9 m# W$ a: z; U0 bA. PIM-SM B. PIM-DM C. PIM-SSM D. DVMRP ! _$ `# Q8 b6 h8 {2 Q
Correct Answer:A Section: (none) Explanation I6 u ~, c; O ^! W+ b1 O
Explanation/Reference: 9 D, q0 y: e7 z$ E5 Q: R$ v
1.30. QUESTION 70 Which two multicast address ranges are assignedas source-specific multicast destination addresses and are reserved for use bysource-specific applications and protocols? (Choose two.) , ?8 ~1 o4 Q8 p
A. 232.0.0.0/8 B. 239.0.0.0/8 C. 232.0.0.0/4 D. FF3x::/32 E. FF2x::/32 F. FF3x::/16 + N* j/ V" d& ^2 W8 ~, \
Correct Answer:AD Section: (none) Explanation
# O, A" y6 D& J9 xExplanation/Reference: 1.31. QUESTION 71 How is RPF used in multicast routing?
) A C& k0 \; b2 GA. to preventmulticast packets from looping B. toprevent PIM packets from looping C. toinstruct PIM where to send a (*, G) or (S, G) join message D. to prevent multicast packets from loopingand to instruct PIM where to send a (*, G) or (S, G) join message
/ L# C! E. H) ^% D# m1.32. QUESTION 72 Refer to the exhibit. What does the incominginterface of the above (*, G) entry indicate?
4 b& O: J5 K1 w% sfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image038.jpg : h( L- W: S) G( _1 _! D
A. theinterface closest to the source, according to the unicast routing table B. theinterface where an IGMP join has been received C. theinterface with the highest IP address D. thelast interface to hear a PIM (*, G) join E. the interface closest to the RP, accordingto the unicast routing table
7 d6 i/ X4 v* U/ _- t5 J4 a+ gCorrect Answer:E Section: (none) Explanation
# \# {, T: N; c- I7 L T/ G4 n& [- dExplanation/Reference: 1.33. QUESTION 73 Refer to the exhibit. Which interface(s) willshow ip rpf 1.1.1.2 indicate as RPF interface(s)?
! ^9 T q# s% [( \) I3 P/ q+ w& f$ y/ U& F
- B* }, ~9 Q* \file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image040.jpg 1 @; n3 C T# ?. o9 v* h" s
A. Ethernet 1/0 B. Ethernet0/0 C. BothEthernet 0/0 and Ethernet 1/0 D. RPFwill fail
, G4 F9 [1 b4 k% }) O3 R) D5 MCorrect Answer:A Section: (none) Explanation
! v, G+ W( ?' BExplanation/Reference: 1.34. QUESTION 77 You are the network administrator of anenterprise company that just deployed a global IP telephony environment. Inorder to guarantee good voice quality, you asked your provider to implement QoSon the CE routers of your MPLS network. On your LAN, you have also deployedQoS. Users, however, keep complaining about bad voice quality, and the providerdoes not see matches on the DSCP values that you have asked him to match upon.What is most likely the problem?
( J$ T) F/ a) c9 j; ?- [0 LA. Thephones are not sending traffic with the correct DSCP value. B. TheCisco CallManager is not marking the traffic correctly. C. Thisis most likely a bug on the CE routers. D. Your LAN QoS is incorrectly configured. ( Z; \* X. e# x# V' i
Correct Answer  Section: (none) Explanation
e- l. y" ?) A9 J0 R/ CExplanation/Reference: 1.35. QUESTION 80 Refer to the exhibit. Router RTB is performingone-way redistribution from RIP to OSPF. Which outgoing interface will routerRTD choose for packets to the 192.168.0.0/24 network, and why?
$ P* i+ t' K& a, R2 g- g4 P
5 _9 O! J6 C2 @( {: ]! p: d2 m7 Q9 B- I9 L3 E7 ?
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image042.jpg 9 {( ^4 e4 A$ ]/ A- J- X
A. Fa0/1,because OSPF is a link-state routing protocol B. Fa0/0,because RIP is a distance vector protocol C. Fa0/0,because RIP has a higher administrative distance D. Fa0/0,because OSPF has a lower administrative distance E. Fa0/1, because OSPF has a loweradministrative distance F. Fa0/1,because RIP has a lower administrative distance
( D5 {0 J5 F9 f/ uCorrect Answer:E Section: (none) Explanation
7 |! k8 w+ c) u' k0 `Explanation/Reference: * K6 o! ~# q% O$ c) }
. g/ y% g# J% @( b! B
) ?, H" F5 `" N% d: J% Y9 e1.36. QUESTION 83 Refer to the exhibit. Which statement wouldexplain why R4 and R3 are unable to build an EIGRP adjacency? + e0 ^) s7 }. i- H5 h/ A6 ]
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image044.jpg
6 B! A5 z* g1 h. BA. Thenetwork masks on R4 (209.165.202.128/27) and R3 (209.165.202.128/28) aredifferent. B. Thelocal EIGRP process on R4 and R3 are the same (but they must be unique). C. The routing metrics on R4 and R3 aredifferent. D. R4is not routing for the network 209.165.200.224/28. 7 A# F$ Z7 _- z: T2 ?7 l
Correct Answer:C Section: (none) Explanation
5 y |* u% v! U0 S4 z8 N6 ^, gExplanation/Reference: 1.37. QUESTION 92 Refer to the exhibit. Why is the interface in theup/down state? , b+ L6 _. O" }% H, h5 V1 Q1 P4 A0 E
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image046.jpg
$ W5 x M: c; c1 b e. p$ G0 {A. Thereis no physical layer connection. B. A span session has been configured withg5/2 as the destination. C. Therewere too many input drops on the interface. D. Aspan session has been configured with g5/2 as the source 5 }6 D- a. O O# w' I
Correct Answer:B Section: (none) Explanation + k$ D4 q$ m c! c
Explanation/Reference: 1.38. QUESTION 93 Refer to the exhibit. You are investigating aperformance problem between two hosts. You have enabled NetFlow. What is most likely the cause of thisissue?
