PArt 5+6 - Q
PArt 5+6 - Q
PArt 5+6 - Q
What is the task you must perform when configuring SSH? (Choose two)
A. Configure TACACS+
B. Configure hostname
C. Generate RSA key
D. Disable telnet
Answer: B C
Explanation
The following are the prerequisites for configuring the switch for secure shell (SSH):
– For SSH to work, the switch needs an Rivest, Shamir, and Adleman (RSA) public/private key
pair. This is the same with Secure Copy Protocol (SCP), which relies on SSH for its secure
transport.
– Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the
switch.
– Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and
Adelman (RSA) key pair.
– SCP relies on SSH for security.
– SCP requires that authentication, authorization, and accounting (AAA) authorization be
configured so the router can determine whether the user has the correct privilege level.
– A user must have appropriate authorization to use SCP.
– A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File
System (IFS) to and from a switch by using the copy command. An authorized administrator can
also do this from a workstation.
– The Secure Shell (SSH) server requires an IPsec (Data Encryption Standard [DES] or 3DES)
encryption software image; the SSH client requires an IPsec (DES or 3DES) encryption software
image.)
– Configure a hostname and host domain for your device by using the hostname and “ip domain-
name” commands in global configuration mode.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-
0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-
x_cg_chapter_01001.html
Question 2
Which two pieces of information can you determine from the output of the show ntp
status command? (Choose two)
Answer: C D
Explanation
First we can see if the local device has been synchronized or not by the line “Clock is
synchronized” (or “Clock is unsynchronized”) -> Answer D is correct.
Also in the same line, we see the line “reference is 10.1.2.1” which is the IP address of the peer to
which the clock is synchronized. For example in this case R1 has been configured with the
command “R1(config)#ntp server 10.1.2.1” -> Answer C is correct.
Question 3
You are implementing WAN access for an enterprise network while running applications that
require a fully meshed network, which two design standards are appropriate for such an
environment? (Choose two)
Answer: A B
Explanation
With DMVPN phase 2 and 3, spokes can speak with each other directly like they are directly
connected in a meshed network. This simplifies the connectivity for the enterprise -> Answer A is
correct.
Another way to run applications that require a fully meshed network is through a WAN distribution
layer that is connected to all remote sites. Therefore these sites can communicate with each other
via this WAN distribution layer.
Question 4
Which task do you need to perform first when you configure IP SLA to troubleshoot a network
connectivity issue?
Answer: B
Explanation
This question is a bit unclear but answer B is still the best choice here. Maybe “Enable the ICMP
echo operation” here means “Configure the ICMP echo operation” which requires the following
commands:
configure terminal
ip sla operation-number
icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-
address | hostname} | source-interface interface-name]
frequency seconds
For example:
R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet0/0
R1(config-ip-sla-echo)#frequency 10
After that we can schedule the above ICMP echo operation with the command (for example):
Then we can verify the ICMP echo operation at the end with the command “show ip sla group
schedule” and “show ip sla configuration”.
Question 5
Which technology can combine multiple physical switches into one logical switch?
A. HSRP
B. VSS
C. VRRP
D. NHRP
Answer: B
Question 6
Which two features are compatible with port security? (Choose two)
A. Voice VLAN
B. SPAN source port
C. DTP
Answer: A B
Explanation
Table 3 of the following link lists which features are compatible with port security
feature: https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3.2_0_se
/multibook/configuration_guide/b_consolidated_config_guide_3850_chapter_011111.html
Question 7
Which fallback method can you configure to allow all AAA authorization requests to be granted if
the other methods do not respond or return an error?
A. Radius
B. Enable
C. TACACS+
D. NONE
Answer: D
Explanation
The following examples show how to use a TACACS+ server to authorize the use of network
services. If the TACACS+ server is not available or an error occurs during the authorization
process, the fallback method (none) is to grant all authorization requests:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-
3s/sec-usr-aaa-xe-3s-book/sec-cfg-authorizatn.html
Question 8
By default what is the maximum number of equal metric path BGP uses for load balancing?
A. 1
B. 2
C. 4
D. 6
Answer: A
Explanation
By default, BGP chooses one best path among the possible equal-cost paths that are
learned from one AS. However, you can change the maximum number of parallel equal-cost
paths that are allowed. In order to make this change, include the maximum-
paths paths command under the BGP configuration. Use a number between 1 and 6 for the paths
argument.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13762-
40.html
Question 9
The track objects in IP SLA and make sure that it is only up if all track objects are up, which
method achieves that goal?
A. AND
B. OR
C. XOR
D. NOT
Answer: A
Explanation
track track-number list boolen {and | or}
This command configures a tracked list object, and enter tracking configuration mode. The track-
number can be from 1 to 500.
+ boolean – Specify the state of the tracked list based on a Boolean calculation.
+ and – Specify that the list is up if all objects are up or down if one or more objects are down.
+ or – Specify that the list is up if one object is up or down if all objects are down
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/re
lease/12-2_55_se/configuration/guide/3750xscg/sweot.pdf
Question 10
With PCA and PCB and there are three routers between them and a different MTU value and they
want a PCA to run an application with PCB and DF is set so we have to choose?
A. MSS
B. PMTUD
C. GRE
D. ?
Answer: B
Explanation
It is important to note that the “don’t fragment” (DF) bit plays a central role in PMTUD because it
determines whether or not a packet is allowed to be fragmented.
Packets with this flag are never fragmented, but rather dropped when a router sees that the
packet does not fit outgoing link’s MTU. When dropping the packet, the router should signal back
to the sending host with a special ICMP unreachable message, telling that the packet has been
dropped due to the large size and suggesting the new MTU value.
Note: The TCP Maximum Segment Size (MSS) defines the maximum amount of data that a host is
willing to accept in a single TCP/IPv4 datagram. The MSS value is sent as a TCP header option only
in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side.
Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is
required to limit the size of data in a single TCP segment to a value less than or equal to the MSS
reported by the receiving host.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-
gre/25885-pmtud-ipfrag.html
Question 11
Answer:
Question 12
How to implement local authentication using a list for case insensitive usernames?
Answer: A
Explanation
Use the aaa authentication login command with the local method keyword to specify that the Cisco
router or access server will use the local username database for authentication. For example, to
specify the local username database as the method of user authentication at login when no other
method list has been defined, enter the following command:
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c
/scfathen.html
Note: The difference between the last keyword “local” and “local-case” is the first one uses the
case-insensitive local username database while the second keyword uses case-sensitive local
username for authentication.
Answer:
+ ip nhrp shortcut – configured on the spoke which is responsible to rewrite the CEF entry after
getting the redirect message from hub
+ ip nhrp network-id – (?)
+ ip nhrp map – (?)
+ ip redirects – are disabled by default on a tunnel interface
+ ip nhrp responder – Specifies which interface the Next Hop Server uses for the NHRP
responder IP address
+ ip nhrp nhs – Statically configures a Next Hop Server
But they cannot be matched with two rest options on the left.
Explanation
In fact the “ip nhrp shortcut” should be both “configured on the spoke which is responsible to
rewrite the CEF entry after getting the redirect message from hub” and “Enables NHRP shortcut
switching on the interface” so maybe there is something missing in this question.
Note: “ip redirects” (not “ip nhrp redirects”) are disabled by default on a tunnel interface
Question 14
Question about IP SLA deployment cycle. Chose best IP SLA deployment cycle that reduce
deployment (Choose four)
Answer: A B D E
Reference: https://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_pa
per0900aecd8017f8c9.html
Question 15
What are two differences between SNMP traps and SNMP informs? (Choose two)
Answer: A D
Explanation
Traps are messages alerting the SNMP manager to a condition on the network. Informs are traps
that include a request for confirmation of receipt from the SNMP manager -> Answer A is correct.
Traps are often preferred even though they are less reliable because informs consume more
resources in the router and the network. Unlike a trap, which is discarded as soon as it is
sent, an inform must be held in memory until a response is received or the request times out ->
Answer D is correct.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/12-4t/snmp-
12-4t-book/nm-snmp-cfg-snmp-support.html
Question 16
A. UDP
B. TCP
C. IP
Answer: B
Question 17
A router in an EVN environment is choosing a route. Which value is given the highest selection
priority?
Answer: A
Question 18
A. unicast flooding
B. uRPF failure
C. errdisabling of ports
D. port security violations
E. excessive STP reconvergence
Answer: A B
Explanation
The very cause of unicast flooding is that destination MAC address of the packet is not in the L2
forwarding table of the switch. In this case the packet will be flooded out of all forwarding ports in
its VLAN (except the port it was received on). Below case studies display most common reasons
for destination MAC address not being known to the switch.
Unicast RPF configured in strict mode may drop legitimate traffic that is received on an interface
that was not the router’s choice for sending return traffic. Dropping this legitimate traffic could
occur when asymmetric routing paths are present in the network (-> Therefore answer “uRPF
failure” is correct)
Reference: https://www.cisco.com/c/en/us/about/security-center/unicast-reverse-path-
forwarding.html
Question 19
Which difference in the packet fragmentation feature between IPv4 and IPv6 devices is true?
Answer: A
Explanation
With IPv4, every router can fragment packets, if needed. If a router cannot forward a packet
because the MTU of the next link is smaller than the packet it has to send, the router fragments
the packet. It cuts it into slices that fit the smaller MTU and sends it out as a set of fragments. The
packet is then reassembled at the final destination. Depending on the network design, an IPv4
packet may be fragmented more than once during its travel through the network.
With IPv6, routers do not fragment packets anymore; the sender takes care of it. Path MTU
discovery tries to ensure that a packet is sent using the largest possible size that is supported on a
certain route. The Path MTU is the smallest link MTU of all links from a source to a destination.
Reference: https://www.oreilly.com/library/view/ipv6-essentials/0596001258/ch04s08.html
Question 20
Answer: A B
Explanation
The two answers here are listed in the “differences between Stateless NAT64 and Stateful NAT64
at (https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-
solution/white_paper_c11-676277.html)
Question 21
A. The router attempts to forward the packet along an alternate path in the route table
B. The router sends an ICMP Time Exceeded Message to the host that sent the packet
C. The router sends an ICMP Destination Unreachable Message to the host that sent the packet
D. The router flags the packet and forwards it to the next hop
Answer: B
Explanation
RFC 791 requires that a router destroy any datagram with a TTL value of zero. Packets that have
been dropped due to the expiration of their TTL value are known as TTL expiry packets. When an
IP packet is received with a TTL less than or equal to one and is expected to be forwarded by the
router, the router is required to drop the packet and reply back to the source with an ICMPv4
Type 11, Code 0 Time Exceeded message. In theory, upon receipt of this message, the
originating device should detect an issue—such as a routing problem when sending to that
particular destination, or an initial TTL value that is too low—and react to overcome the problem.
Reference: https://www.cisco.com/c/en/us/about/security-center/ttl-expiry-attack.html
Question 22
Which purpose of the AAA accounting feature is true when you use TACACS+ authentication?
Answer: B
Question 23
Based on the output from the show ip protocols vrf RED command, what is happening with the
routing processes?
Answer: C
Explanation
From the output we notice the line “Redistributing External Routes from bgp 800, includes subnets
in redistribution” so that means BGP 800 is redistributed into OSPF 1 (with the “redistribute bgp
800 subnets” under “router ospf 1”).
Question 24
Which limitation is introduced when you deploy RIPv2 on a network that uses supernet
advertisement?
Answer: A
Explanation
Supernet advertisement (advertising anynetwork prefix less than its classful major network) is not
allowed in RIP route summarization. For example , the following supernet summarization is invalid:
Router(config)#interface gigabitEthernet 0/0/0
Router(config-if)#ip summary-address rip 10.0.0.0 252.0.0.0
-> We can only summarize to the classful supernet networks.
Question 25
When configuring DHCP on a Cisco router what is the function of DHCP Option 82?
Answer: B
Explanation
DHCP option 82 provides additional security when DHCP is used to allocate network addresses. It
enables the controller to act as a DHCP relay agent to prevent DHCP client requests from
untrusted sources
Question 26
Answer: D
Explanation
IP PBR can now be fast-switched. Prior to Cisco IOS Release 12.0, PBR could only be process-
switched, which meant that on most platforms the switching rate was approximately 1000 to
10,000 packets per second. This speed was not fast enough for many applications. Users that need
PBR to occur at faster speeds can now implement PBR without slowing down the router. Fast-
switched PBR supports all of the match commands and most of the set with the following
restrictions:
+ The set ip default next-hop and set default interface commands are not supported.
+ The set interface command is supported only over point-to-point links, unless a route cache
entry exists using the same interface specified in the set interface command in the route map.
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfpb
r.pdf
Question 27
Which type of Cisco Express Forwarding adjacency is created when the next hop is directly
connected, but its MAC header rewrite information is missing?
A. punt
B. discard
C. null
D. glean
Answer: D
Explanation
Glean adjacency – in short when the router is directly connected to hosts the FIB table on the
router will maintain a prefix for the subnet rather than for the individual host prefix. This subnet
prefix points to a GLEAN adjacency. A glean adjacency entry indicates that a particular next hop
should be directly connected, but there is no MAC header rewrite information available. When the
device needs to forward packets to a specific host on a subnet, Cisco Express Forwarding requests
an ARP entry for the specific prefix, ARP sends the MAC address, and the adjacency entry for the
host is built.
Punt adjacency – When packets to a destination prefix can’t be CEF Switched, or the feature is
not supported in the CEF Switching path, the router will then use the next slower switching
mechanism configured on the router.
Question 28
Which protocol will stop listening and advertising updates, when using passive-interface
command? (Choose two)
A. OSPF
B. EIGRP
C. BGP
D. RIP
E. IS-IS
Answer: A B
Explanation
The “passive-interface…” command in EIGRP or OSPF will shut down the neighbor relationship of
these two routers (no hello packets are exchanged).
In RIP, this command will not allow sending multicast updates via a specific interface but will allow
listening to incoming updates from other RIP speaking neighbors. This means that the router will
still be able to receive updates on that passive interface and use them in its routing table.
Question 29
Question 30
Which two statements about configuring OSPFv3 are true? (Choose two)
Answer: A D
Explanation
When using NBMA in OSPFv3, you cannot automatically detect neighbors. On an NBMA interface,
you must configure your neighbors manually using interface configuration mode.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-
1sg/ip6-route-ospfv3.html
Cisco IOS routers offer two OSPF configuration methods for IPv6:
+ Using the traditional “ipv6 router ospf” global configuration command. For example:
+ Using the new-style “router ospfv3” global configuration command. For example:
Answer C is not correct as OSPFv3 does not require “network” statement like OSPFv2.
Question 31
Answer: A
Explanation
The command “distribute-list 1 out eigrp 20” creates an outbound distribute-list to filter routes
being redistributed from EIGRP AS 20 into RIP according to ACL 1.
Question 32
A. 64512 to 65535
B. 1 to 64511
C. 1024 to 65535
D. 1 to 1024
Answer: A
Explanation
BGP AS number range: Private AS range: 64512 – 65535, Globally (unique) AS: 1 – 64511
Question 33
Which routing protocol searches for a better route through other autonomous systems to achieve
convergence?
A. Link-state
B. Hybrid
C. Path vector
D. Distance vector
Answer: C
Explanation
Path vector routing protocol (like BGP) can get information from other BGP autonomous systems
to find the best route.
========================== New Questions (added on 28th-Nov-2019)
==========================
Question 34
A. Option 13
B. Option 33
C. Option 66
D. Option 67
Answer: B
Explanation
DHCP Option 33 lists static routes that the client should install in its routing table.
Reference: https://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/network_registrar/8-
0/user/guide/User_Guide_for_CNR_8-0/UGB_Opts.pdf
Question 35
Answer: D
Explanation
The “show ip flow export” command is used to display the status and the statistics for NetFlow
accounting data export, including the main cache and all other enabled caches. An example of the
output of this command is shown below:
Question 36
A. to allow only 192.168.1.3 to access the system using the community-string public
B. to allow private communications between the router and the host.
C. to collect information about the system on a network management server
D. to disable all SNMP informs that are on the system
Answer: C
Explanation
Question 37
A. IEEE standard
B. IETF standard
C. ingress
D. egress
E. ingress/egress
F. Cisco proprietary
Answer: B E
Question 38
Drag each SNMP term on the left to the matching definition on the right.
Answer:
Explanation
In general, the GET messages are sent by the SNMP Manager to retrieve information from the
SNMP Agents while the SET messages are used by the SNMP Manager to modify or assign the
value to the SNMP Agents.
-PART. 5-
Question 1
Drag and drop the statements about NAT64 from the left onto the correct NAT64 types on the
right.
Answer:
Stateful:
+ It supports FTP64 for ALG
+ It supports PAT and overload
+ It allows IPv6 systems to use any type of IPv6 address
Stateless:
+ ALG is not supported
+ It supports one-to-one mapping only
+ It requires IPv6 systems to use RFC6052 IPv4-translatable addresses
Explanation
Differences Between Stateful NAT64 and Stateless NAT64 are shown below:
Address N:1 mapping for PAT or overload One-to-one mapping — one IPv4
savings configuration that saves IPv4 address is used for each IPv6 host
addresses
Address IPv6 systems may use any type of IPv6 systems must have IPv4-
space IPv6 addresses translatable addresses (based on
RFC 6052)
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-
3s/nat-xe-3s-book/iadnat-stateful-nat64.pdf
Question 2
Answer: C
Question 3
Which two steps must you perform to allow access to a device when the connection to a remote
TACACS+ authentication server fails? (Choose two)
Answer: A B
Question 4
Network users on the 10.1.2.0/24 subnet have a default gateway of 10.1.2.254. Which command
will configure this gateway?
Answer: D
Question 5
Based on Cisco best practice, which statement about the output is true?
A. The output should be analyzed by a network engineer before allocating additional memory and
CPU usage to processes on an IOS router in production
B. The output should be analyzed by a network engineer before executing any configuration
commands on an IOS router in production
C. The output should be analyzed by a network engineer before executing any debug commands
on an IOS router in production
D. The output should be analyzed by a network engineer before executing other show commands
on an IOS router in production
Answer: C
Question 6
Users were moved from the local DHCP server to the remote corporate DHCP server. After the
move, none of the users were able to use the network. Which two issues wil prevent this setup
from working properly? (Choose two)
Answer: B E
Question 7
Which two statements about the OSPF down bit are true? (Choose two)
A. It is set only when an OSPF virtual link is created
B. It is set only for LSA types 1,2, and 4
C. It is set when OSPF routes are redistributed into BGP
D. It is set only for LSA types 3,5, and 7
E. It is set when MP-BGP routes are redistributed into OSPF
Answer: D E
Explanation
To prevent possibility of a loop, when the routes are redistributed from MP-BGP into OSPF, then
they are marked with a DN Bit in LSA Type 3, 5, or 7 and have the domain tag for Type 5 and 7
LSA.
Good reference: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-
ospf/118800-configure-ospf-00.html
Question 8
Which command can be entered on router R5 to configure 80 percent of the bandwidth of a link for
EIGRP Autonomous System 55?
Answer: A
A. inside global
B. global outside
C. outside internet
D. inside internet
E. outside local
Answer: A E
Explanation
* Inside local address – The IP address assigned to a host on the inside network. The address is
usually not an IP address assigned by the Internet Network Information Center (InterNIC) or
service provider. This address is likely to be an RFC 1918 private address.
* Inside global address – A legitimate IP address assigned by the InterNIC or service provider
that represents one or more inside local IP addresses to the outside world.
* Outside local address – The IP address of an outside host as it is known to the hosts on the
inside network.
* Outside global address – The IP address assigned to a host on the outside network. The
owner of the host assigns this address.
Question 10
Hostname R1
!
ip vrf Yellow
rd 100:1
interface Serial0/0
ip vrf forwarding Yellow
ip address 192.168.1.1 255.255.255.0
!
router eigrp 100
network 192.168.1.1 0.0.0.0
no auto-summary
redistribute static
!
R1#ping vrf Yellow 192.168.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echoes to 192.168.1.2, timeout is 2
second:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
R1 is configured with VRF-Lite and can ping R2. R2 is fully configured, but it has no active EIGRP
neighbors in vrf Yellow If the configuration of R2 is complete, then which issue prevents the EIGRP
100 neighbor relationship in vrf Yellow from forming?
A. The no auto-summary command is preventing the EIGRP neighbor relationship from forming
B. There is a Layer 1 issue that prevents the EIGRP neighbor relationship from forming
C. The interface IP addresses are not in the same subnet
D. EIGRP 100 network 192 168 1 0/24 is configured in the global routing table on R1
Answer: D
Explanation
The “network 192.168.1.1 0.0.0.0” should be configured under vrf Yellow as follows:
A. type 9
B. type 10
C. type 5
D. type 7
E. type 8
Answer: A E
Explanation
LSAs Type 8 (Link LSA) have link-local flooding scope. A router originates a separate link-LSA for
each attached link that supports two or more (including the originating router itself) routers. Link-
LSAs should not be originated for virtual links.
LSAs Type 9 (Intra-Area Prefix LSA) have area flooding scope. An intra-area-prefix-LSA has one
of two functions:
1. It either associates a list of IPv6 address prefixes with a transit network link by referencing a
network-LSA…
2. Or associates a list of IPv6 address prefixes with a router by referencing a router-LSA. A stub
link’s prefixes are associated with its attached router.
LSA Type 9 is breaking free of LSA Type 1 and LSA Type 2 as they were used in IPv4 OSPF to
advertise the prefixes inside the areas, giving us a change in the way the OSPF SPF algorithm is
ran.
Question 12
Answer: C E
Question 13
A network engineer is configuring two dedicated Internet connections within the Internet module
One connection is the primary connection to all wired business communications while Che other is
the primary connection for all customer wireless traffic If one of the links goes down, the affected
traffic needs to be redirected to the redundant link Winch current technology should be deployed
to monitor the scenario?
A. IP SLA
B. MMC
C. IP SAA
D. PBR
E. IP QoS
Answer: A
Question 14
Which command we use to control the type of routes that are processed in incoming route
updates?
A. passive-interface
B. distribute-list 1 out
C. distribute-list 1 in
D. ip vrf forwarding
Answer: C
Question 15
Which two types of traffic can benefit from LLQ? (Choose two)
A. email
B. voice
C. telnet
D. video
E. file transfer
Answer: B D
Question 16
A network administrator is attempting to configure IP SLA to allow one time stamp to be logged
when a packet arrives on the interface and one time stamp to be logged when a packet leaves the
interface. Which IP SLA accuracy tool enables this functionality?
A. Trap
B. RTT
C. Responder
D. Trigger
E. Logging
Answer: C
Explanation
Cisco IOS IP SLA Responder is a Cisco IOS Software component whose functionality is to respond
to Cisco IOS IP SLA request packets. The IP SLA source sends control packets before the operation
starts to establish a connection to the responder. Once the control packet is acknowledged, test
packets are sent to the responder. The responder inserts a time-stamp when it receives a
packet and factors out the destination processing time and adds time-stamps to the sent
packets. This feature allows the calculation of unidirectional packet loss, latency, and jitter
measurements with the kind of accuracy that is not possible with ping or other dedicated probe
testing
Reference: https://www.cisco.com/en/US/technologies/tk869/tk769/technologies_white_paper090
0aecd806bfb52.html
Question 17
Which two actions are common methods for migrating a network from one protocol to another?
(Choose two)
A. redistributing routes from the current routing protocol to the new routing protocol
B. removing the current routing protocol and implementing the new routing protocol
C. changing the relative administrative distances of the two routing protocols
D. changing the network IP addresses and bringing up the new IP addresses using the new routing
protocol
E. disabling IP routing globally and implementing the new routing protocol
Answer: A C
Question 18
Which statements best describes the following two OSPF commands, which are used to summarize
routes?
A. The area range command defines the area where the network resides. The summary-address
command enables autosummanzation
B. The area range command defines the area where the network resides. The summary-address
command summarizes a subnet for an areas
C. The area range command specifies the area where the subnet resides and summarizes it to
other areas. The summary-address command summarizes external routes
D. The area range command summarizes subnets for a specific area. The summary address
command summaries a subnet for all areas
Answer: C
Explanation
In order to RTB summarizes routes for the 192.168.16.0/22 supernet before injecting them into
Area 0, we use the command:
Question 19
Which action is the most efficient way to handle route feedback when converting a RIPv2 network
to OSPF?
Answer: A
Explanation
We should use route tag to tag any routes that are redistributed from RIPv2 to OSPF. Then when
redistributing from OSPF to RIPv2 we prevents these routes from getting back to RIPv2 domain
(route feedback) by the tags we set before.
Question 20
Answer: B
Explanation
In the stub area no Type 5 AS-external LSA allowed. It only allows LSA type 1, 2 and 3.
Question 21
What is the hop count is advertised for an unreachable network by a RIP router that uses poison
reverse?
A. 16
B. 255
C. 0
D. 15
Answer: A
Question 22
How can you change this configuration so that when user CCNP logs in, the show run command is
executed and the session is terminated?
Answer: F
Explanation
The “autocommand” causes the specified command to be issued automatically after the user logs
in. When the command is complete, the session is terminated. Because the command can be any
length and can contain embedded spaces, commands using the autocommand keyword must be
the last option on the line. In this specific question, we have to enter this line “username CCNP
autocommand show running-config”.
Question 23
router ospf 10
router-id 192.168.1.1
log-adjacency-changes
redistribute bgp 1 subnets route-map BGP-TO-OSPF
!
route-map BGP-TO-OSPF deny 10
match ip address 50
route-map BGP-TO-OSPF permit 20
!
access-list 50 permit 172.16.1.0 0.0.0.255
Which statement about redistribution from BGP into OSPF process 10 is true?
Answer: A
Explanation
The first statement of the above route-map will prevent network 172.16.1.0/24 from being
redistributed into OSPF.
Question 24
Which functions are included in the two-message rapid exchange that a DHCPv6 client can receive
from a server?
A. solicit and reply
B. advertise and request
C. solicit and request
D. advertise and reply
Answer: A
Explanation
In Rapid-Commit mode , the DHCP client obtain configuration parameters from the server through
a rapid two message exchange (solicit and reply).
In Normal-Commit mode, the DHCP client uses four message exchanges (solicit, advertise, request
and reply). By default normal-commit is used.
Reference: https://community.cisco.com/t5/networking-documents/part-1-implementing-dhcpv6-
stateful-dhcpv6/ta-p/3145631
Question 25
(exhibit missing)
Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?
A. KEY
B. MD5
C. EIGRP
D. CISCO
Answer: D
Question 26
Which two statements about redistributing EIGRP into OSPF are true? (Choose two)
A. The redistributed EIGRP routes appear as type 3 LSAs in the OSPF database
B. The redistributed EIGRP routes appear as type 5 LSAs in the OSPF database
C. The administrative distance of the redistributed routes is 170
D. The redistributed EIGRP routes appear as OSPF external type 1
E. The redistributed EIGRP routes as placed into an OSPF area whose area ID matches the EIGRP
autonomous system number
F. The redistributed EIGRP routes appear as OSPF external type 2 routes in the routing table
Answer: B F
Question 27
Answer: D
Explanation
The command “show ip flow interface” displays NetFlow accounting configuration for interfaces.
Below is an example of the output of this command:
Question 28
Which two statements are differences between AAA with TACACS+ and AAA with RADIUS?
(Choose two)
Answer: B D
Question 29
Which IOS commands can you use to limit the CPU impact of log generation and transmission on
an IOS router?
A. You can use the ip access-list logging interval command in conjunction with the logging rate-
limit command.
B. You can use the ip access-list logging limit command in conjunction with the logging rate-
interval command.
C. You can use the ip access-list syslog-logging interval command in conjunction with the logging
rate-limit command
D. You can use the ip access-list logged interval command in conjunction with the logged rate-limit
command.
Answer: A
Question 30
You are configuring a Microsoft client to call a PPP server using CHAP. