• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/216

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

216 Cards in this Set

  • Front
  • Back
What is the purpose of an explicit "deny any" statement at the end of an ACL?
A. none, since it is implicit
B. to enable Cisco lOS IPS to work properly; however, it is the deny all traffic entry that is actually
required
C. to enable Cisco lOS Firewall to work properly; however, it is the deny all traffic entry that is
actually required
D. to allow the log option to be used to log any matches
E. to prevent sync flood attacks
F. to prevent half-opened TCP connections
Answer: D
Which of these is mandatory when configuring Cisco IOS Firewall?
A. Cisco IOS IPS enabled on the untrusted interface
B. NBAR enabled to perform protocol discovery and deep packet inspection
C. a route map to define the trusted outgoing traffic
D. a route map to define the application inspection rules
E. an inbound extended ACL applied to the untrusted interface
Answer: E
Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?
A. The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the
ingress edge LSR.
B. TTL propagation cannot be disabled in an MPLS domain.
C. TTL propagation is only disabled on the ingress edge LSR,
D. The TTL field of the MPLS label header is set to 255.
E. The TTL field of the IP packet is set to 0.
Answer: D
Two routers configured to run BGP have been connected to a firewall, one on the inside interface
and one on the outside interface. BGP has been configured so the two routers should peer,
including the correct BGP session endpoint addresses and the correct BGP session hop-count
limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?
A. Attempt to TELNET from the router connected to the inside of the firewall to the router
connected to the outside of the firewall. If telnet works, BGP will work, since telnet and BGP both
use TCP to transport data.
B. Ping from the router connected to the inside interface of the firewall to the router connected to
the outside interface of the firewall. If you can ping between them, BGP should work, since BGP
uses IP to transport packets.
C. There is no way to make BGP work across a firewall without special configuration, so there is
no simple test that will show you if BGP will work or not, other than trying to start the peering
session.
D. There is no way to make BGP work across a firewall.
Answer: C
Spanning Tree Protocol IEEE 802.1 s defines the ability to deploy which of these?
A. one global STP instance for all VLANs
B. one STP instance for each VLAN
C. one STP instance per set of VLANs
D. one STP instance per set of bridges
Answer: C
Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree
Protocol IEEE 802.1 D? (Choose two.)
A. Designated Root Cost
B. bridge ID priority
C. max age
D. bridge ID MAC address
E. Designated Root Priority
F. forward delay
Answer: B,D
If a port configured with STP loop guard stops receiving BPDUs, the port will be put into which
state?
A. learning state
B. listening state
C. forwarding state
D. loop-inconsistent state
Answer: D
What is the purpose of the STP PortFast BPDU guard feature?
A. enforce the placement of the root bridge in the network
B. ensure that a port is transitioned to a forwarding state quickly if a BPDU is received
C. enforce the borders of an STP domain
D. ensure that any BPDUs received are forwarded into the STP domain
Answer: C
When STP UplinkFast is enabled on a switch utilizing the default bridge priority, what will the new
bridge priority be changed to?
A. 8192
B. 16384
C. 49152
D. 65535
Answer: C
Which of these best describes the actions taken when a VTP message is received on a switch
configured with the VTP mode "transparent"?
A. VTP updates are ignored and forwarded out all ports.
B. VTP updates are ignored and forwarded out trunks only.
C. VTP updates are made to the VLAN database and are forwarded out trunks only.
D. VTP updates are ignored and are not forwarded
Answer: B
Refer to the exhibit. In this network, R1 has been configured to advertise a summary route,
192.168.0.0/22, to R2. R2 has been configured to advertise a summary route, 192.168.0.0/21, to
R1. Both routers have been configured to remove the discard route (the route to null created when
a summary route is configured) by setting the administrative distance of the discard route to 255.
What will happen if R1 receives a packet destined to 192.168.3.1 ?
A. The packet will loop between R1 and R2.
B. It is not possible to set the administrative distance on a summary to 255.
C. The packet will be forwarded to R2, where it will be routed to nullO.
D. The packet will be dropped by R1, since there is no route to 192.168.3.1
Answer: A
Refer to the exhibit. In this network, R1 is configured not to perform autosummarization within
EIGRP. What routes will R3 learn from R2 through EIGRP?
Cisco 350-001 Exam
A. 172.30.1.0/24 and 10.1.2.0/24; EIGRP only performs autosummarization at the edqe between
two major networks.
B. 172.30.0.0/16 and 10.1.2.0/24; R2 will perform autosummarization, although R1 will not.
C. Since R2 is configured without autosummarization, it will not propagate the 172.30.1.0/24 route.
D. 172.30.0.0/8 and 10.0.0.0/8
Answer: A
The classic Spanning Tree Protocol (802.1 D 1998) uses which sequence of variables to
determine the best received BPDU?
A. 1) lowest root bridge id, 2) lowest sender bridge id, 3) lowest port id, 4) lowest root path cost
B. 1) lowest root path cost, 2) lowest root bridge id, 3) lowest sender bridge id, 4) lowest sender
port id
C. 1) lowest root bridge id, 2) lowest sender bridge id, 3) lowest root path cost 4) lowest sender
port id
D. 1) lowest root bridge id, 2) lowest root path cost, 3) lowest sender bridge id, 4) lowest sender
port id
Answer: B
Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in
the MST blocking state?
A. GE-1/2andGE2/1
B. GE-1/1 and GE-2/2
C. GE-3/2 and GE 4/1
D. no ports are in the blocking state
E. There is not enough information to determine which ports are in the blocking state.
Answer: D
Refer to the exhibit. In the diagram, the switches are running IEEE 802.1 w RSPT. On which ports
should root guard be enabled in order to facilitate deterministic root bridge election under normal
and failure scenarios?
A. GE-3/1, GE-3/2
B. FE-2/1, FE-3/2
C. GE-1/1.GE-1/2
D. GE-4/1, GE-4/2
E. GE-2/1, GE-2/2
F. GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2
Answer: F
Loop guard and UniDireclional Link Detection both protect against Layer 2 STP loops. In which
two ways does loop guard differ from UDLD in loop detection and prevention? (Choose two.
A. Loop guard can be used with root guard simultaneously on the same port on the same VLAN
while UDLD cannot.
B. UDLD protects against STP failures caused by cabling problems that create one-way links.
C. Loop guard detects and protects against duplicate packets being received and transmitted on
different ports.
D. UDLD protects against unidirectional cabling problems on copper and fiber media.
E. Loop guard protects against STP failures caused by problems that result in the loss of BPDUs
from a designated switch port.
Answer: B,E
Refer to the exhibit. Voice traffic is marked "precedence 5." How much bandwidth is allocated for
voice traffic during periods of congestion?
A. a minimum of 48 kb/s
B. a maximum of 48 kb/s
C. a minimum of 48% of the available bandwidth
D. a maximum of 48% of the available bandwidth
Answer: B
Refer to the exhibit. Which of these is applied to the Bearer class?
A. wred
B. traffic shaping
C. packet marking
D. packet classification
E. FIFO queuing within the class
Answer: E
Refer to the exhibit. What is the overall type of queuing being used on the outgoing data for
interface Ethernet0/1?
A. LLQ
B. FIFO
C. CBWFQ
D. priority queuing
E. weighted fair queuing
Answer: A
Which two of these are differences between traffic policing and traffic shaping? (Choose two.)
A. with traffic shaping, a router stores excess traffic in packet buffers until bandwidth is available
again
B. with policing you can tune the buffer usage for traffic exceeding the specified CIR
C. with shaping you can tune the buffer usage for traffic exceeding the specified CIR
D. shaping should only be applied for ingress traffic, policing only for egress
E. policing uses a token bucket algorithm, shaping uses an SPD algorithm
Answer: A,C
An expanding company is deploying leased lines between its main site and two remote sites. The
bandwidth of the leased lines is 128kb/s each, terminated on different serial interfaces on the main
router. These links are used for combined VOIP and data traffic. The network administrator has
implemented a VOIP solution to reduce costs, and has therefore reserved sufficient bandwidth in a
low latency queue on each interface for the VOIP traffic. Users now complain about bad voice
quality although no drops are observed in the low latency queue. What action will likely fix this
problem?
A. mark VOIP traffic with IP precedence 6 and configure only fair-queue' on the links
B. configure the scheduler allocate 3000 1000 command to allow the OoS code to have enough
CPU cycles
C. enable class-based traffic shaping on the VOIP traffic class
D. enable Layer 2 fragmentation and interleaving on the links
E. enable Frame Relay on the links and send voice and data on different Frame Relay PVCs
Answer: D
You are the network administrator of an enterprise with a main site and multiple remote sites. Your
network carries both VOIP and data traffic. You agree with your service provider to classify VOIP
and data traffic according to the different service RFCs. How can your data and VOIP traffic be
marked?
A. data marked with DSCP AF21, VOIP marked with DSCP EF
B. data marked with DSCP AF51, VOIP marked with DSCP EF
C. data marked with the DE-bit. VOIP marked with the CLP-bit
D. data marked with DSCP EF, VOIP marked with DSCP AF31
E. data marked with IP precedence 5, VOIP marked with DSCP EF
Answer: A
Refer to the exhibit. When applying this hierarchical policy map on the on the tunnel1 interface,
you measure high jitter for traffic going through class 1234. What is the most likely cause of this
jitter?
A. The configuration of a hierarchical policy map on a tunnel interface is not supported.
B. Class 5555 and class 5554 are both taking up 100% of the bandwidth, leaving nothing for class
1234.
C. The burst size for the traffic shaping is wrongly configured to 15000; this would require an
interface capable of sending at 150Mb/s.
D. The burst size for the traffic shaping has been wrongly configured; it should be set as low as
possible.
E. The burst size for the traffic shaping has been wrongly configured; it should be set as high as
possible.
Answer: D
Refer to the exhibit. When applying this policy map on the tunnel1 interface, you see packet loss
for the TCP class starting at around 100000 b/s, instead of the configured 150000 b/s. What is the
most likely cause of the discrepancy?
A. The violate-action command should not be configured.
B. The current configuration of the load-interval command on the tunnel interface is preventing
proper policing calculations.
C. The burst size is too low.
D. Policing on tunnel interfaces is not supported.
E. The CIR keyword is missing in the policer
Answer: C
Refer to the exhibit. As a network administrator, you have configured a dual-rate, dual-bucket
policer in accordance with RFC 2698 on the serial interface of you router, connecting to your
provider. The SLA with your provider states that you should only send AF31 (limited to 150 kb/s),
AF32 (limited to 50 kb/s)and AF33 (best effort). Your service provider claims you are not
conforming to the SLA. Which two things are wrong with this configuration? (Choose two.)
A. The configuration of a service policy on half-duplex Ethernet interfaces is not supported.
B. The class class-default sub-command of the policy-map limit command should be set to the
DSCP default.
C. The violate action is wrong.
D. This policer configuration is not implementing RFC 2698 dual-bucket, dual-rate.
E. The policer is configured in the wrong class.
Answer: C,E
Refer to the exhibit. You have noticed that several users in the network are consuming a great
deal of bandwidth for the peer-to-peer application Kazaa2. You would like to limit this traffic, and at
the same time provide a guaranteed 100 kb/s bandwidth for one of your servers. After applying the
configuration in the exhibit, you notice no change in the bandwidth utilization on the serial link; it is
still heavily oversubscribing the interface. What is the cause of this problem?