4 g' N; k0 S. e8 Y6 z1 Jfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image048.jpg 8 u+ d9 U: f1 X: W
A. A firewall is stripping the TCP MSSoption. B. Afirewall is stripping the IP MSS option. C. AnIPS is stripping the TCP MSS option. D. Thereis a VPN link causing low MTU. E. Youmust configure the MTU on the links on the router.
1 \5 `& }3 g3 m" qCorrect Answer:A Section: (none) Explanation
* f, s, z6 B; T- r; H9 O IExplanation/Reference: # E C/ d: @7 a7 _+ P
1.39. QUESTION 15 What does the command ip pim send-rp-discoveryscope 16 achieve?
2 ]) I+ d7 i' W0 i! X0 bA. itenables PIM BSR B. it makes the router an Auto-RP mappingagent C. itadvertises the router as an RP with Auto-RP D. itmakes the router an Auto-RP client
0 e: D9 U6 \1 aCorrect Answer:B Section: (none) Explanation
7 p- E* l5 z* x& rExplanation/Reference: 6 Q$ G! _' i6 ^" `4 m
+ f) C" G5 o- s; t+ U1.40. QUESTION 42 Which two are IPv6 neighbor discovery packets?(Choose two.) * F0 ? p! k- r! K7 W0 [
A. Neighbor Solicitation B. AnycastSolicitation C. AnycastAdvertisement D. Router Advertisement
' u' q% F, b+ i2 O1 m* S- |Correct Answer:AD Section: (none) Explanation
& V' k, o7 q2 H+ vExplanation/Reference: , w% T: r* s/ Z/ I& z4 e$ D
+ C/ s+ Z; J: f, U6 ?4 n- p* H: j
1.41. QUESTION 43 Refer to the exhibit. Which statement is correct? ' K6 U& L6 C! u2 D, l
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image050.jpg B* Y: ?- v5 t
A. Thepriority of both OSPF border routers is 128. B. Bothrouters are border routers for areas 128 and 0. C. The OSPF cost to both border routers is128. D. Theage of both border routers is 128.
; r( j8 e4 z9 v+ HCorrect Answer:C Section: (none) Explanation
( `7 y; q& H3 k% e9 IExplanation/Reference:
! p6 B# A* i- C- C1.42. QUESTION 46 Refer to the exhibit. RTE is redistributing somestatic routes into OSPF as E2. Which LSA will be seen in RTAand RTB for those routes?
6 Q6 a: W" W2 N2 Z. S! Ofile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image052.jpg
{" l" s! b8 _1 g% eA. LSA1 B. LSA5 C. LSA7 D. RTA/RTBwill not see any LSA for those routes, since this is NSSA and no externalredistribution is allowed % k! E7 J5 o, y: C7 ^2 F# `
Correct Answer:C Section: (none) Explanation
& |6 ]+ b( K- ^. K1 AExplanation/Reference: . R' e9 g3 P1 \# P0 h+ w
1.43. QUESTION 48 Refer to the exhibit. The next hops are learnedvia OSPF and IS-IS. Which path is selected as the best path for 10.168.0.1? % `) ?! Q3 f0 s5 z
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image054.jpg
* J4 S t. H k2 M5 L/ _A. thepath via 10.0.0.2, because it is an MPLS labeled path B. thepath via 10.0.0.2, because the next hop is learned via OSPF with an AD of 110,compared to 115 for IS-IS C. thepath via 10.0.0.3, because it has the highest router ID D. the path via 10.0.0.3, because it has thelowest IGP metric
, `$ N1 o N6 {, q/ K1 C, mCorrect Answer  Section: (none) Explanation - D: V3 z$ L5 Q& @0 p4 q: c
1.44. QUESTION 55 Which four are possible states in the BGP FSM?(Choose four.) 2 \$ t. q" R3 H3 ]+ b) R
A. Idle B. Established C. Wait D. Active E. OpenSent F. Nonconnected
2 F9 A( g. }; x( kCorrect Answer:ABDE Section: (none) Explanation
$ S3 |0 _7 s0 GExplanation/Reference:
" B) D1 u7 N# n: {% Y; o0 |* a! y$ j* L) `
1.45. QUESTION 56 In which two scenarios would MSDP be used?(Choose two.)
8 O! e; m% C0 V( t& pA. Interdomain multicast B. Anycast RP C. Distributingthe RP address to other routers D. ImplementingPIM-SSM
: Y- `1 a* ]- ?- `) k# ?, P3 WCorrect Answer:AB Section: (none) Explanation
+ s4 a; y- `5 ?/ T+ DExplanation/Reference: . O3 {6 R8 l) `# y4 H0 O: Y
1.46. QUESTION 92 When you are troubleshooting duplex mismatches,which two errors are typically seen on the full- duplex end? (Choose two.) 4 R( `# P* E# z& s5 G# n
A. runts B. FCS errors C. interfaceresets D. latecollisions 1.47. QUESTION 93 Which two options are contained in a VTP subsetadvertisement? (Choose two.) A/ A A; G) q8 |$ ~, ?
A. followersfield B. MD5digest C. VLAN information D. sequence number
+ Q; K% F4 C J( U% P+ kCorrect Answer:CD Section: (none) Explanation
8 [6 }3 F9 n1 A. A3 RExplanation/Reference: 1.48. QUESTION 98 Which two statements are true about trafficshaping? (Choose two.)
8 t: |8 n" q- l1 U: Y2 hA. Out-of-profile packets are queued. B. Itcauses TCP retransmits. C. Marking/remarking is not supported. D. Itdoes not respond to BECN and ForeSight Messages. E. Ituses a single/two-bucket mechanism for metering.
8 \) d: G3 Y7 N4 y4 p4 w* VCorrect Answer:AC Section: (none) Explanation + [" F/ b6 _- O3 R7 x" Z' F/ b
Explanation/Reference:
) i0 Z3 ~* L, d6 |+ N( R1.49. QUESTION 26 Refer to the exhibit. Which statement is correct? 5 b; t% W% y0 o# E
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image056.jpg 9 ^3 x4 d2 R4 c& i3 A
A. Thisconfiguration is not valid. B. ControlPlane Policing is configured; however you cannot determine on which interfaceit is configured. C. NTP is not configured on the router. D. Telnettraffic will be dropped.
5 K1 Z3 Z0 g+ U2 uCorrect Answer:C Section: (none) Explanation
6 g& w& f3 M0 L. y2 |' O4 ^) ~8 w! N, Z3 N( ]Explanation/Reference: 1.50. QUESTION 29 Refer to the exhibit. Which statement is correct? 9 y4 b+ i5 ?% C/ r9 b
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image058.jpg
, B4 D9 [0 h) c& N/ wA. OSPFpeers are using Type 1 authentication B. OSPF peers are using Type 2 authentication C. Authenticationis used, but there is a password mismatch D. TheOSPF peer IP address is 172.16.10.36 ! P. m" ^8 i# [! C8 B
Correct Answer:B Section: (none) Explanation Explanation/Reference: 1.51. QUESTION 56 What is true about IP Source Guard with portsecurity?
: N: ~2 N, Z6 i1 \+ i& _A. Bindingshould be manually configured. B. Itis not supported if IEEE 802.1x port-based authentication is enabled C. The DHCP server must support option 82, orthe client is not assigned an IP address. D. Itfilters based on source IP address only. 1 H1 u" O) p; v- G
Correct Answer:C Section: (none) Explanation
5 _# i5 O7 J' WExplanation/Reference: - H1 p2 {/ W( U% d# z0 _
1.52. QUESTION 60 Refer to the exhibit. A packet from RTD withdestination RTG, is reaching RTB. What is the path this packet will take fromRTB to reach RTG?
2 g8 M0 ~1 e7 @! ?( _6 W% afile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image060.jpg
3 c p4 Z4 i$ _" ]# @ ^, |2 @A. RTB- RTA - RTG B. RTB- RTD - RTC - RTA - RTG C. RTB - RTF - RTE - RTA - RTG D. RTBwill not be able to reach RTG since the OSPF configuration is wrong. 8 \. I7 [" \ P( b$ ~
Correct Answer:C Section: (none) Explanation
) a, _# P% y; a& {. P4 r: \Explanation/Reference: 1.53. QUESTION 75 Refer to the exhibit. What triggered the firstSPF recalculation? . z: ?% m$ Z$ e* ^4 M1 E, D. S/ D
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image062.jpg 7 Y1 N2 H6 A$ e) a4 `6 K$ D+ j* }- [* l
A. changesin a router LSA, subnet LSA, and external LSA B. changes in a router LSA, summary networkLSA, and external LSA C. changesin a router LSA, summary network LSA, and summary ASBR LSA D. changesin a router LSA, summary ASBR LSA, and external LSA
( v \# d* C. X, H( hCorrect Answer:B Section: (none) Explanation
3 Q. b1 U/ k* R2 R- a9 X7 z- |Explanation/Reference: ' h i& [5 Q$ T
1.54. QUESTION 76 Which two orders in the BGP Best Path Selectionprocess are correct? (Choose two.) 6 e& a/ R0 u$ e3 u3 k1 z1 f! Y) h' H
A. Higher local preference, then lowest MED,then eBGP over iBGP paths B. Higherlocal preference, then highest weight, then lowest router ID C. Highest weight, then higher localpreference, then shortest AS path D. Lowestorigin type, then higher local preference, then lowest router ID E. Highest weight, then higher localpreference, then highest MED
4 P z9 }3 K% l: e4 M, UCorrect Answer:AC Section: (none) Explanation
1 k* |* P6 P2 n t0 UExplanation/Reference:
2 w& ?" N3 M3 e; Z0 L; ~( \
5 b8 I) b. B& s+ h) P! x4 |9 ?, X) I- e
% ~& P5 d: T8 r1 G6 w/ F, _" N
1.55. QUESTION 79 What is the flooding scope of an OSPFv3 LSA, ifthe value of the S2 bit is set to 1 and the S1 bit is set to 0? ( X* S, W( Y) M) x/ G b
A. linklocal B. areawide C. AS wide D. reserved ' ~" c+ d5 Q9 X% t; r. c X7 j
Correct Answer:C Section: (none) Explanation
9 [; X% v6 x, r$ ~" c4 WExplanation/Reference: 1.56. QUESTION 10 Which value should be used in the configurationregister of a router in order to boot into bootstrap?
