What needs to match to allow EIGRP rollover?
' n$ Q z5 s, F9 P) z-syslog
9 [) d! d3 D0 W* E3 S( f0 Y& S-time/ G6 O3 s* V4 C) C' t2 Z/ L+ g
-snmp2 R8 z" T- V( ^2 F
-Password1 b( F ?; e& C0 d+ S! `9 _
————————————
" `! q! j" N; C7 |7 wConsidering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation2 k. [" i- ~7 R% G* {* P
? rewriting of higher layer information
+ ?8 X8 v# Q2 n* b! r9 W? chacksum verification- t8 R5 e% Q' [
? ipv6 duplication and conservation
* d1 Y' b3 {; i; Y7 V? IPSEC AH header modification
1 w+ P9 M/ v" X" b, R———————————————-/ E; E" T4 X' K! J
Which two options are causes of out-of-order packets? (Choose two.)
6 {9 _2 l7 X, ]A. a routing loop7 F* J* S( `+ w7 O! b
B. a router in the packet flow path that is intermittently dropping packets9 t* A4 q, A% m) i
C. high latency% e& O( u w' q; H! e
D. packets in a flow traversing multiple paths through the network
! Y( {! R+ }) N9 pE. some packets in a flow being process-switched and others being interrupt-switched on a transit Router& g0 f* O. p: Z, E/ B
——————————————————————————————————————: Q8 L( G2 d) P
How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?4 r! J& u3 {0 o. S1 d
A. Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface.) @8 J. r2 Y! r0 T
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
( p7 Q. ]6 Q5 a! f/ \5 PC. Configure many subinterfaces in the same subnet.! [' `. W1 b$ F$ Y
D. Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.* K+ _& @+ j* ~0 Z' a, G; U, X
E. Disable split horizon ~+ D/ ?+ {8 \+ ~- f3 s/ i: W
———————————————————————————————————————-
( q& z, T3 A# ^. IDrag and Drop of CHAP process – three way handshake (CHAP) put it in order
4 H! e% |3 R( h3 B' i1. After the LCP (Link Control Protocol) phase is complete, and CHAP is negotiated between both devices, the authenticator sends a challenge message to the peer.5 T: M1 x& I+ Q- w
2. The peer responds with a value calculated through a one-way hash function (Message Digest 5 (MD5)).
1 s1 |' l1 J: `4 S' Z3. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is successful. Otherwise, the connection is terminated.
+ S+ f C3 J* ^2 E8 ?" xDrag and drop (CHAP, its in the comments, very easy, challenge 1st, md5 2nd, terminates 3rd).4 e( E0 Q3 C) P+ {2 V R+ B) y
————————————————————————————————————-8 q0 f! r( O# T9 A3 k+ _' p9 V5 [) Q
Your company uses Voice over IP (VoIP). The system sends UDP datagrams containing the voice data between communicating hosts. When areas of the network become busy, some of the datagrams arrive at their destination out of order. What happens when this occurs?+ \* B0 m, v* t/ L+ R
A. UDP will send an ICMP Information request message to the source host.
' J0 L9 ?& H' E, A' k0 i# lB. UDP will pass the information in the datagrams up to the next OSI layer in the order in
# C5 g" ^9 Z8 O2 I1 p9 Kwhich they arrive.
+ X) e# ~8 z1 ~C. UDP will drop the datagrams that arrive out of order.
7 W1 t6 Z! a( s1 v% `6 TD. UDP will use the sequence numbers in the datagram headers to reassemble the data into the- ]+ m1 O+ j& s# g; I3 \+ b4 W
order in which it was transmitted.$ f2 g7 N2 w: {1 i4 A& P
ANS: B
1 D0 `5 t8 A* u0 O———————————————————————————————————————-( E# d9 x, }+ `$ A
which IP SLA blablabla to monitor entreprise class network (chose 3)5 ]: k+ e5 q( C. z1 b3 X
– bandwidth% L2 p) k! W# t1 M$ G2 ?
– delay ***% V. m1 U/ r8 o) }
– reliability, N, G0 Y% B- Y. Y
– packet loss ***( K7 r E* E0 F, H! r5 [/ |: M' q
– traps
% d7 ~: D+ s3 @2 t z– connectivity ***4 b1 N3 T) a- V; J+ K
—————————————————————————-6 Y: H1 W( S! x" ]) S1 R+ t( O3 {" Q
CEF at what layer works
* W1 w) K( m$ d8 Q5 R' X- E– Layer 3 *9 o% h1 N- x# O) V% d
– Layer 2- r- U' N+ _) s3 i/ ~) ^2 c& b" w( r
– Layer 4! D$ _5 O4 [% d V* N* U
– Layer my ass —————————————————————————————–' i( G7 }1 Y5 l9 o0 H6 U" |9 Z
Something about an administrator wants to know when an IP SLA threshold is reached. (choose two)
# R( g8 k3 s ^! F. l% ?0 Z– MOS' A' V" _- G# _$ J+ F
– Treshold action/ h1 } |+ w) Q- I6 F" d, m$ U
– Cisco EMS
8 q2 I0 C! w( _1 p) M– SNMP traps, K& n4 A, ]! U: O1 Q
– IOS balblalb8 W! l) c$ J# `" W1 e2 Q
– loggin console
8 {* T6 K, A. K9 a——————————————————————————————————–6 D& s/ v' @! w6 t/ D* W
What enable secret command tells the os to set encrypted password that you copy from another switch configuration5 u# G+ w( O$ W/ s! _/ ~! }' `
Enable secret 5 $%%^82748273# A& c7 N( _1 l8 \$ ^
Enable secret 7 $%%^82748273
% p. B, c& `! s2 t9 ]Enable secret $%%^82748273
6 A, T! _0 O7 S4 C6 h' s$ o7 hEnable secret 0 $%%^827482737 x; d5 V7 E7 r& E, b( p' b( X
answer: 1% T1 H0 w5 M6 V$ d# ^
————————————————————————/ O3 E* ~- z, U _# s/ t
Question 2
! _. Y' `0 O9 a3 R4 U0 S% B MWhich alerts will be seen on the console when running the command: logging console warnings.$ W+ Y/ ^( H: w$ H
A. warnings only# h6 p7 v) n+ B. [6 ?& I' z
B. warnings, notifications, error, debugging, informational
8 G" `; P& J e1 p7 jC. warnings, errors, critical, alerts, emergencies
1 s% G( {% O2 A2 S6 \D. notifications, warnings, errors2 V: q4 E! t0 x8 \+ |: ?, R
E. warnings, errors, critical, alerts; o+ j3 F; C4 K4 C" y
Answer: C- y3 }" `, H& N1 [$ E W% u
——————————————————————————————–3 I! G9 i: u& C) k* ?- H/ A' P# {" o
Q. when the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true; M0 N# @6 Z* m# z. M
-The router must have a route installed towards the tunnel destination
) O: D$ L% ~6 S: l7 z3 \2 c% W7 @-the router must have wccp redirects enabled inbound from the tunnel destination
! I0 I: d) d/ A) }" \: W: O-the router must have cisco discovery protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination
9 z$ d( W! s- H q1 n. D-the router must have redirects enabled outbound towards the tunnel destination* V. _* V2 q' x# n1 E! i
——————————————————————————————————————-
6 D% L% T/ F- V. u/ Q' @Q. A network engineer receives reports about poor voice quality issues at a remote site. The network engineer does a packet capture and sees ot-of-order packets being delivered. Which option can cause the VOIP quality to suffer?/ A! @3 n! k7 }6 j( ^4 ]6 j/ t
-traffic over backup redundant links
7 k4 y) p; p$ V+ m9 {7 @/ k$ H– misconfigured voice vlan
% j# k5 Y2 A5 m" x& k( l5 i– speed duplex link issues1 c2 J( t! T9 k
– load balancing over redundant links
$ b0 K& v# L" k5 W7 {———————————————————————————————————–
+ D9 m4 {/ C6 D7 @* lQ. Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation?' ^0 a, O8 \/ [
– rewriting of higher layer information
) H, B5 U5 ]( P! @7 y, K8 Y# j# p- w: w– chacksum verification
+ x$ x& l2 j v- C" G( S; G– ipv6 duplication and conservation
. P) q7 D0 `" t$ W8 ~2 y– IPSEC AH header modification
, s' m8 \3 B/ n. [————————————————————————————-
6 A7 h$ Z2 I4 q3 J# z9 x; fq9 c y* b$ b9 z/ g) M1 J
Access-list 1 permit 192.168.1.16 k7 P% G# S/ C: h% W+ l
access-list 1 deny any1 _, R+ M% Q- C) U5 ~5 v
Access-list 2 permit 192.168.1.4
7 V! B7 Z3 X1 s0 oaccess-list 2 deny any
" l" \- O2 w. fntp access-group serve 1, S6 E: d6 F' R$ a. a. F
ntp master 4
' A: T+ I2 ^( v; |* |ntp access-group peer 2- s( q2 m3 A- z5 b! n7 x
which three ntp features can be deduced on the router?