A. CEF needs to be enabled for NBAR.
B. In class Kazaa2, you should configure a policer instead of a drop command.
C. The server class should have a priority of 100.
D. The bandwidth parameter on serial 0/0 is wrong.
E. Kazaa2 is not a valid protocol.
Answer: A
Refer to the exhibit. You would like to guarantee 7 Mb/s for FTP traffic in your LAN, as it seems
that peer-to-peer traffic is taking up a large amount of bandwidth. When testing the configuration,
you notice that FTP traffic doesnl reach 7 Mb/ s. What is the problem?
A. The Ethernet interface should have keepalives enabled.
B. The duplex settings are wrong on the Ethernet interface.
C. The qos pre-classify command should be removed from the tunnel interfaces.
D. the priority queue for the voice class is probably taking all the bandwidth
E. there are probably not enough interface buffers; they should be tuned.
Answer: B
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming
it is not configured as a route reflector?
A. prefixes received from any other BGP peer and prefixes locally originated via network
statements or redistributed
B. all prefixes in its routing table
C. prefixes received from EBGP peers and prefixes locally originated via network statements or
redistributed
D. prefixes received from EBGP peers and prefixes received from route reflectors
E. prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes
redistributed to BGP
F. prefixes received from other IBGP peers and prefixes received from route reflectors
Answer: C
You have two EBGP peers connected via two parallel serial lines. What should you do to be able
to load-balance between two EBGP speakers over the parallel serial lines in both directions?
A. nothing, BGP automatically load-balances the traffic between different autonomous systems on
all available links
B. peer between the eBGP speaker's loopbacks, configuring eBGP multihop as required, and use
an IGP to load-share between the two equal-cost paths between the loopback addresses
C. configure a loopback as update source for both EBGP peers and have on each AS an IGP to
introduce two equal-cost paths to reach the EBGP peer loopback address; it is also necessary to
use the next-hop-self command
D. use the ebgp-load-balance command on the neighbor statement on both sides
E. configure a loopback as update source for both EBGP peers and have on each AS an IGP to
introduce two equal-cost paths to reach the peer loopback address; it is also necessary to use the
ebgp-multihop and next-hop-self commands
Answer: B
Which of these statements about penultimate hop popping are true? (Choose three)
A. It is used only for directly connected subnets or aggregate routes
B. It can only be used with LDP.
C. It is only used when two or more labels are stacked.
D. It enables the Edge LSR to request a label pop operation from Its upstream neighbors
E. It is requested through TDP using a special label value that is also called the implicit-null value.
F. It is requested through LDP using a special label value that is also called the implicit-null value.
Answer: D,E,F
Which of these best identifies the types of prefixes a router running BGP will advertise to an EBGP
peer?
A. prefixes received from any other BGP peer and prefixes locally originated via network
statements or redistributed to BGP
B. all prefixes in its IP routing table.
C. only prefixes received from EBGP peers and prefixes locally originated via network statements
or redistributed.
D. only prefixes received from EBGP peers and prefixes received from route reflectors.
E. all prefixes in its routing table except the prefixes received from other EBGP peers.
F. all prefixes in its routing table except the prefixes received from other IBGP peers.
Answer: A
Which standard supports multiple instances of spanning tree?
A. 802.1 D
B. 802.1s
C. 802.1w
D. 802.1 z
Answer: B
Spanning Tree Protocol calculates path cost based on which of these:
A. interface bandwidth
B. interface delay
C. interface bandwidth and delay
D. hop count
E. bridge priority
Answer: A
Refer to the exhibit. What type of issue does this error log indicate if the IP address in the error log
is located off of the Router A WAN?
A. HSRP standby configuration error
B. HSRP burned-in address error
C. HSRP secondary address configuration error
D. this is not an HSRP problem, but rather an STP error or router or switch configuration issue
Answer: D
What two features in Cisco switches help prevent Layer 2 loops? (Choose two.
A. Unidirectional Link Detection
B. Hot Standby Router Protocol
C. Virtual Router Redundancy Protocol
D. PortFast
E. root guard
F. loop guard
Answer: A,F
Refer to the exhibit. Which switching feature is being tested?
A. loop guard
B. PortFast
C. root guard
D. BDPU guard
Answer: A
Refer to the exhibit. This exhibit shows the NAT configuration for Router A and the output for a
ping issued from device 171.68.200.48 and destined to 172.16.47.142. Based on this information,
what change must be made to Router A in order for the ping to work?
A. reload the router
B. clear the route cache
C. add a static route
D. configure IP as classless
E. load a newer IOS image
Answer: D
In PIM-SM what control plane signaling must a multicast source perform before it begins to send
multicast traffic to a group?
A. The source must send a PIM Register message to the rendezvous point (RP).
B. The source must first join the multicast group using IGMP before sending.
C. The source must perform a Request to Send (RTS) and Clear to Send (CTS) handshake with
the PIM designated router (DR).
D. No control plane signaling needs to be performed; the source can simply begin sending on the
local subnet.
Answer: D
Which of these statements about PIM join messages in classic PIM-SM is correct?
A. PIM join messages are sent every 60 seconds to refresh the upstream router's mroute state for
the multicast tree.
B. Routers send a PIM join acknowledgement in response to each PIM join message received
from a downstream router.
C. PIM join messages are only sent when the multicast distribution tree is first being established.
D. PIM join messages are sent every three minutes to refresh the upstream router's mroute state
for the multicast tree
Answer: A
The ip pim autorp listener command is used to do which of these?
A. enable a Cisco router to "passively" listen to Auto-RP packets without the router actively
sending or forwarding any of the packets
B. allow Auto-RP packets in groups 224.0.1.39 and 224.0.1.40 to be flooded in dense mode out
interfaces configured with the ip pim sparse-mode command
C. enable the use of Auto-RP on a router
D. configure the router as an Auto-RP mapping agent
Answer: B
In order to configure two routers as anycast RPs, which of these requirements, af a minimum,
must be satisfied?
A. Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast
RPs.
B. The RPs must be within the same IGP domain.
C. Multicast Source Discovery Protocol must be configured between the two anycast RPs.
D. The two anycast RPs must be IBGP peers.
Answer: C
Which two of these statements correctly describe classic PIM-SM? (Choose two.)
A. The lOS default is for a last-hop router to trigger a switch to the shortest path tree as soon as a
new source is detected on the shared tree.
B. The lOS default is for every one of the routers on the shared tree to trigger a switch to the
shortest path tree as soon as a new source is detected on the shared tree.
C. The default behavior of switching to the shortest path tree as soon as a new source is detected
on the shared tree can be disabled by setting the value in the ip pirn spt-threshold command to
"infinity.
D. The default behavior of switching to the shortest path tree as soon as a new source is detected
on the shared tree can be disabled by setting the value in the ip pirn spt-threshold command to
"zero."
Answer: A,C
In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked
loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features
can be used to limit excessive traffic during spanning-tree loop conditions? (Choose two.)
A. loop guard
B. storm control
C. storm suppression
D. broadcast suppression
E. BPDU guard
Answer: B,D
Why does RSTP have a better convergence time than 802.1D?
A. it is newer
B. it has smaller timers
C. it has less overhead
D. it is not timer-based
Answer: D
Under which two circumstances would an RSTP bridge flush its CAM table? (Choose two.)
A. upon a port state change
B. upon receiving a topology change notification
C. when transitioning from discarding to forwarding
D. when transitioning from forwarding to discarding
E. only when changing from listening to discarding
F. when CAM resources have been completely used up
Answer: B,C
Which of these correctly identifies a difference between the way BPDUs are handled by 802.1w
and 802.1 D?
A. 802.1 D bridges do not relay
B. 802.1w bridges do not relay BPDUs
C. 802.1D bridges only relay BPDUs received from the root
D. 802.1w bridges only relay BPDUs received from the root
Answer: C
NBAR supports all of these with the exception of which one?
A. HTTP
B. IP multicast
C. TCP flows with dynamically assigned port numbers
D. non-UDP protocols
Answer: B
Modified deficit round robin supports which of these functionalities?
A. priority queue
B. weighted fair queues
C. round-robin service of output queues
D. LLQ
Answer: A,C
A router is connected to an HDLC circuit via a T1 physical interface. The SLA for this link only
allows for a sustained rate of 768 kb/s. Bursts are allowed for up to 30 seconds at up to line rate,
with a window Tc of 125 ms. What should the Be and Be setting be when using generic traffic
shaping?
A. Be = 46320000 , Bc = 96000
B. Be = ,768000 Be = 32000
C. Be = ,128000 Be = 7680
D. Be = ,0 Be = 96000
Answer: A
Which of these tables is used by an LSR to perform a forwarding lookup for a packet destined to
an address within an RFC 4364 VPN?
A. CEF
B. FIB
C. LFIB
D. IGP
Answer: C
Which two of these parameters are used to determine a forwarding equivalence class? (Choose
two.
A. IP prefix
B. Layer 2 circuit
C. RSVP request from CE for bandwidth reservation
D. BGP MED value
Answer: A,B
A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able
to route to and from VRF_C, which hosts shared services. However, traffic must not be allowed to
flow between VRF_A and VRF_B. How can this be accomplished?
A. route redistribution
B. import and export using route descriptors
C. import and export using route targets
D. Cisco MPLS Traffic Engineering
Answer: C
Which of these statements best describes the major difference between an IPv4-compatible tunnel
and a 6to4 tunnel?
A. An IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel.
B. The deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a
6to4 tunnel does not require any special code.
C. An IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is
used to connect to connect two or more IPv6 domains.
D. For an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a
6to4 tunnel, the ISP assigns only IPv6 addresses for each domain.
Answer: C
Which information is carried in an OSPFv3 intra-area-prefix LSA?
A. IPv6 prefixes
B. link-local addresses
C. solicited node multicast addresses
D. IPv6 prefixes and topology information
Answer: A
Which IPv6 address would you ping to determine if OSPFv3 is able to send and receive unicast
packets across a link?
A. anycast address
B. site-local multicast
C. global address ofthe link
D. unique local address
E. link-local address
Answer: E
You are using IPv6, and would like to configure EIGRPv3. Which three of these correctly describe
how you can perform this configuration? (Choose three.)
A. EIGRP for IPv6 is directly configured on the interfaces over which it runs.
B. EIGRP for IPv6 is not configured on the interfaces over which it runs, but if a user uses
passive-interface
configuration, EIGRP for IPv6 needs to be configured on the interface that is made passive.
C. There is a network statement configuration in EIGRP for IPv6, the same as for IPv4.
D. There is no network statement configuration in EIGRP for IPv6.
E. When a user uses a passive-interface configuration, EIGRP for IPv6 does not need to be
configured on the interface that is made passive.
F. When a user uses a non-passive-interface configuration, EIGRP for IPv6 does not need to be
configured on the interface that is made passive
Answer: A,D,E
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be
employed to prevent the use of malformed or forged IP sources addresses?
A. It is applied only on the input interface of a router. ~
B. It is applied only on the output interface of a router.
C. It can be configured either on the input or output interface of a router.
D. It cannot be configured on a router interface.
E. It is configured under any routing protocol process
Answer: A
Unicast Reverse Path Forwarding can perform all of these actions except which one?
A. examine all packets received to make sure that the source addresses and source interfaces
appear in the routing table and match the interfaces where the packets were received
B. check to see if any packet received at a router interface arrives on the best return path
C. combine with a configured ACL
D. log its events, if you specify the logging options for the ACL entries used by the unicast rpf
command
E. inspect IP packets encapsulated in tunnels, such as GRE
Answer: E
Which three of these statements about Dynamic Trunking Protocol are correct? (Choose three
A. It supports autonegotiation for both ISL and IEEE 802.1 Q trunks.
B. It must be disabled on an interface if you do not want the interface to work as a trunk or start
negotiation to become a trunk.
C. It is a point-to-multipoint protocol.
D. It is a point-to-point protocol.
E. It is not supported on private VLAN ports or tunneling ports
Answer: A,B,D
You are designing your network to be able to use trunks. As part of this process you are
comparing the ISL and 802.1 Q encapsulation options. All of these statements about the two
encapsulation options are correct except which one?
A. Both support normal and extended VLAN ranges.
B. ISL is a Cisco proprietary encapsulation method and 802.1 Q is an IEEE standard.
C. ISL encapsulates the original frame
D. Both support native VLANs.
E. 802.1 Q does not encapsulate the original frame.
Answer: D
What s the default stratum clock on a Cisco router, when you see the key word "master"
configured on the NTP line?
A. 1
B. 2
C. 4
D. 6
E. 8
Answer: E
Though many options are supported in EIGRPv6, select two options from the below list that are
supported. Choose 2
A. VRF
B. auto-summary
C. per-interface configuration
D. prefix-list support via route-map
E. prefix-list support via distribute-list
Answer: C,E
During the IPv6 address resolution, a node sends a neighbor solicitation message in order to
discover which of these?
A. The Layer 2 multicast address of the destination node
B. The solicited node multicast address of the destination node
C. The Layer 2 address of the destination node based on the destination IPv6 address
D. The IPv6 address of the destination node based on the destination Layer 2 address
Answer: C
Which one of these statements is true of OSPF type 5 LSAs?
A. They are used to summarize area routes to other areas.
B. They are used in not-so-stubby areas to propagate external routes.
C. They are used to notify areas of the ASBR.
D. They are flooded to all areas except stub areas (external route).
Answer: D
Which OSPF LSA type does an ASBR use to originate a default route into an area?
A. LSA1
B. LSA3
C. LSA4
D. LSA 5
E. LSA7
Answer: D
Refer to the exhibit. Routers A and B are directly connected. Given the configuration, how many
EIGRP routes will router B see in its routing table?
A. 0
B. 1
C. 2
D. 3
E. 4
Answer: A
Refer to the exhibit. Routers A and B are directly connected and running EIGRP, but they are
unable to form a neighbor relationship. What is the most likely cause?
A. The network statements are misconfigured.
B. The IP address statements are misconfigured
C. The autonomous system is misconfigured.
D. There is a physical issue with the cable.
Answer: B
Refer to the exhibit. Routers A and B are directly connected and running OSPF, but they are
unable to form a neighbor relationship. What is the most likely cause?
A. The routers are not on the same network.
B. The network statements do not match.
C. The process number does not match.
D. The MTU does not match.
E. The OSPF cost does not match.
F. There is a physical issue with the cable.
Answer: D
Refer to the exhibit. Users on the 199.155.24.0 network are unable to reach the 172.16.10.0
network. What is the most likely solution?
A. Router ISP1 should be configured to peer with router B.
B. Router ISP2 should be configured with no synchronization.
C. Router ISP1 should be configured with no synchronization.
D. Router ISP2 should be configured with no auto-summary.
E. Router ISP1 or IPS2 should be configured with network 176.16.10.0 mask 255.255.255.0
Answer: E
Two BGP peers connected through a routed firewall are unable to establish a peering relationship.
What could be the most likely cause?
A. BGP peers must be Layer 2-adjacent.
B. EBGP multihop is not configured.
C. The firewall is not configured to allow IP protocol 89.
D. The firewall is not configured to allow UDP 179.
Answer: B
Which two of these steps are minimum requirements to configure OSPFv3 under IPv6? (Choose
two.
A. Configure a routing process using the command ipv6 router ospf [process-id].
B. Add the network statement for the interfaces on which OSPF will run.
C. Configure OSPF on the interface that it will run on.
D. Use the passive-interface command on the interfaces on which OSPF should not run.
E. Enable routing
Answer: C,E
You add the following commands into a routed topology: router eigrp 1 variance 3 traffic-share min
across-interfaces. Users now complain about voice quality in your VoIP system. What should be
done?
A. Add the command: router eigrp 1 traffic-share voice interface fast 0/0.
B. Reconfigure EIGRP to recognize voice packets.
C. Remove the variance from the configuration.
D. Reconfigure the VoIP system to use RTP sequence number headers.
E. Use an H.323 gatekeeper for your VoIP system to negotiate an H.245 uneven packet buffer.
F. Reconfigure EIGRP to version 2.
Answer: C
Refer to the exhibit. How would you get the 1.1.1.1 network into the OSPF database?
A. Configure RTA as an ASBR.
B. Redistribute connected routes on RTA into OSPF.
C. Set up a virtual link between area 1 and area 0.
D. Set up a virtual link between area 1 and area 2.
E. Add a static route into RTB and enter it into OSPF.
F. Place a network 1.1.1.0 0.0.0.0 command into RTB.
G. Set up a unique router ID on RTA using an RFC 1918 address
H. Change area 0 on RTB to area 1
Answer: C
Refer to the exhibit. Router E learned about the PIM RP (designated as 7.7.7.7) from four different
sources. Routers A and D advertised the 7.0.0.0 network via EIGRP. Routers B and C advertised
the 7.0.0.0 network via OSPF. Considering that all four Ethernet interfaces on router E could
potentially lead back to the PIM-RP, when router E receives the first multicast packet down the
shared tree, which incoming interface will be used to successfully pass the RPF check?
A. E0
B. E1
C. E2
D. E3
E. None of these interfaces will be used to successfully pass the RPF check.
F. All of these interfaces would successfully pass the RPF check.
Answer: A
Refer to the exhibit. From the MAC addresses shown in the command output, to which two ports is
the multicast stream 225.230.57.199 being forwarded on this switch? (Choose two.)
Switch#show mac-address-table multicast
A. Fa6/28
B. Fa7/20
C. Gi3/7
D. Fa4/2
E. Fa4/14
F. Fa4/38
G. Fa6/28
H. Fa5/7
Answer: C,E
Two ISPs have decided to use MSDP and configured routers X and Y (both are PIM RPs) as
MSDP peers. In the domain of ISP B, PC A has sent an IGMP membership report for the group
224.1.1.1 and PC B has sent an IGMP membership report for the group 224.5.5.5. Assuming that the MSDP peering relationship between routers X and Y is functional, and given the partial
configuration output shown from router X, which two of these statements are true? Choose two.)
A. Router X will contain an entry for 224.1.1.1 in its SA cache and will also have an installed (S,G)
entry for this in its mroute table.
B. Router X will not contain an entry for 224.1.1.1 in its SA cache but will have an installed (*,G)
entry for this in its
mroute table.
C. Router X will not contain an entry for 224.5.5.5 in its SA cache but will have an installed (S,G)
entry for this in its mroute table.
D. Router X will not contain an entry for 224.5.5.5 in its SA cache but will have an installed (*,G)
entry for this in its mroute table.
E. Router X will have no entries for 224.5.5.5 in neither its SA cache nor in its mroute table. ^F.
Router F. X will have no entries for 224.1.1.1 in neither its SA cache nor in its mroute table.
Answer: A,D
You are about to migrate a customer network to use a VSS. Which of these statements is true
about a VSS?
A. The VSS switch must be the root bridge for all VLANs and is automatically designated.
B. The VSS switch is defined in RFC 4318 as a managed object.
C. The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D. A VSS interoperates with a virtual port channel.
E. The 802.1 Q or ISL protocols are used to maintain the operational state of the VSS devices.
F. A VSS increases the size of the spanning-tree domain
Answer: C
Which two of these steps are minimum requirements to configure OSPFv3 under IPv6? (Choose
two.
A. Configure a routing process using the command ipv6 router ospf [process-id].
B. Add the network statement for the interfaces on which OSPF will run.
C. Configure OSPF on the interface that it will run on.
D. Use the passive-interface command on the interfaces on which OSPF should not run.
E. Enable routing
Answer: C,E
You have done a partial migration from 802.1D STP to 802.1w STP. Which of the following is
true?
A. 802.1 D and 802.1w intemperate only when the 802.1 D STP domain supports rapid
convergence.
B. Ports leading to 802.1D devices will run in compatibility mode, while the rest of the ports will run
in 802.1w mode.
C. This is an invalid configuration and a partial migration cannot be done.
D. The bridge timers will be set to match the 802.1 D devices.
E. A secondary root bridge will always be populated within the 802.1 D domain.
F. If the root bridge is selected within the 802.1 D domain, the whole STP domain will run in 802.1
D compatibility mode.
G. In partially migrated 802.1w networks, it is recommended to keep the STP diameter below 4.
Answer: B
You add the following commands into a routed topology: router eigrp 1 variance 3 traffic-share min
across-interfaces. Users now complain about voice quality in your VoIP system. What should be
done?
A. Add the command: router eigrp 1 traffic-share voice interface fast 0/0.
B. Reconfigure EIGRP to recognize voice packets.
C. Remove the variance from the configuration.
D. Reconfigure the VoIP system to use RTP sequence number headers.
E. Use an H.323 gatekeeper for your VoIP system to negotiate an H.245 uneven packet buffer.
F. Reconfigure EIGRP to version 2.
Answer: C
The network administrator is trying to add Switch1 to the network, but the 802.1 Q trunk is not
coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine.
What are three possible causes of this problem? (Choose three.)
A. The trunking configuration mode on Switch1 is set to Off.
B. The trunking configuration mode on the other end is set to On.
C. The trunking configuration mode on the other end is set to Desirable.
D. Cisco Discovery Protocol is not running on the other end.
E. There is a VTP domain name mismatch.
F. Switch1 does not support 802.1Q.
Answer: B,C,E
Refer to the exhibit. How would you get the 1.1.1.1 network into the OSPF database?
A. Configure RTA as an ASBR.
B. Redistribute connected routes on RTA into OSPF.
C. Set up a virtual link between area 1 and area 0.
D. Set up a virtual link between area 1 and area 2.
E. Add a static route into RTB and enter it into OSPF.
F. Place a network 1.1.1.0 0.0.0.0 command into RTB.
G. Set up a unique router ID on RTA using an RFC 1918 address
H. Change area 0 on RTB to area 1
Answer: C
The core of a network has four routers connected in a square design with Gigabit Ethernet links
using /30 subnets. The network is used to carry voice traffic and other applications. Convergence
time is taking more than expected. Which three actions would you take to improve OSPF
convergence time? (Choose three.)
A. Increase MTU of the interfaces to accommodate larger OSPF packets
B. Change the network type to point-to-point on those links.
C. Reduce SPF initial timer.
D. Increase hello interval to avoid adjacency flapping.
E. Enable OSPF
Answer: B,C,E
Refer to the exhibit. Router E learned about the PIM RP (designated as 7.7.7.7) from four different
sources. Routers A and D advertised the 7.0.0.0 network via EIGRP. Routers B and C advertised
the 7.0.0.0 network via OSPF. Considering that all four Ethernet interfaces on router E could
potentially lead back to the PIM-RP, when router E receives the first multicast packet down the
shared tree, which incoming interface will be used to successfully pass the RPF check?
A. E0
B. E1
C. E2
D. E3
E. None of these interfaces will be used to successfully pass the RPF check.
F. All of these interfaces would successfully pass the RPF check.
Answer: A
Refer to the exhibit. From the MAC addresses shown in the command output, to which two ports is
the multicast stream 225.230.57.199 being forwarded on this switch? (Choose two.)
Switch#show mac-address-table multicast
A. Fa6/28
B. Fa7/20
C. Gi3/7
D. Fa4/2
E. Fa4/14
F. Fa4/38
G. Fa6/28
H. Fa5/7
Answer: C,E
Two ISPs have decided to use MSDP and configured routers X and Y (both are PIM RPs) as
MSDP peers. In the domain of ISP B, PC A has sent an IGMP membership report for the group
224.1.1.1 and PC B has sent an IGMP membership report for the group 224.5.5.5. Assuming that the MSDP peering relationship between routers X and Y is functional, and given the partial
configuration output shown from router X, which two of these statements are true? Choose two.)
A. Router X will contain an entry for 224.1.1.1 in its SA cache and will also have an installed (S,G)
entry for this in its mroute table.
B. Router X will not contain an entry for 224.1.1.1 in its SA cache but will have an installed (*,G)
entry for this in its
mroute table.
C. Router X will not contain an entry for 224.5.5.5 in its SA cache but will have an installed (S,G)
entry for this in its mroute table.
D. Router X will not contain an entry for 224.5.5.5 in its SA cache but will have an installed (*,G)
entry for this in its mroute table.
E. Router X will have no entries for 224.5.5.5 in neither its SA cache nor in its mroute table. ^F.
Router F. X will have no entries for 224.1.1.1 in neither its SA cache nor in its mroute table.
Answer: A,D
You are about to migrate a customer network to use a VSS. Which of these statements is true
about a VSS?
A. The VSS switch must be the root bridge for all VLANs and is automatically designated.
B. The VSS switch is defined in RFC 4318 as a managed object.
C. The PAgP+ or LACP protocols are used to maintain the operational state of the VSS devices.
D. A VSS interoperates with a virtual port channel.
E. The 802.1 Q or ISL protocols are used to maintain the operational state of the VSS devices.
F. A VSS increases the size of the spanning-tree domain
Answer: C
You have done a partial migration from 802.1D STP to 802.1w STP. Which of the following is
true?
A. 802.1 D and 802.1w intemperate only when the 802.1 D STP domain supports rapid
convergence.
B. Ports leading to 802.1D devices will run in compatibility mode, while the rest of the ports will run
in 802.1w mode.
C. This is an invalid configuration and a partial migration cannot be done.
D. The bridge timers will be set to match the 802.1 D devices.
E. A secondary root bridge will always be populated within the 802.1 D domain.
F. If the root bridge is selected within the 802.1 D domain, the whole STP domain will run in 802.1
D compatibility mode.
G. In partially migrated 802.1w networks, it is recommended to keep the STP diameter below 4.
Answer: B
The network administrator is trying to add Switch1 to the network, but the 802.1 Q trunk is not
coming up. Switch1 was previously tested in the laboratory and its trunk configuration worked fine.
What are three possible causes of this problem? (Choose three.)
A. The trunking configuration mode on Switch1 is set to Off.
B. The trunking configuration mode on the other end is set to On.
C. The trunking configuration mode on the other end is set to Desirable.
D. Cisco Discovery Protocol is not running on the other end.
E. There is a VTP domain name mismatch.
F. Switch1 does not support 802.1Q.
Answer: B,C,E
The core of a network has four routers connected in a square design with Gigabit Ethernet links
using /30 subnets. The network is used to carry voice traffic and other applications. Convergence
time is taking more than expected. Which three actions would you take to improve OSPF
convergence time? (Choose three.)
A. Increase MTU of the interfaces to accommodate larger OSPF packets
B. Change the network type to point-to-point on those links.
C. Reduce SPF initial timer.
D. Increase hello interval to avoid adjacency flapping.
E. Enable OSPF
Answer: B,C,E
Refer to the exhibit. BGP-4 routing to the Internet, in normal behavior, may create asymmetrical
routing for different prefixes. The BGP routing table indicates that traffic should follow the paths
indicated in the exhibit, but packets are not going further than the border router in AS 4. What
could be the cause of this problem?
A. TCP Intercept is configured in AS 4.
B. Unicast Reverse Path Forwarding is configured in loose mode in this router.
C. Packets may be leaving AS 1 without the BGP routing flag set to 1.
D. Unicast Reverse Path Forwarding is configured in strict mode in this router.
E. There is a missing Unicast Reverse Path Forwarding configuration
Answer: D
An 802.1Q trunk is not coming up between two switches. The ports on both switches are
configured as "switchport mode desirable." Assuming that there is no physical issue, choose two possible causes. (Choose two.)
A. Incorrect VTP domain
B. Incorrect VTP password
C. Incorrect VTP mode
D. Incorrect VTP configuration revision
Answer: A,B
Refer to the exhibit. Look at the command output. What would be the most probable reason for
this port-ID mismatch?
A. spanning-tree misconfiguration
B. speed mismatch configuration
C. cabling problem
D. configuration problem
Answer: C
Refer to the exhibit. Look at the command output. Assume that there is no other path, and the
configuration is correct. What would be the consequences of this situation?
A. Users in SW1 can ping SW2 but not vice versa.
B. Users in SW2 can ping SW1 but not vice versa.
C. Users in SW1 and SW2 can ping each other.
D. Users in SW1 and SW2 cannot ping each other.
Answer: D
Refer to the exhibit. Look at the command output. What can you use to prevent this behavior?
A. udld
B. spanning-tree loopguard
C. VTP mode transparent
D. switchport mode desirable
Answer: A
When using IP SLA FTP operation, which two FTP modes are supported? (Choose two.)
A. Only the FTP PUT operation type is supported.
B. Active mode is supported.
C. Passive FTP transfer modes are supported.
D. FTP URL specified for the FTP GET operation is not supported
Answer: B,C
If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS
server requires client authentication, connections to the secure HTTP client will fail. Which
command must be enabled for correct operation?
A. ip http client secure-ciphersuite 3des-ede-cbc-sha
B. ip https max-connections 10
C. ip http timeout-policy idle 30 life_120 requests 100
D. ip http client secure-trustpoint trustpoint-name
Answer: D
The Layer 2 network uses VTP to manage its VLAN database. A network designer created all
VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP
clients (switches 2 through 4). Due to network growth, a network operator decided to add a new
switch between switch 1 and switch 3. The network operator has been instructed to use a
refurbished switch and use a VTP client. Which three of these has been instructed to use a
refurbished switch and use a VTP client. Which three of these factors should the network operator
consider to minimize the impact of adding a new switch? (Choose three.)
A. Pay special attention to the VTP revision number, because the higher value takes the priority.
B. Configure all VLANs manually on the new switch in order to avoid connectivity issues.
C. A trunk should be established between the new switch and switches 1 and 3 as VTP only runsover trunk links.
D. Set at least the VTP domain name and password to get the new switch synchronized.
E. An ISL trunk should be established between the new switch and switches 1 and 3, because
VTP only runs over ISL.
F. Pay special attention to the VTP revision number, because the lower value takes the priority
Answer: A,C,D
A request arrived on your MPLS-vpn-bgp group. Due to a security breach, your customer is
experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have
checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four
subnets listed: 200.0.10.0/24,200.0.11.0/24,200.0.12.0/24,200.0.13.0/24. You immediately apply
an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 200.0.10.0
255.255.254.0 access-list 1 permit any What
happens when you apply this ACL on the MPLS-EBGP connection to BHK?
A. It blocks all routes.
B. It blocks the routes 200.0.12.0/24, 200.0.10.0/24 only.
C. It blocks the routes 200.0.12.0/24,200.0.13.0/24 only.
D. It blocks the routes 200.0.10.0/24,200.0.13.0/24 only.
E. Nothing happens, no routes are blocked.
Answer: B
Half of your network uses RIPv2 and the other half runs OSPF. The networks do not communicate
with each other. Which two of these factors describe the impact of activating EIGRP over each
separate part? (Choose two.)
A. EIGRP will not be accepted when configured on the actual RIPv2 routers.
B. OSPF will no longer be used in the routing table, because you only have EIGRP internal routes
running.
C. OSPF will no longer be used in the routing table, because you only have EIGRP external routes
running.
D. RIPv2 will populate its RIP database but not its routing table, because you only have EIGRP
external routes running.
E. RIPv2 will populate its RIP database but not its routing table, because you only have EIGRP
internal routes running.
F. OSPF database will have RIPv2 routes
Answer: B,E
Your company is researching a new application that runs over IPv6, but part of it must still have
IPv4 support. Your company uses a traditional IPv4 network. Your plan is not to run IPv6 over the
whole network, but to segment parts of the network or even to operate simultaneously with IPv6
and IPv4. You must make a brief presentation about IPv6 technology to the board of technical
directors. Which three of these items could be part of your presentation? (Choose three.)
A. Tunnel IPv6 over IPv4 to connect far-end IPv6 networks.
B. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is not
possible.
C. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is
possible.
D. What is the meaning of EUI-64 and how does it work?
E. Tunnel IPv4 over IPv6 to connect far-end IPv4 networks.
Answer: A,C,D
Refer to exhibits 1 and 2. In exhibit 1, all users on the LAN segment use router A as the active
HSRP router. Router B is the standby router for the HSRP. In exhibit 2, the network management
team reported that there is no utilization on the WAN link B. To solve this problem, you decide to
change the logical topology of your LAN, but you are not sure about what changes must be made.
You must manage HSRP or change it to another protocol in order to provide the most scalable
design, automatic redundancy, and load balancing. Which one of these actions would be the best
choice
A. Use MHSRP, with three users using router A as the default gateway and three users using
router B as the default gateway.
B. Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C. Use the backup interface on the WAN link B to provide load balancing for all users.
D. Use GLBP instead, because it provides you with up to three MAC addresses for the same
default gateway virtual IP address.
E. Use GLBP instead, because it provides you with up to four MAC addresses for the same default
gateway virtual IP address
Answer: D
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN
users have a network connectivity issue, the Engineering VLAN users usually have problems
experiencing slow response or network connectivity problems. After troubleshooting, an
unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming
the root bridge function under the spanning-tree domain and causing the Engineering VLAN to be
unstable. Which three of these actions could be suggested to fix the problem?
A. Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B. Change Business VLAN PCs to switch 1 and switch 4.
C. Force the root bridge to be switch 2, instead.
D. Adjust spanning-tree timers (max-age and forward-delay).
E. Shut down all unused ports.
F. Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanningtree
convergence time within each VLAN
Answer: A,E,F
When running IP SLA, which application type should be used if you want to know round-trip delay,
jitter, and packet loss for the full path?
A. ICMP path echo
B. UDP echo
C. ICMP path jitter
D. Application Performance Monitor
E. TCP connect
Answer: C
Which option is true when calculating round-trip delay in IP SLA operations?
A. The processing time on the end routers is only assessed for operations that involve the
responder.
B. The processing time on the end routers is only assessed for operations that involve the
transmitter.
C. The processing time on the end routers is only assessed for operations that involve both the
respond.
D. The processing time on the end routers is not assessed for neither the responder nor the
transmitter
Answer: A
Refer to the exhibit. You are asked to enable redirection for a network optimization engine that will
be connected directly to your company CPE. What is the correct configuration to enable
redirection for traffic optimization?