1 p: y6 _; ^; F/ Y1 h4 D2 O- O2 QA. 0x2102 B. 0x2142 C. 0x2124 D. 0x2101
! f) W' T. ]% ~1 ~; l3 FCorrect Answer  Section: (none) Explanation : F6 Q2 P! @# ~' N
Explanation/Reference: 1.57. QUESTION 11 Refer to the exhibit. R1 has two eBGP sessions toISP1 and ISP2 (one to each ISP router), and R1 receives the same prefixesthrough both links. Which configuration should be applied for the link betweenR1 and ISP2 to be preferred for incoming traffic (ISP2 to R1)? . k$ W( G& }) x" N0 J5 A! x
2 K# `) q$ S& h( @+ e9 Y0 m, U- n r$ [/ H
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image064.jpg
! r) B- t/ f- \/ UA. increaselocal preference on R1 for routes advertised to ISP2 B. decreaselocal preference on R1 for routes advertised to ISP2 C. increaseMED on ISP2 for routes advertised to R1 D. decrease MED on ISP2 for routes advertisedto R1 # i1 ?" `: R" N4 E( I9 S, a
Correct Answer  Section: (none) Explanation
. H5 X% _, B% [, SExplanation/Reference:
( K+ r( j L' h+ A1.58. QUESTION 15 How many bytes make up the spanning-tree bridgeID? ' f* P$ @$ ]( V/ a5 z% a) X
A. 4 B. 8 C. 12 D. 16
B. G% {& J* c) d' z" p- ~Correct Answer:B Section: (none) Explanation . e% ?: P# K7 M, _, Q' x( d
Explanation/Reference: 1.59. QUESTION 17 In which two spanning-tree port states is theport learning MAC addresses? (Choose two.) A. disabled B. blocking C. listening D. learning E. forwarding
' p7 k! ]+ A; I l qCorrect Answer  E Section: (none) Explanation
. [9 f, t# \5 Z' v) _Explanation/Reference: ! a* _1 z# o5 q5 f* ~
1.60. QUESTION 18 In an 802.1s BPDU, what is the size of theconfiguration revision number?
9 n+ v ]* F: R7 s* aA. 8bits B. 16 bits C. 24bits D. 32bits {6 N5 [+ `' m; i, n
Correct Answer:B Section: (none) Explanation 9 T C. m4 k% W- ~0 N$ R
Explanation/Reference:
4 {3 f* r7 g- a0 x$ v9 c1.61. QUESTION 19 What is the BPDU protocol version for 802.1w?
1 A/ {/ v% E. JA. 0 B. 1 C. 2 D. 3 , ~& x0 o8 L2 y3 H# i
Correct Answer:C Section: (none) Explanation
, S5 J+ |. U) g- EExplanation/Reference:
5 O" T9 W. I$ C( |9 p1 f( A2 W5 P/ ]# ~! O
1.62. QUESTION 20 Which two are natively included by the IEEE802.1w standard? (Choose two.) : T- o }5 r+ r( M& O
A. instancescan control a selection of VLANs B. loadbalancing C. fast transition to forwarding state D. backbone, uplink, and portfast (orequivalent) E. root,loop, and BPDU guard (or equivalent)
7 e/ s1 v2 Y8 N1 x! I S7 lCorrect Answer:CD Section: (none) Explanation
4 B7 r0 R! g4 _* u: }) Y5 rExplanation/Reference:
( q2 {, B2 F: ^4 J
5 Z: X# G, _/ u8 v( q1.63. QUESTION 22 Which two statements are true about LACP? (Choosetwo.) ( D* c; n+ p( K _
A. LACP packets are sent with multicast groupMAC address 01-80-c2-00-00-02. B. TheType/Field value is 0x8808. C. During detection, LACP packets aretransmitted every second. D. Thetimeout for a failed LACP channel is 30 seconds by default.
& t- S% |; Y, \: W5 BCorrect Answer:AC Section: (none) Explanation
" `" w8 E( y- _, H* Z, t1 mExplanation/Reference: 1.64. QUESTION 23 Which statement is true about TCN propagation inRSTP (802.1w)?
/ d( ?* U$ c" iA. The originator of the TCN immediatelyfloods this information through the network. B. TheTCN propagation is a two step process. C. ATCN is generated and sent to the root bridge. D. Theroot bridge must flood this information throughout the network.
\! F; w; U' V ICorrect Answer:A Section: (none) Explanation
9 U9 T! H$ U" l2 ~; r$ z, g5 G9 c! dExplanation/Reference: # I( ^9 Q& ^5 S
$ {+ t2 K6 D9 ~, Q! |# o! I
1.65. QUESTION 24 Which two tunneling techniques support IPv6multicasting? (Choose two.)
9 o8 f: u4 D: I i! _* sA. 6to4 B. 6over4 C. ISATAP D. 6PE E. GRE
. ]9 V! {$ c! ~' BCorrect Answer:BE Section: (none) Explanation 0 F4 u- n$ n4 w( f
Explanation/Reference: 1.66. QUESTION 27 Refer to the exhibit. This is an MPLS VPN networkwith OSPF as the PE-CE routing protocol. Which statement is correct?
6 x/ l4 d! ~1 s2 M" G* Jfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image066.jpg $ B. u N- O, B R& u
A. Therouting inside the VPN RED will never work correctly. B. Therouting inside the VPN RED can be enabled by configuring virtual links betweenthe PE routers. C. The routing insidethe VPN RED can be enabled by configuring area 0 inside the VRF on the PE routers. D. The routing inside the VPN RED will workwithout any special OSPF configuration. E. Therouting inside the VPN RED will work if the PE routers have a full mesh ofsham-links configured for VRF RED.
. b. F( K0 @- ^* aCorrect Answer  Section: (none) Explanation
: }4 l C ]: S% Q4 M3 a$ SExplanation/Reference: 1.67. QUESTION 30 Which command can be used on a PE router toconnect to a CE router (11.1.1.4) in VRF red? 1 \, j4 m2 n b# [
A. telnet11.1.1.4 /vrf-source red B. telnet11.1.1.4 source /vrf red C. telnet11.1.1.4 /source vrf red D. telnet 11.1.1.4 /vrf red E. telnet11.1.1.4 vrf red + b/ t# U9 {3 N
Correct Answer  Section: (none) Explanation
; s, E& a9 J7 ]2 ^4 W, N2 L. b+ M+ m* GExplanation/Reference:
$ h! W \9 t9 ^" f! e0 n3 U
/ [& v# S4 N: Z. s5 a: ^+ P1.68. QUESTION 49 What is the Internet Protocol Number for all PIMcontrol Messages? + u9 J9 I7 s. K- Z1 z0 W1 U
A. 15 B. 17 C. 25 D. 103
5 H6 Z( W, D# r5 n5 g2 ~Correct Answer  Section: (none) Explanation ! ]6 z+ _0 x/ I! Z) m9 J
Explanation/Reference: 1.69. QUESTION 50 Which value is used in the PIM TYPE field toindicate a Join/Prune message? A. 0 B. 1 C. 2 D. 3
6 G& j+ N* c( M, x2 {0 F% CCorrect Answer  Section: (none) Explanation
8 Q! y# G) o0 b- v+ P. W, }) K+ LExplanation/Reference:
. v; ~1 L* r' {/ h0 n0 s) J4 Y& p3 R- [5 E( _+ g1 R
1.70. QUESTION 62 Refer to the exhibit. If the router that producedthe output in the exhibit fails, which virtual IP address will become activewhen the router recovers? ( k* Z! g: f$ I# S
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image068.jpg ! O T$ c1 x# ~7 a2 ?
A. 10.1.1.1 B. 10.1.1.2 C. 10.1.1.101 D. Allgroups
: F" o& o+ e( v9 ]Correct Answer:A Section: (none) Explanation
8 J$ y; M5 W- v8 @ YExplanation/Reference: $ |* K7 g1 ^' p8 w" W% d5 d
1.71. QUESTION 63 Which statement is true about shaping?
+ w' m4 m% c1 t4 m9 T. A5 d& | B; gA. Shaping supports queuing of excesstraffic. B. Shapingcan be applied both input and output on interfaces. C. Shapingdoes not introduce delay in voice packet handling in the event of congestion. D. Shapingmakes instantaneous packet drop decisions. + @4 j4 u1 N$ H# r. w
Correct Answer:A Section: (none) Explanation 1.72. QUESTION 65 Where should frame-relay traffic shaping beapplied?
9 g" B; M& _- B% @) YA. on the physical interface B. onthe subinterface C. underthe frame-relay map class D. onany of the above
7 z6 Z R7 q* {0 G+ E& oCorrect Answer:A Section: (none) Explanation
+ v/ _7 S5 k9 l0 WExplanation/Reference:
: ]2 C f# Y+ b! K4 h8 L1.73. QUESTION 66 How can excess packets be remarked? & m( }! w/ l0 i* ~" i% C
A. shaping B.policing C. priority D. allof the above 2 `" ]0 g4 e, n: o, V1 N, E
Correct Answer:B Section: (none) Explanation
- T; v; f3 r: o/ ~1.74. QUESTION 67 A new backup connection is being deployed on aremote site router. The stability of the connection has been a concern. Inorder to provide more information to EIGRP regarding this interface, you wishto incorporate the "reliability" cost metric in the EIGRP calculationwith the command metric weights 1 0 1 0 1. What impact will this modificationon the remote site router have for other existing EIGRP neighborships from thesame EIGRP domain? ) d# R, ~) B+ O [5 Z
A. Existingneighbors will immediately begin using the new metric. B. Existingneighbors will use the new metric after clearing the EIGRP neighbors. C. Existing neighbors will resync,maintaining the neighbor relationship. D. All existing neighborrelationships will go down. Correct Answer  Section: (none) Explanation
, Z+ t, \+ n0 m) V4 I, dExplanation/Reference:
- |4 z, Q. l( _0 e/ I9 D* A8 D4 N9 Y2 a* h% o1 `! {9 D% B
1.75. QUESTION 73 Refer to the exhibit. A small enterprise connectsits office to two ISPs, using separate T1 links. A static route is used for the default route, pointing toboth interfaces with a different administrative distance, so that one of thedefault routes is preferred. Recently the primary link has been upgraded to anew 10 Mb/s Ethernet link. After a few weeks, they experienced a failure. Thelink did not pass traffic, but the primary static route remained active. Theylost their Internet connectivity, even though the backup link was operating.Which two possible solutions can be implemented to avoid this situation in thefuture? (Choose two.)
" |) s* ]6 {7 S: O1 j! R6 ?4 Cfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image070.jpg
h3 R H' l ?9 Y: E& ^ M5 HA. ImplementHSRP link tracking on the branch router R1. B. Use a track object with an IP SLA probefor the static route on R1. C. Trackthe link state of the Ethernet link using a track object on R1. D. Use a routing protocol between R1 and theupstream ISP.
! F7 Y8 t5 q$ j1.76. QUESTION 76 Which two commands are required to enablemulticast on a router, knowing that the receivers only support IGMPv2? (Choose two.) , }/ x4 J1 I9 E, b0 w
A. ip pim rp-address B. ippim ssm C. ip pim sparse-mode D. ippim passive
( k: Q$ {6 _; z9 e& K$ Z: YCorrect Answer:AC Section: (none) Explanation 0 E1 k/ T. v. K. L
Explanation/Reference: * w4 v' S8 c$ U4 G
* K& c6 k0 r5 W6 h; E1.77. QUESTION 79 Which command is used to enable EtherChannelhashing for Layer 3 IP and Layer 4 port-based CEF? : A v2 V- Q3 O& q d- U7 t
A. mplsip cef B. port-channelip cef C. mplsip port-channel cef D. port-channel load balance E. mplsip load-balance F. ipcef EtherChannel channel-id XOR L4 G. ipcef connection exchange
* [" ^9 N; s9 d- T5 lCorrect Answer  Section: (none) Explanation
: v1 Y2 g" L' \1 cExplanation/Reference: 1.78. QUESTION 12 Refer to the exhibit. Clients in VLAN 10 complainthat they cannot access network resources and the Internet. When you try toping the default gateway from one of the affected clients, you get pingtimeouts. What is the most likely cause of this issue? - t1 ^7 `- F! I# a: L
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image072.jpg 9 j3 S$ q1 h; d
A. VLAN10 is only enabled on trunk interfaces. B. VLAN 10 is not created in the switchdatabase. C. STPis not running on the switch. D. IP routingis disabled on the switch. E. Theswitch CAM table is corrupted. , p. D; g+ d7 B) }4 j
Correct Answer:B Section: (none) Explanation % W. B; b, k; Q+ O) T! e1 I9 s
Explanation/Reference:
6 |. S H) ~4 F" `% N# L1 e' _+ S1.79. QUESTION 13 Refer to the exhibit. Which action would make therouter the active VRRP router? 才 file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image074.jpg - C7 e) I3 l7 X
A. Recover interface Serial 1/0. B. Increasepriority in the configuration to 100. C. Changethe interface tracking priority to 100. D. Recoverinterface Serial 1/1. , T. L1 J9 b- J
Correct Answer:A Section: (none) Explanation
0 L4 ^" M! s; [0 V) b. W: K+ y# |' NExplanation/Reference: 1.80. QUESTION 17 Refer to the exhibit. What does"(192.168.1.1)" indicate in the output?
9 ~3 \) k# [' O$ x1 E% b& dfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image076.jpg / e, U7 P) m' h# c* ]) ?
A. the BGP router ID of the eBGP peer B. theadvertising route reflector cluster-id C. therouter originating this prefix D. theBGP router ID of the iBGP peer E. ourlocal router ID F. theBGP next hop for this route ( b$ E" M! q; J
Correct Answer:A Section: (none) Explanation
0 J+ ?; A6 o0 i) g+ H$ UExplanation/Reference: 1.81. QUESTION 24 What is the Cisco IOS command to turn on explicitnull forwarding by LDP?
4 ^4 V2 A* y0 i2 a, g$ EA. ldpexplicit-null B. mplsforwarding explicit-null C. mplsldp advertise-labels explicit null D. mpls ldp explicit-null Correct Answer  Section: (none) Explanation
$ b/ z5 g: k# [$ u5 K3 gExplanation/Reference:
6 {% [ ~2 q+ L1.82. QUESTION 28 Refer to the exhibit. By default, why will BGPchoose a locally originated route over any iBGP or eBGP learned route? - `2 o- @: w( ?) T! l
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image078.jpg
( W& i, D% k" m6 I, B3 m2 I( H8 }A. TheIGP metric to the next hop is always shorter. B. Locallyoriginated routes have a better AD than eBGP or iBGP routes. C. Alllocally originated routes have a better origin code. D. Locallyoriginated routes have a higher metric. E. Locally originated routes have a weight of32, 768.
2 ?. U, X9 ?( I# t; oCorrect Answer:E Section: (none) Explanation / ~$ Q* h; c' K! e& n
Explanation/Reference: 1.83. QUESTION 34 Which two statements are true about 802.1s?(Choose two.)
5 h9 ^3 ]8 B) i4 F6 GA. 802.1s supports a reduced number ofspanning-tree instances. B. 802.1shas better convergence times than 802.1w. C. 802.1sdoes not support load balancing over the same physical topology. D. The CPU utilization for 802.1s is lowerthan the CPU utilization for 802.1w.
6 g; m2 A1 J) j4 N- Z3 bCorrect Answer:AD Section: (none) Explanation Explanation/Reference: 1.84. QUESTION 43 Which configuration is used to enable root guard?
" C( u* ^9 ?3 JA. interface gig3/1 spanning-treeguard root B. interfacegig3/1 spanning-tree root guard C. interfacegig3/1 spanning-tree root-guard D. interfacegig3/1 spanning-tree root-guard default 9 l2 `5 w1 X$ a3 q8 n
Correct Answer:A Section: (none) Explanation ! b8 Z$ @; ?7 J4 F" ~
Explanation/Reference: 1.85. QUESTION 45 Which three causes could prevent a host fromgetting an IPv6 address with stateless autoconfiguration? (Choose three.) 9 h1 n0 Z5 N8 n0 e6 v
A. Theautoconfig command is missing from the router interface. B. IPv6multicast routing is not enabled on the router interface. C. IPv6 unicast routing is not enabled on therouter interface. D. The router interface is configured with a/63 mask. E. The router interface is configured with a/65 mask.
. h4 [, m! `) K/ r1 O' A4 u; yCorrect Answer:CDE Section: (none) Explanation 9 I( Z5 |7 D, I* `' s# r) M3 k R
Explanation/Reference: 1.86. QUESTION 49 Which two EIGRP options will limit a querydomain? (Choose two.)
6 v4 i4 f3 w$ WA. configuring EIGRP stubs B. configuringa second EIGRP AS and redistributing C. configuring summary addresses D. configuringan offset-list E. configuringa prefix-list F. configuringunicast neighbors * ~4 W# w0 g* p
Correct Answer:AC Section: (none) Explanation 1.87. QUESTION 50 Which three options are valid ways to filterroutes from a BGP peer? (Choose three.)
' B) O; K) B G8 g! Y" G0 i" E+ ]A. filter-list B. inboundACL C. route-map D. outboundACL E. prefix-list F. neighbor10.0.0.1 deny-map my-map command
4 q/ I& t* O% I0 k$ f( H" A, UCorrect Answer:ACE Section: (none) Explanation
/ y* Z* j4 v. O/ f/ }Explanation/Reference:
: C$ q( u- m, v8 h+ ]1.88. QUESTION 55 Which multicast address is reserved forcisco-rp-discovery?
3 B$ K6 J7 j0 @. DA. 224.0.1.37 B. 224.0.1.38 C. 224.0.1.39 D. 224.0.1.40
( M- G! [! l/ _ X6 K! O/ ACorrect Answer  Section: (none) Explanation & i( x2 }4 B) u0 p: `
Explanation/Reference:
* `6 {" c7 D- K+ E) e4 ?) O; \, g2 Q# c# _ R% o" u6 j( g
1.89. QUESTION 64 In GLBP, which router will answer on client ARPrequests? 4 Y9 e k% V6 t) T+ ]$ q
A. allactive AVF routers as the first response is used by the client B. the AVG router, replying with a differentAVF MAC address each time C. arandom AVF router, based on a GLBP seed hash key D. onlythe AVG router that received the ARP request first + g, c6 e; v$ V+ P2 ]# z
Correct Answer:B Section: (none) Explanation t, z0 l2 ]) |; ? F
Explanation/Reference: % e, y8 g: x. @
1 G: y4 y4 n3 P4 W
1.90. QUESTION 66 What is the command to configure RSVP to reserveup to one-tenth of a Gigabit link, but only allow each individual flow to use 1MB/s?
k( \. D3 o; d* gA. ip rsvp bandwidth 100000 1000 B. iprsvp bandwidth 100000 1 C. iprsvp bandwidth 10 1 D. iprsvp bandwidth 1000000 1000 * \* t/ E' I( F% t" |0 `
Correct Answer:A Section: (none) Explanation
# m* _) v6 g+ D$ f# G1 U2 gExplanation/Reference: ' C+ X% _9 |3 X4 |/ W) Y
1.91. QUESTION 68 Which protocol and port have been assigned byIANA for RADIUS authentication?
# c. b R' N/ |4 h IA. UDP/1812 B. UDP/1813 C. TCP/1812 D. TCP/1813
% e0 W8 y) r# y8 ]Correct Answer:A Section: (none) Explanation
; q# k; c" O9 lExplanation/Reference: " ]! h! J# p% p7 t9 x1 c) O
. K1 @: C7 H- ~& Q" N( @# [* G# b1.92. QUESTION 70 Refer to the exhibit. What is true about trafficfrom the INSIDE zone to the OUTSIDE zone?
$ W1 P; R: ^. g O9 a. ]file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image080.jpg 8 |: Z* g' {1 D6 c2 y, S
A. All icmp echo requests will be inspected. B. AllIP traffic will be dropped. C. Allicmp echo requests will be passed, but the icmp echo reply to the echo requestfrom the OUTSIDE zone will be dropped. D. AllIP traffic will be inspected.
1 x" }* v3 f9 V2 r5 D3 ACorrect Answer:A Section: (none) Explanation * K Z x$ X# H$ k. S" Y
Explanation/Reference:
% J1 e" d' V4 S/ ~7 d: H
+ b0 h) e% E# p8 R) [8 b/ T- \6 ]- u1 u6 C& s2 ?- p7 K t# n
1.93. QUESTION 72 Refer to the exhibit. A user with IP address10.10.10.200 fails to telnet to a switch with IP address 10.10.20.2. What is the cause of the issue?
4 {9 M y6 k% e% K* Wfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image082.jpg : }# _% B$ Y/ l* `* q( U, _4 O0 h
A. Theswitch is not configured with a default gateway. B. TheHTTP server is not enabled on the switch. C. STPis blocking the connection from switch to router. D. IP routing is enabled on the switch, butno route pointing back to the client is configured. E. Theswitch is configured with an IP address from the wrong subnet. * O, f1 n+ H, F1 z# ~+ q2 H9 @! Q
Correct Answer  Section: (none) Explanation
; J+ C" |/ S. ? XExplanation/Reference: 1.94. QUESTION 74 Refer to the exhibit. You get reports thatWindows users cannot log in anymore when the main MPLS link is down. Themessage that users receive is, "There are currently no login serversavailable to service the login request." However, if you modifythe MTU of the client machine to 1294, the user can log in. What would be areliable fix for this issue? . J9 q V8 `* c9 `. l
file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image084.jpg : D/ M% M1 A1 P& G
A. add"ip tcp mss-adjust 1254" to se1/0/0 B. add"ip tcp mss-adjust 1254" to se1/0/0 and fa1/0 C. force Windows to use TCP for Kerberos D. add"ip icmp error-send" to se1/0/0 . S# |# N7 I4 V) b8 m
Correct Answer:C Section: (none) Explanation 1.95. QUESTION 75 Refer to the exhibit. What is preventing R4 fromlearning any networks via OSPF?
, s6 |$ G; m& M$ @4 u q- Pfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image086.jpg
E6 C" a+ p/ z" P9 z3 \- ]A. R4 does not have any OSPF neighbors. B. Thereis no OSPF backup designated router on FastEthernet0/0. C. TheOSPF area number for FastEthernet0/0 does not match the interface network. D. Thereare no OSPF learned routes in the network beyond R4. 3 t* ]* ]7 Z j' o$ ^; U) h E( o
Correct Answer:A Section: (none) Explanation / M& X8 b! o& D
Explanation/Reference: 1.96. QUESTION 76 Refer to the exhibit. Which result will the EEMapplet in the exhibit produce?
: r' }8 L+ y4 g q1 hfile:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image088.jpg + P9 H: a' f7 L: S' [8 c0 `$ w. c2 w% Q
A. Theoutput of show version will be executed every 5 hours. B. The output of show log will be executedevery 5 hours. C. Theoutput of show log will be executed every Friday. D. Theoutput of show log will be executed every 5 minutes.
1 S! k2 \6 M/ S& H4 }9 ^Correct Answer:B Section: (none) Explanation 2 i& \! k9 t$ G5 D. f& A% M
Explanation/Reference: 1.97. QUESTION 87 Refer to the exhibit. What problem does the debugip ospf event output from R4 indicate?
( o. X% M% C- h5 |file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image090.jpg
' K. J! y0 y: Y0 X1 ?- U! ^A. amismatched dead timer between R4 and 209.165.202.130 B. amismatched hello timer between R4 and 209.165.202.130 C. mismatchedareas between R4 and 209.165.202.130 D. mismatched masks between R4 and209.165.202.130 2 G. Z: g9 t7 W
Correct Answer  Section: (none) Explanation 报916分通过# A( G3 q! ~; Y7 S( _% Y
|