6 I0 N6 E) K% F: |# i– only accepts time requests from 192.168.1.1' V+ N( ^' v2 N S7 o t
– only handle four requests at a time- t6 O( A. U K6 C9 W
– only is in stratum 4* q* D( X3 g, S# F6 \
– only updates its time from 192.168.1.1& \' e9 Z V( F, ?% G
– only accepts time requests from 192.168.1.4* A- Z. W- Q, O2 E' Q
– only updates its time from 192.168.1.45 O5 o$ ~$ D9 c8 A: m2 r' ]
——————————————————————————————-
' m" j0 | N# `" D: e) ]$ \% gQ. when the tunnel interface is configured in default mode, which statement about routers and the tunnel destination address is true
" }# F1 w8 {2 q2 Hx The router must have a route installed towards the tunnel destination
8 h# \$ K. [2 _8 M/ Y4 k9 Q5 d-the router must have wccp redirects enabled inbound from the tunnel destination
2 j3 a; r2 i- {# O( t& a-the router must have cisco discovery protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination
0 N ?4 w) L2 y& d6 f-the router must have redirects enabled outbound towards the tunnel destination' C; B# T8 ~1 O: d
————————————————————————————————————————–/ b& l- i/ q, s& a
Which easy virtual networking configuration component significantly decreases network configuration?
& ]+ O, T2 z; w0 n! X* _. R& t– Easy Trunk, c& e2 n: T7 O" P
– dot1e
, d: V* k: f- x– virtual network trunk
: t* {4 R+ ?$ v: a& ?– VNET tags
8 O: z; e4 F4 G) @+ c9 f" b– MBGP5 `* B" q% q0 F5 v6 F: W7 P
————————————————————————————————————-
. g/ B& \+ e8 L: a' w/ _" MThanks NetworkO. The following question was about CEF adjacencies./ V6 X8 y' Z: N f
CEF at what layer works to find adjacencies
3 w* ? o, Z9 q" @– Layer 35 n o5 ]5 t9 \' d+ Q
– Layer 22 J; F# p( o: ?5 ]$ y H1 p
– Layer 4) q% ~4 Z" `9 g7 [+ s/ u. l' E
———————————————————————-3 t( z8 `# K0 ?
Type message DHCP IPv6, These are the messages with frame ***************% W- R1 W5 y" x4 W" e7 ]
SOLICIT6 R& O4 y+ s+ }. E0 p
ADVERTISE
% L c' g, G5 c. p7 k& xREQUEST9 o7 F# g: T+ |: W
CONFIRM
# i2 P1 U7 K" CRENEW
, o2 C1 {$ _! WREBIND1 M0 K3 D @0 F
REPLY
1 t: v/ _3 H" l; G( P. G/ }% T———————————————————————————-9 ?9 y- Z5 k- h( z8 m+ y d- B
Q. Considering the IPv6 address independence requirements, which process do you avoid when you use NPTv6 for translation?9 a# t* p& x7 R. P
– rewriting of higher layer information
]# G4 j+ o! e% D3 _– chacksum verification% G9 X5 r3 @1 ^0 {! U) ^& G" Y
– ipv6 duplication and conservation
8 H+ \0 @7 u# \% d8 [* U; Y8 w-IPSEC AH header modification
2 _! @% m2 @# Y( g7 g# c———————————————————————————————————-
$ b- w1 c2 p$ n& l; l. vSomething about cef routing loop.
* G: \4 y( F" u5 ?3 iImplementing CEF
9 c" W# O% o6 T: A$ xCisco Router loop Express Forwarding# E5 Z; l2 I0 V; e* u
high memory: G5 S+ M" x2 M" {! g9 V7 _ |% b: \
low memory9 }( ]8 x- y6 z7 N) [
Bw high3 o3 A4 s7 e9 z' K( F7 K
low Bw ! X! K9 L, z% x) c, m* Z( f
( x9 |& A0 N! ~! P5 [( y |