A. (config)#interface s0/0
(config-if)#ip wccp 61 out
(config)#interface e0/0
(config-if)#ip wccp 62 out
B. (config)#intetface s0/0
(config-if)#ip wccp 62 in
(config)#interface e0/0
(config-if)#ip wccp 61 in
C. (config)#interface s0/0
(config-if)#ip wccp 61 in
(config-if)#ip wccp 62 out
D. (config)#interface e0/0
(config-if)#ip wccp 61 in
(config-if)#ip wccp 62 out
Answer: D
Your company is researching a new application that runs over IPv6, but part of it must still have
IPv4 support. Your company uses a traditional IPv4 network. Your plan is not to run IPv6 over the
whole network, but to segment parts of the network or even to operate simultaneously with IPv6
and IPv4. You must make a brief presentation about IPv6 technology to the board of technical
directors. Which three of these items could be part of your presentation? (Choose three.)
A. Tunnel IPv6 over IPv4 to connect far-end IPv6 networks.
B. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is not
possible.
C. Explain why configuring IPv4 and IPv6 at the same time over the same LAN interface is
possible.
D. What is the meaning of EUI-64 and how does it work?
E. Tunnel IPv4 over IPv6 to connect far-end IPv4 networks.
Answer: A,C,D
Refer to exhibits 1 and 2. In exhibit 1, all users on the LAN segment use router A as the active
HSRP router. Router B is the standby router for the HSRP. In exhibit 2, the network management
team reported that there is no utilization on the WAN link B. To solve this problem, you decide to
change the logical topology of your LAN, but you are not sure about what changes must be made.
You must manage HSRP or change it to another protocol in order to provide the most scalable
design, automatic redundancy, and load balancing. Which one of these actions would be the best
choice
A. Use MHSRP, with three users using router A as the default gateway and three users using
router B as the default gateway.
B. Keep HSRP and activate PBR to redirect half of the traffic to the other WAN link.
C. Use the backup interface on the WAN link B to provide load balancing for all users.
D. Use GLBP instead, because it provides you with up to three MAC addresses for the same
default gateway virtual IP address.
E. Use GLBP instead, because it provides you with up to four MAC addresses for the same default
gateway virtual IP address
Answer: D
Refer to the exhibit. Users from the Engineering VLAN complain that every time Business VLAN
users have a network connectivity issue, the Engineering VLAN users usually have problems
experiencing slow response or network connectivity problems. After troubleshooting, an
unauthorized switch 2 was found. This unauthorized switch has been a regular problem, assuming
the root bridge function under the spanning-tree domain and causing the Engineering VLAN to be
unstable. Which three of these actions could be suggested to fix the problem?
A. Upgrade Spanning Tree Protocol to Rapid Spanning Tree Protocol.
B. Change Business VLAN PCs to switch 1 and switch 4.
C. Force the root bridge to be switch 2, instead.
D. Adjust spanning-tree timers (max-age and forward-delay).
E. Shut down all unused ports.
F. Use MSTP to separate the Engineering VLAN from the Business VLAN to optimize spanningtree
convergence time within each VLAN
Answer: A,E,F
When running IP SLA, which application type should be used if you want to know round-trip delay,
jitter, and packet loss for the full path?
A. ICMP path echo
B. UDP echo
C. ICMP path jitter
D. Application Performance Monitor
E. TCP connect
Answer: C
Which option is true when calculating round-trip delay in IP SLA operations?
A. The processing time on the end routers is only assessed for operations that involve the
responder.
B. The processing time on the end routers is only assessed for operations that involve the
transmitter.
C. The processing time on the end routers is only assessed for operations that involve both the
respond.
D. The processing time on the end routers is not assessed for neither the responder nor the
transmitter
Answer: A
Refer to the exhibit. You are asked to enable redirection for a network optimization engine that will
be connected directly to your company CPE. What is the correct configuration to enable
redirection for traffic optimization?
A. (config)#interface s0/0
(config-if)#ip wccp 61 out
(config)#interface e0/0
(config-if)#ip wccp 62 out
B. (config)#intetface s0/0
(config-if)#ip wccp 62 in
(config)#interface e0/0
(config-if)#ip wccp 61 in
C. (config)#interface s0/0
(config-if)#ip wccp 61 in
(config-if)#ip wccp 62 out
D. (config)#interface e0/0
(config-if)#ip wccp 61 in
(config-if)#ip wccp 62 out
Answer: D
The EtherChannel between your LAN switch and the Internet router is not load-balancing
efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance
algorithms can you use in the switch in order to optimize this load balancing? (Choose four.)
A. source IP address
B. destination IP address
C. per-packet load balance
D. destination MAC address
E. source MAC address
Answer: A,B,D,E
Before inserting a new switch in the network, the network administrator checks that the VTP
domain name is correct, the VTP mode is set to server, and revision is lower than the switches in
the network. The administrator then configures interfaces and trunks, erases existing VLANs, and
connects the switch to the network. Following that procedure, there is no connectivity in the
network. What is a possible cause of this problem?
A. Because the configuration revision of the new switches is lower than the rest of the network, it
can change the VLAN database of the other switches.
B. As a VTP server, the new switch deleted all VLANs of the network.
C. Erasing VLANs increases the VTP configuration revision.
D. Since the configuration revision of the network is higher than the new switch, the VLAN
database was automatically synchronized.
Answer: C
The network administrator wants to enable an EtherChannel between two switches in "on" mode.
The administrator connects the cables and enables the interfaces, but while configuring the
EtherChannel in the first switch, a spanning-tree loop was detected. Which two of these
procedures can avoid this problem? (Choose two.)
A. Configure the EtherChannel as "desirable" first.
B. Assign all interfaces to the same VLAN.
C. Disable PortFast on the interfaces in the EtherChannels.
D. Disable all interfaces first.
E. Fast Ethernet and Gigabit Ethernet ports cannot be assigned to the same EtherChannel.
F. Fix cabling problems.
Answer: A,D
Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch
offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay
cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no
connectivity between RemoteB and the central office. What is a possible solution to this issue?
A. Because Frame Relay IETF encapsulation is only configurable at interface level, you must use
IETF encapsulation on all routers.
B. This is not a possible scenario. A dedicated Frame Relay link to RemoteB is mandatory at the
central office.
C. The router at RemoteB must be replaced by a Cisco router.
D. Use Frame Relay IETF encapsulation on a per-VC basis on the central office router..
E. There is a problem in the Frame Relay cloud, because Cisco routers are compatible with IETF
Frame Relay.
Answer: D
You are deploying two core switches, one in each building, 50 km away from each other. The
cross-connection between them will be a Layer 2 2-gigabit EtherChannel with an 802.1Q trunk.
You configured it correctly but the link does not come up. The port is in the "admin up" state, and
the line protocol is in the "down" state. The fiber link is OK. What would be the most likely reason
for the link not to come up?
A. The switches are not the same model.
B. You are not using the correct SFP.
C. You are not using correct optical media converters.
D. Configuration should be modified, because the distance is longer.
Answer: B
You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the
documentation that the best way to set up a trunk is to set the port as dynamic desirable. The
trunk is not coming up. Which one of these options would be a valid explanation?
A. The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk
mode ON.
B. The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk
mode to OFF.
C. The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk
mode as auto.
D. The firewall does not support DTP. You should set the switchport trunk mode to ON.
Answer: D
Refer to the exhibit. You are setting up a 2-gigabit EtherChannel. Following IEEE standards, the
exhibit shows your configuration in a local switchl. However, EtherChannel is not coming up.
Which one of these statements could be a possible reason?
A. EtherChannel is only available in Cisco equipment.
B. The customer side is supposed to be running PAgP, which is a Cisco standard.
C. PAgP is not an IEEE standard. VRRP should be used.
D. The configuration on switch1 needs to be modified to use LACP.
Answer: D
R2 and R3 are routers connected using Ethernet services from a service provider and can receive
pings from each other. OSPF is configured as the routing protocol but adjacency is not happening.
According to the output of the show commands in the exhibit, what could be the most likely cause
of the problem?
A. Ethernet interfaces were configured as point-to-point.
B. Process IDs are not matching.
C. Configured bandwidths do not match on both interfaces.
D. Broadcasts and multicast are not being propagated over the Ethernet services.
E. OSPF cost does not match on both interfaces.
Answer: D
Which mechanism can you use to achieve sub-second failover for link failure detection when a
switched Ethernet media is used and loss of signal is not supported by the link provider?
A. OSPF standard hellos
B. Cisco Discovery Protocol link detection
C. Bidirectional Forwarding Detection
D. Fast Link Pulse
E. autonegotiation
Answer: C
While troubleshooting a network, you need to verify the liveness of hosts in the subnet
192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the
existing nodes using one single command?
A. ping 192.168.1.255
B. ping with sweep option
C. ping 192.168.1.127
D. ping 192.168.1.64
E. P>ng with broadcast option
Answer: C
Refer to the exhibit. There are two sites connected across WAN links. All intersite and intrasite
links always have the same routing metric. The network administrator sees only the top routers
and links being used by hosts at both LAN A and LAN B. What would be two suggestions to loadbalance
the traffic across both WAN links? Choose two.
A. Make HSRP track interfaces between the edge and core routers.
B. Replace HSRP with GLBP.
C. Add crossed intrasite links: R1-R4, R2-R3, R5-R8, and R6-R7.
D. Make R3 and R8 have lower HSRP priority than R1 and R7.
E. Replace HSRP with VRRP.
Answer: B,C
Refer to the exhibit. According to the output of the command show tag-switching forwarding-table,
A. Packets to the IP address 10.10.10.5/32 will be tagged with "17" toward the next hop.
B. Label "19" will be advertised to MPLS neighbors so that they can use this label to reach the IP
address 10.10.10.6/32.
C. IP address 10.10.10.4/32 is directly connected to the neighbor router on serial 3/0.
D. Packets arriving with label "17" will be forwarded without any label toward serial 4/0.
E. Packets arriving with label "20" will be forwarded with label "21" after label-swapping.
F. Label "20" is advertised to MPLS neighbors so that they can use this information to reach the
prefix 10.10.10.8/32.
Answer: C,D,E,F
When troubleshooting a network, the output of the command show interfaces indicates a large
number of runts. What is a runt?
A. the number of packets that are discarded because they exceed the maximum packet size of the
medium
B. errors created when the CRC generated by the originating LAN station or far-end device does
not match the checksum calculated from the data received.
C. the number of packets that are discarded because they are smaller than the minimum packet
size of the medium
D. the number of received packets that were iqnored bv the interface because the interface
hardware ran low on internal buffers
E. the number of times that the interface requested another interface within the router to slow down
Answer: C
Which two of these elements need to be configured prior to enabling SSH? (Choose two.)
A. hostname
B. loopback address
C. default gateway
D. domain name
E. SSH peer address
Answer: A,D
Refer to the exhibit. Based on this configuration, what type of marker is achieved?
A. Single-rate, two-color marker V
B. Three-rate, two-color marker
C. Two-rate, three-color marker
D. Single-rate, three-color marker
Answer: C
Refer to the exhibit. A network engineer received a sudden request to prioritize voice over his
Cisco network and he has decided to leverage the AutoQoS feature. Based on the output shown,
which two tasks need to be performed prior to issuing the autoqos voip command in this router?
(Choose two.)
A. Enable Cisco Express Forwarding.
B. Enable fast switching.
C. Delete all policy maps.
D. Remove service-policy commands from interface serial1/0.
E. Delete all the currently configured class maps.
Answer: A,D
What is an important consideration that should be taken into account when configuring shaped
round robin?
A. It enables policing.
B. Strict priority is not supported.
C. WRED must be previously enabled.
D. It enables WRR.
Answer: B
Refer to the exhibit. Based on the configuration shown, which queuing mechanism has been
configured on interface serial.1/0?
A. PQ
B. CQ
C. WFQ
D. LLQ
E. CBWFQ
Answer: E
Which of the following is the encryption algorithm used for priv option when using SNMPv3?
A. HMAC-SHA
B. HMAC-MD5
C. CBC-DES
D. AES
E. 3DES
Answer: C
Which RMON group stores statistics for conversations between sets of two addresses?
A. hostTopN
B. matrix
C. statistics
D. history
E. packet capture
F. host
Answer: B
Which of the following describes the appropriate port assignment and message exchange in a
standard TFTP transaction?
A. Server: 10.0.0.1:69 RRQ/WRQ Sent
Client: 10.0.0.2:1888 RRQ/WRQ Received
B. Server: 10.0.0.1:1888 RRQ/WRQ Received Client: 10.0.0.2:69 RRQ/WRQ Received
C. Server: 10.0.0.1:69 RRQ/WRQ Received Client: 10.0.0.2:69 RRQ/WRQ Sent
D. Server: 10.0.0.1:69 RRQ/WRQ Received Client: 10.0.0.2:1888 RRQ/WRQ Sent
E. Server: 10.0.0.1:1888 RRQ/WRQ Sent Client: 10.0.0.2:69 RRQ/WRQ Sent
F. Server: 10.0.0.1:1888 RRQ/WRQ Received Client: 10.0.0.2:69 RRQ/WRQ Sent
Answer: D
You are responsible for network monitoring and need to monitor traffic over a routed network from
a remote source to an IDS or IPS located in the headquarters site. What would you use in order to
accomplish this?
A. VACLs and VSPAN
B. RSPAN
C. ERSPAN
D. NetFlow
Answer: C
What is the default maximum reservable bandwidth (percentage) by any single flow on an
interface after enabling RSVP?
A. 75 percent
B. 60 percent
C. 56 percent
D. 50 percent
E. 25 percent
Answer: A
Which two protocols can have their headers compressed through MQC? (Choose two.
A. RTP
B. RTSP
C. HTTP
D. TCP
E. UDP
Answer: A,D
You have a router running BGP for the MPLS network and OSPF for the local LAN network at the
sales office. A route is being learned from the MPLS network that also exists on the OSPF local
network. It is important that the router chooses the local LAN route being learned from the
downstream switch running OSPF rather than the upstream BGP neighbor. Also, if the local OSPF route goes away, the BGP route needs to be used. What should be configured to make sure that
the router will choose the LAN network as the preferred path?
A. static route needs to be added
B. floating static route needs to be added
C. bgp backdoor command
D. ospf backdoor command
Answer: C
In BGP routing, what does the rule of synchronization mean?
A. A BGP router can only advertise an EBGP learned route, provided that the route is an IGP
route in the routing table.
B. A BGP router can only advertise an IBGP learned route, provided that the route is an IGP route
in the routing table.
C. A BGP router can only advertise an IBGP learned route, provided that the route is an IGP route
that is not in the routing table.
D. A BGP router can only advertise an EBGP learned route, provided that the route is a metric of 0
in the BGP table.
Answer: B
Router 1 is configured for BGP as dual-homed on the Cisco network. Which three BGP attributes
are carried in every BGP update on this router (both IBGP and EBGP)? (Choose three.)
A. origin
B. router-ID
C. AS-path
D. local-preference
E. next-hop
Answer: A,C,E
In your Cisco EIGRP network, you notice that the neighbor relationship between two of your
routers was recently restarted. Which two of these choices could have made this occur? (Choose
two.)
A. An update packet with init flag set from a known, already established neighbor relationship was
received by one of the routers.
B. The ARP cache was cleared.
C. The counters were cleared.
D. The IP EIGRP neighbor relationship was cleared manually.
Answer: A,D
Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,
regardless of what the routing table shows. Which one of these options would enable you to
policy-route the traffic?
A. source IP address and the protocol (such as SSL, HTTPS, SSH)
B. the packet Time to Live and the source IP address
C. type of service header and DSCP value
D. destination IP address
Answer: A
You use OSPF as your network routing protocol. You use the command show ip route and you
see several routes described as 0, 0 IA, 0 E1, and 0 E2. What routes are in your area?
A. OIA
B. OE1
C. O E2
D. 0
Answer: D
What are the mandatory, well-known BGP attributes?
A. origin, AS-path, next-hop
B. AS-path, origin, MED
C. AS-path, origin, weight
D. AS-path, weight, MED
Answer: A
Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the
path cost calculated?
A. number of hops
B. priority of the bridge
C. interface bandwidth
D. interface delay
E. None of the above
Answer: C
You deployed new fibers in your network to replace copper spans that were too long. While
reconnecting the network, you experienced network problems because you reconnected wrong
fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly
when connecting and reconnecting fiber pairs?
A. Only use fiber in pairs.
B. Configure root guard on your switches.
C. Do not use fiber but use copper.
D. Configure UDLD to prevent one-way link conditions.
Answer: D
While deploying a new switch, you accidentally connect ports 3/12 and 3/18 together, creating a
loop. STP detected it and placed port 3/18 in blocking mode. Why did STP not place port 3/12 in
blocking mode instead?
A. Port 3/12 was already up and forwarding before the loop was created.
B. Port priority is based on lowest priority and lowest port number.
C. You connected the wire on port 3/18 last.
D. None of the above, it is purely random.
Answer: B
What keywords do you need to the access-list to provide to the logging message like source
address and source mac address?
A. Log
B. Log-input
C. Log-output
D. Logging
Answer: B
The OSPF RFC 3623 Graceful Restart feature allows you to configure IETF NSF in ultivendor
networks. When using OSPF Graceful Restart, which mechanism is used to continue forwarding
packets during a switchover?
A. Reverse Path Forwarding
B. Hardware-based forwarding
C. UDP forwarding
D. Layer 2 Forwarding
Answer: B
Multi Protocol Label Switching (MPLS) is a data-carrying mechanism that belongs to the family of
packet-switched networks. For an MPLS label, if the stack bit is set to1, which option is true?
A. The stack bit will only be used when LDP is the label distribution protocol
B. The label is the last entry in the label stack.
C. The stack bit is for Cisco implementations exclusively and will only be used when TDP is the
label distribution protocol.
D. The stack bit is reserved for future use.
Answer: B
You work as a network engineer for the company, you want to configure two BGP speakers to
form an EBGP session across a firewall. On the engineer's network, the firewall always permits
TCP sessions that are initiated from the inside network (the network attached to the inside
interface of the firewall). What prerequisite is there for enabling BGP to run on this network?
A. EBGP multihop will need to be configured for this to work.
B. This should work with normal BGP peering, with no additional configuration on the BGP
speakers or the firewall.
C. The BGP protocol port must be opened on the firewall
D. There is no way to make BGP work across a firewall.
Answer: C
For the following LMI types, which three can be configured for use with Frame Relay on a Cisco
router? (Choose three.)
A. Cisco
B. ANSI - Annex D
C. Q.931 - Annex B
D. Q.933 - Annex A
Answer: A,B,D
A user has no network connectivity. A check of the associated port indicates that the interface is
up, the line protocol is down. Which item would most likely cause this problem?
A. Speed mismatch
B. Incorrect encapsulation
C. MTU set too low
D. Duplex mismatch
Answer: A
Which three statements are true about Source Specific Multicast? (Choose three.)
A. Is best suited for applications that are in the one-to-many category.
B. SSM uses shortest path trees only.
C. The use of SSM is recommended when there are many sources and it is desirable to keep the
amount of mroute state in the routers in the network to a
D. There are no RPs to worry about
Answer: A,B,D
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have
DHCP snooping enabled?
A. DHCP requests will be switched in the software, which may result in lengthy response times.
B. The switch will run out of ACL hardware resources.
C. All DHCP requests will pass through the switch untested.
D. The DHCP server reply will be dropped and the client will not be able to obtain an IP address
Answer: D
On the basis of the definitions of different services in various RFCs, traffic with Expedited
Forwarding per-hop behavior should be marked as which of these?
A. IP ToS of 0xEF
B. IP experimental ECN
C. DSCP decimal 5
D. Binary value of 101110
Answer: D
Prior to 802.1w, Cisco implemented a number of proprietary enhancements to 802.1D to improve
convergence in a Layer 2 network. Which statement is correct?
A. Only UplinkFast and BackboneFast are specified in 802.1w; PortFast must be manually
configured.
B. Only PortFast is specified in 802.1w; UplinkFast and BackboneFast must be manually
configured.
C. None of the proprietary Cisco enhancements are specified in 802.1w.
D. PortFast, UplinkFast, and BackboneFast are specified in 802.1w
Answer: D
In Frame Relay, FECN messages indicating congestion are sent or received by which of
following?
A. Sent by the destination
B. Received by the sender
C. Received by the destination
D. Sent by the sender
Answer: C
Which statement is correct in reference to IPv6 multicast?
A. IPv6 multicast uses Multicast Listener Discovery.
B. The first 8 bits of an IPv6 multicast address are always FF (1111 1111).
C. IPv6 multicast requires MSDP.
D. PIM dense mode is not part of IPv6 multicast.
Answer: A
As a network administrator, can you tell me what the root guard feature provides in a
bridgednetwork?
A. It ensures that BPDUs sent by the root bridge are forwarded in a timely manner
B. It enforces the root bridge placement in the network
C. It ensures that all ports receiving BPDUs from the root bridge are in the forwarding state.
D. It ensures that the bridge is elected as root bridge in the network.
Answer: B
If you have overlapping IP address between two different networks or routing domains, which two
commands are needed to globally configure NAT to get this to work?
A. ip nat outside source static udp x.x.x.x y.y.y.y and ip nat inside source udp x.x.x.x y.y.y.y
B. ip nat outside source static x.x.x.x y.y.y.y and ip nat inside source static x.x.x.x y.y.y.y
C. ip nat outside source static tcp x.x.x.x y.y.y.y and ip nat outside source tcp x.x.x.x y.y.y.y
D. ip nat outside source list 1 interface x and ip nat inside source list 1 interface x
Answer: B
Two directly connected routers, R1 and -R2, are both configured for OSPF graceful restart. R2 is
able to switch packets in hardware, but R1 is not. If a network administrator logs on to R2 and
performs a system reload, which will be the result?
A. Traffic forwarded from R2 to or through -R1 will continue to be forwarded based on the
forwarding table state at the time of the reload.
B. R2 will continue to forward traffic to -R1, but -R1 will drop the traffic because its neighbor
adjacency with R2 has failed.
C. R2 will continue forwarding traffic to and through R1, but R1 will drop this traffic because it is
not capable of maintaining its forwarding state.
D. All the traffic R2 is forwarding to or through R1 will be dropped while OSPF rebuilds its neighbor
adjacency and forwarding tables.
Answer: A
In which way can the IPv6 address of 2031:0000:130F:0000:0000:09C0:876A:130B be expressed
most efficiently?
A. 2031:0:130F:0:0:09C0:876A:130B
B. 2031::130F::9C0:876A:130B
C. 2031:0:130F::9C0:876A:130B
D. 2031:0:130F:0:0:9C0:876A:130B
Answer: C
Internet Protocol version 6 (IPv6) is the next-generation Internet Layer protocol for packetswitched
internetworks and the Internet. IPv6 router solicitation is:
A. A request made by a node for the IP address of the local router
B. A request made by a node to join a specified multicast group
C. A request made by a node for a DHCP provided IP address
D. A request made by a node for the IP address of the DHCP server
Answer: A
Which two types of QoS functionality will be provided by Network-Based Application Recognition?
(Choose two.)
A. NBAR provides the ability to configure MCQ; it is a mandatory MCQ component.
B. NBAR provides deep packet inspection and is used for advanced packet classification.
C. NBAR provides per-protocol packet and byte accounting functionality; it is used to track
bandwidth utilization for all protocols described in the loaded PDLMs.
D. NBAR provides scheduling in an MQC policy map using an advanced algorithm.
Answer: B,C
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?
A. IPsec site-to-site VPN
B. Cisco AutoSecure
C. Cisco IOS Firewall
D. IPS
Answer: C
If a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP
advertisements?
A. They are discarded
B. The contents are altered to reflect the switch's own VTP database and then they are forward
out all trunking ports
C. The changes within the advertisements are made to the switch's VTP database.
D. The contents are ignored and they are forwarded out all trunking ports
Answer: A
Refer to the following descriptions, which three are true about Cisco spanning-tree features?
(Choose three.)
A. RPVST+ converges faster than RSTP during a topology change.
B. STP BPDUs are relayed by all non-root bridges and RSTP BPDUs are generated by each
bridge.
C. RSTP can only achieve rapid transition to Forwarding on edge ports and on point-to-point links.
D. RPVST+ and RSTP are both based upon the IEEE 802.1w specification.
Answer: B,C,D
Which switch port error is an indication of duplex mismatches on 10/100/1000 IEEE 802.3u
Gigabit Ethernet ports?
A. FCS errors
B. Runts
C. Multiple collisions
D. Alignment errors
Answer: C
Which one of the following potential issues is eliminated by using split horizon?
A. Joined horizons
B. Packet forwarding loops
C. cisco Express Forwarding load-balancing inconsistency
D. Asymmetric routing throughout the network
Answer: B
Phase I and Phase II DMVPN differ in terms of which of these characteristics?
A. Utilization of spoke-to-spoke dynamic tunnels
B. Utilization of multipoint GRE tunnels at the hub site
C. Utilization of hub-to-spoke dynamic tunnels
D. Support for multicast
Answer: A
Policy-based routing allows network administrators to implement routing policies to allow or deny
paths based on all of these factors except which one?
A. End system
B. Protocol
C. Application
D. Throughput
Answer: D
Two routers are connected by a serial link, and are configured to run EIGRP on all interfaces. You
examine the EIGRP neighbor table on both routers (using the show ip eigrp neighbor command)
and see that the router connected over the serial link is listed as a neighbor for a certain amount of
time, but is periodically removed from the neighbor table.
None of the routes from the neighbor ever seem to be learned, and the neighbor transmission
statistics (SRTT, RTO, and Q Count) seem to indicate that no packets are being transmitted between the neighbors. Which would most likely cause this problem?
A. While multicast packets are being successfully sent over the link, unicast packets are not
B. There is a bug in the EIGRP code that needs to be fixed.
C. This is correct behavior for the first few minutes of EIGRP neighbor formation. After four or five
cycles, it should straighten itself out and the neighbor
D. The hello or hold intervals are set differently on the two routers.
Answer: A
Which two steps below should you perform on the hub router while configuring EIGRP routing over
DMVPN (mGRE tunnel)? (Choose two.)
A. Set the NHRP hold time to match the EIGRP hold time
B. Add the enable eigrp stub command
C. Add the disable eigrp as-member split-horizon command
D. Add the disable eigrp as-member next-hop-self command
Answer: C,D
Area Border Router (ABR) is a router located on the border of one or more OSPF areas that
connect those areas to the backbone network. An ABR will inject a default route into which two
types of areas? (Choose two.)
A. Area 0
B. NSSA
C. Totally stubby
D. Stub
Answer: C,D
For the following protocols, which one provides a mechanism to transparently intercept and
redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?
A. Virtual Router Redundancy Protocol (VRRP)
B. File Transport Protocol (FTP)
C. Hot Standby Routing Protocol (HSRP)
D. Web Cache Communication Protocol (WCCP)
Answer: D
For the following items,what is the mathematical relationship between the committed information
rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?
A. CIR = TC / Bc
B. CIR = Be / Tc
C. Tc = CIR / Bc
D. Tc = Bc / CIR
Answer: D
When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both
have the same bridge priority configured, which parameter determines the winner?
A. highest-numbered IP interface
B. MAC address
C. device uptime
D. root port cost
Answer: B
Study the exhibit carefully. In this network, if all required configurations are true for routing. Subnet
10.1.1.0/24 is sourced by RA and advertised via BGP, OSPF, and EIGRP. Finally, RG knows this
subnet. Which routing protocol and administrative distance can be used by RG to reach subnet
10.1.1.0/24?
A. EIGRP, AD 90
B. EIGRP, AD 170
C. OSPF, AD 110
D. BGP, AD 20
Answer: A
For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w
network except the root bridge?
A. root port
B. backup port
C. designated port
D. alternate port
Answer: A
IEEE 802.1w is a Rapid Spanning Tree Protocol (RSTP) that can be seen as an evolution of the
802.1 standard. What are the port roles described by 802.1w?
A. root port, designated port, alternate port, backup port, and disabled
B. standby port, alternate port, root port, and disabled
C. standby port, designated port, backup port, and disabled
D. root port, designated port, alternate port, and standby port
Answer: A
This question is about the Spanning Tree Protocol (STP) root guard feature. What is the STP root
guard feature designed to prevent?
A. a root port being transitioned to the blocking state
B. a port being assigned as a root port
C. a port being assigned as an alternate port
D. a root port being transitioned to the forwarding state
Answer: B
Which two statements are true about the role of split horizon? (Choose two.)
A. It is a function used by routing protocols to install routes into routing table
B. It is a function that prevents the advertising of routes over an interface that the router is using to reach a route
C. Its function is to help avoid routing loops.
D. It is a redistribution technique used by routing protocols
Answer: B,C
You are a network technician, study the exhibit carefully. In this EIGRP network, the output of the
command show interface for the link between R2 and R5 indicates that the link load varies
between 10 and 35. Which K value setting will be used to make sure that this link is not used by
EIGRP when the link load reaches 35, but can be used again when the link load drops below 20?
A. Link load is not read in real time, so there is no way to set the K values to make EIGRP choose
to use or not use a link based on the link load.
B. There is not enough information in the question to determine the correct answer.
C. Use the K5 setting to include load in EIGRP's metric calculations.
D. Use the K2 setting to include load in EIGRP's metric calculations
Answer: A
Study the exhibit carefully. Two directly connected routers are configured with OSPF. The output
presented in the exhibit can be seen on the console of one router. What most likely cause this
problem?
A. The maximum transmission unit on either side of the link is not the same
B. This debug is wrong, OSPF does not exchange DBD packets
C. This is normal for OSPF running over an FDDI ring
D. OSPF has received a packet that will not fit in its local buffer, so the packet has been
discarded.
Answer: A
On the basis of the network provided in the exhibit, R1 is injecting 10.1.5.0/24 by use of a network
statement as a network (type 2) LSA. What LSAs will R6 have in its local database for
10.1.5.0/24?
A. R6 will not have any LSAs containing 10.1.5.0/24
B. R6 will have a summary (type 3) LSA containing 10.1.5.0/24, generated by R4 or R5, the Area
Border Routers for Area 2, its local area
C. R6 will have the network (type 2) LSA generated by R1 in Area 1 containing 10.1.5.0/24
D. R6 will have a summary (type 3) LSA containing 10.1.5.0/24, generated by either R2 or R3, the
Area Border Routers for area 1.
Answer: A
Based on the network provided in the exhibit, how to route the traffic arriving at R1 for 10.1.3.1?
A. through R3, since the path through R3 is through the backbone
B. through R2, because that is the only path available; no neighbor adjacency will be built between R1 and R2
C. through R1, since the path through R1 has the lowest hop count
D. through R1, since the path through R1 has the lowest total metric (10+10=20, versus
10+10+10=30 through R3)
Answer: A
Look at the following exhibit carefully; there is no route to 10.1.4.0/24 in the local routing table.
According to the output of R1 in the exhibit, can you tell me why 10.1.4.0/24 is not in R1's routing
table?
A. The forwarding address, 10.1.3.2, is also redistributed into OSPF, and an OSPF external route
cannot use another OSPF external as its next hop
B. R3 is not redistributing 10.1.4.0/24 properly.
C. R2 is not properly configured as an Area Border Router
D. Area 1 is a stub area, and external routes cannot be originated in a stub area.
Answer: A
Look at the following exhibit carefully; there is no route to 10.1.4.0/24 in the local routing table.
According to the output of R1 in the exhibit, can you tell me why 10.1.4.0/24 is not in R1's routing
table?
A. The forwarding address, 10.1.3.2, is also redistributed into OSPF, and an OSPF external route
cannot use another OSPF external as its next hop
B. R3 is not redistributing 10.1.4.0/24 properly.
C. R2 is not properly configured as an Area Border Router
D. Area 1 is a stub area, and external routes cannot be originated in a stub area.
Answer: A
You work as a network engineer for a Company. Study the exhibit carefully. In this network, R1 is
redistributing 10.1.5.0/24 into OSPF, and R2 is originating 10.1.4.0/24 as an internal route. R6 has
received packets destined to 10.1.4.1 and 10.1.5.1. Which statement is true about the path or
paths these two packets will take?
A. The packet destined to 10.1.5.1 will follow the optimum path through the network, R4 to R1,
while the packet destined to 10.1.4.1 will follow a suboptimal path through the network.
B. There is not enough information provided to determine which packet will take an optimal or
suboptimal path through the network.
C. Both packets will follow optimal paths through the network to their destinations
D. The packet destined to 10.1.4.1 will follow an optimal path through the network, while the
packet destined to 10.1.5.1 will follow a suboptimal path through the network
Answer: A
Based on the network provided in the exhibit, in these two areas, all routers are performing OSPF
on all interfaces. After examining the OSPF database on R4, do you know which type of LSA will
Cisco 350-001 Exam
"Pass Any Exam. Any Time." - www.actualtests.com 83
contain 10.1.5.0/24, and which router will have originated it?
A. 10.1.5.0/24 will be in a summary (type 3) LSA originated by R3.
B. 10.1.5.0/24 will be in a router (type 1) LSA generated by R3.
C. 10.1.5.0/24 will be in a network (type 2) LSA originated by R3.
D. 10.1.5.0/24 will not be in any LSA in the OSPF database at R4, because R4 and R3 are in
different areas.
Answer: A
On the basis of the exhibit provided, assuming that EIGRP is the routing protocol, then at R5, what
would be the status of each path to 172.30.1.0/24?
A. the path through R3 would be the successor, the path through R1 would be a feasible
successor, and the path through R4 would be neither a successor nor a feasible successor
B. not enough information has been given to figure out what the status of each route would be
C. the path through R3 would be the successor, and the paths through R1 and R4 would be
feasible successors
D. the path through R1 would be the successor, the path through R3 would be a feasible
successor, and the path through R4 would be neither a successor nor feasible successor
Answer: A
Based on the network displayed in the exhibit, both R1 and R2 are configured as EIGRP stub
routers. If the link between R1 and R3 is down, will R3 still be able to reach 192.168.1.0/24, and
why or why not?
A. No. R3 would remove its route to 192.168.1.0/24 through R1, but would not query R2 for an
alternate route, since R2 is a stub.
B. No. The path through R2 would always be considered a loop at R3.
C. Yes. When a directly connected link fails, a router is allowed to query all neighbors, including
stub neighbors, for an alternate route.
D. Yes, because R3 would know about both routes, through R1 and R2, before the link between
R1 and R3 failed.
Answer: A
Which statement best describes OSPF external LSAs (type 5)?
A. OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which
require that redistribution be configured.
B. External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.
C. Type 5 LSAs are route summaries describing routes to networks outside the OSPF
Autonomous System.
D. External network LSAs (type 5) redistributed from other routing protocols into OSPF are not
permitted to flood into a stub area.
Answer: D
This question is about the formation of OSPF adjacency. An OSPF adjacency will not form
correctly across a point-to-point link in the same area. Which would most likely cause this
problem?
A. Each interface has a different OSPF cost.
B. Each interface is configured with secondary addresses as well as primary addresses.
C. Each interface has a different MTU size.
D. Each interface is configured with the ip unnumbered loopback 0 command.
Answer: C
Observe the following network presented in this exhibit carefully. Assume that all routers are
running EIGRP in AS 100 on all connected links. If the link between R3 and R4 is down, how
many queries will R5 and R6 receive?
A. R5 will receive two queries, one for 192.168.1.0/24 and one for 192.168.2.0/24. R6 will receive
B. R5 will receive one query, for 192.168.1.0/24, and R6 will receive no queries
C. Both R5 and R6 will receive two queries, one for 192.168.1.0/24 and one for 192.168.2.0/24
D. Neither R5 nor R6 will receive any queries for either 192.168.1.0/24 or 192.168.2.0/24.
Answer: A
Which description of the following is true according to the information shown in the figure?
A. RTC will not have the 192.168.10.0 network in its routing table.
B. RTC will not have the 10.0.0.0 network in its routing table.
C. RTB will not have the 10.0.0.0 network in its routing table.
D. RTB and RTC will not have the 10.0.0.0 network in their routing tables.
Answer: B
Observe the following exhibit seriously, which path will be preferred by traffic destined to 10.1.3.1
and arriving at R1?
A. through R3, because R1 will only have a summary (type 3) LSA from R2
B. through R2, since it is the path through Area 0
C. through R3, since that is the lowest cost path (10+10 = 20, which is lower than 100)
D. through R2; this is the only path available for R1 to reach 10.1.3.0/24, since R3 is in a different
autonomous system than R1 and R2
Answer: B
On the basis of the network provided in the exhibit, R3 and R4 are configured to run all connected
links in OSPF Area 1. The network administrator is complaining that traffic destined to
192.168.1.0/24 is being routed to R2, even if R2 is not running OSPF. Which would be the cause
of this problem?
A. The next hop towards 192.168.1.0/24 at R4 should be 10.1.1.2, which is R2.
B. The next hop towards 192.168.1.0/24 at R4 should be 10.1.1.1, since R1 is redistributing the
route from EIGRP into OSPF. R3 is forwarding traffic incorrectly.
C. The next hop towards 192.168.1.0/24 at R4 should be 10.1.2.2, which is R3. R3 should be
load-sharing between R1 and R2 for its next hop.
D. R4 does not have a route towards 192.168.1.0/24, so the network administrator is wrong in
thinking any traffic is being forwarded there.
Answer: A
You are a network engineer for a company, study the exhibit carefully. The company's network is
running EIGRP and you want to change the path R5 uses to reach 172.30.1.0/24 to R4. How
could you achieve this goal?
A. Change the bandwidth on the link between R2 and R5 to 70, and change the bandwidth on the
link between R3 and R5 to 70.
B. Change the bandwidth on the link between R4 and R5 to 110.
C. Change the bandwidth on the link between R3 and R5 to 70.
D. Do nothing, the best path to 172.30.1.0/24 from R5 is already through R4.
Answer: A
On the basis of the network provided in the exhibit, all routers are configured to run EIGRP on all
links. If the link between R1 and R2 fails, what is the maximum number of queries R3 will receive
for 192.168.1.0/24, assuming that all the packets sent during convergence are transmitted once
(there are no dropped or retransmitted packets)?
A. R3 will receive up to four queries for 192.168.1.0/24, one each from R2, R4, R5, and R6.
B. R3 will receive up eight queries for 192.168.1.0/24, one from R2, two from R4, three from R5,
and four from R6.
C. R3 will receive one query for 192.168.1.0/24, since the remote routers, R4, R5, and R6, are
natural stubs in EIGRP.
D. R3 will not receive any queries from R2, because there are no alternate paths for
192.168.1.0/24.
Answer: A
Based on the exhibit presented. R2 does not have any 10.100.x.x routes in either its routing table
or its BGP table. What will you do at R5 to solve this problem?
A. Disable BGP synchronization.
B. Set the BGP next-hop-self command for neighbor R2
C. Configure a static route for 10.100.0.0/16 to null0
D. Add a BGP network statement to encompass the serial link.
Answer: C
Based on the output provided in the exhibit, to which address or location will the router forward a
packet sent to 192.168.32.1?
A. 10.1.1.1
B. 10.1.1.2
C. 10.1.1.3
D. The default gateway
Answer: A
Which two statements best describe CBWFQ? (Choose two.)
A. The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B. CBWFQ services each class queue using a strict priority scheduler.
C. The class-default queue only supports WFQ.
D. Inside a class queue, processing is always FIFO, except for the class-default queue.
Answer: A,D
Which statement is true of a source that wants to transmit multicast traffic to group 239.1.1.1?
A. Before sending traffic, it must first join multicast group 239.1.1.1 by sending an IGMPv2
membership report to the default router on the local subnet.
B. It must send an IGMPv2 Request to Send packet and then wait for an IGMPv2 Clear to Send
packet from the IGMPv2 querier router on the local subnet
C. It may begin transmitting multicast traffic to the group only when there is no other host
transmitting to the group on the local subnet.
D. It may transmit multicast traffic to the group at any time.
Answer: D
Based on the exhibit presented. What will be the objective of this route map when applied to traffic
passing through a router?
A. Take any packet sourced from any address in the 10.2.0.0/16 network or destined to 10.1.14.25
and set the next hop to 10.1.1.1
B. Take any packet sourced from any address in the 10.2.0.0/16 network and destined to
10.1.14.25 and set the next hop to 10.1.1.1
C. Nothing; extended access lists are not allowed in route maps used for policy-based routing
D. Drop any packet sourced from 10.2.0.0/16
Answer: A
You work as a network technician at a famous Company.com, study the exhibit provided. You are
implementing this QoS configuration to improve the bandwidth guarantees for traffic towards two
servers, one with the IP address 5.5.5.5 and the other with the IP address 5.5.5.4. Even after the
configuration is applied, performance does not seem to improve. Which will be the most likely
cause of this problem?
A. The policy map mark has been applied on a half-duplex Ethernet interface; this is not
supported.
B. The policy map queue is configured on the wrong interface; it is applied on the serial interface
whereas traffic is going over the tunnel interface.
C. The class maps are wrongly configured
D. The ip nbar protocol-discover command cannot be configured together with a service policy
output on the serial interface.
E. This is probably a software bug
Answer: C
What effect will the as-path filter command that is configured on R4 create BGP routing table?
A. It will have all three routes on the R4 BGP routing table
B. It will have none of the three routes on the R4 BGP routing table.
C. It will have only the route 30.30.1.0/24.
D. It will have routes 40.40.1.0/24 and 200.200.6.6/32.
E. It will have routes 30.30.1.0/24 and 200.200.6.6/32.
F. It will have routes 30.30.1.0/24 and 40.40.1.0/24.
Answer: B
We have IPv6 multicast configured between R5 and R6, which three statements are true based on
the partial command output shown? (Choose three)
A. I R6 has joined one multicast group, and it expires in 46 seconds.
B. The rendezvous point address is 2001:DB8:5::5.
C. The multicast group address is FE80::216.
D. R6 has joined two multicast groups, and it expires in 7 seconds.
E. The multicast entry is operating in sparse mode.
F. The multicast groups are FF04::10 and FF04::30.
Answer: B,E,F
You have just configured R5 and R6 to run EIGRPv6 as shown; the IPv6 ping from R5 to R6-
loopback 0 is failing. Which statement could be the reason?
A. The loopback interfaces on R5 and R6 must be configured on an EIGRPv6 As number other
than 56.
B. The loopback interfaces on R5 and R6 must be configured to EIGRPv6 As number 56.
C. You need to configure the EIGRPv6 router process on both routers.
D. You need to configure the EIGRPv6 router process in at least one of the routers
E. You should remove the ipv6 eigrp 56 from the loopback interfaces on both routers.
Answer: C
We have IPv6 multicast configured between R5 and R6. Which two statements are true based on
the partial command output shown? (Choose two.)
A. R6 has joined the multicast group, and it expires in 46 seconds
B. The rendezvous point address is FE80::21 6:47FF:FEBB:FFO.
C. The multicast group address is FF04::1 0.
D. The multicast entry is operating in dense mode.
E. The multicast route has been pruned.
Answer: C
which type of the LSA will be added in the OSPF broadcaset network type?
A. LSA1
B. LSA2
C. LSA3
D. LSA5
E. LSA7
Answer: B
which one is the Designated Router router ID?
A. 7.7.1.1
B. 7.7.5.5
C. 7.7.6.6
D. 22.22.2.2
E. 7.7.2.2
Answer: E
IPV6 multicast over the lan link between R1/R2 two routers,Which statement is true?
A. IPv6 multicast group with the first octet in every route, the RP use sparse mode.
B. IPv6 multicast group with the first octet in every route, the RP use Dense mode.
C. IPv6 multicast group with the first octet in every route, the RP use sparse-dense mode.
D. Composed of (*, G) and (S, G) entries,the multicast distribution trees as understood by the
router at this point in the network.
Answer: A
Between R3--R1--R2 all interfaces running EIGRPv6, why R3-loopback cannnot reach R1-
loopback?
Cisco 350-001 Exam
"Pass Any Exam. Any Time." - www.actualtests.com 107
A. R1 and R3 EIGRP v6 AS no mismatch.
B. R1 and R2 EIGRP v6 K1 K2 K3 K4 K5 no mismatch.
C. R1 and R3 “ipv6 eigrp as-numberno configure interface mode no shutdown.
D. R1 and R3 authenticastion no mismatch.
Answer: C
Look at the configuration in R3. Of the following routes (30.30.0.0/16, 40.40.0.0/16, and
200.200.0.0/16) Which ones will show up in R2?
A. 40.40.0.0/16 and 200.200.0.0/16 will show up to R2.
B. 30.30.0.0/16 and 200.200.0.0/16 will show up to R2.
C. 30.30.0.0/16 and 40.40.0.0/16 will show up to R2.
D. 30.30.0.0/1640.40.0.0/16 and 40.40.0.0/16 will show up to R2.
Answer: A
Which statements are true about the following policy map?
A. Packets between 200 and 1000 bytes will be marked with prec 2.
B. Packets less that 488 will be marked with ip prec 2.
C. Packets more that 500 will be marked with ip prec 2.
D. Packets with size that 200 will be marked with ip prec 2
Answer: D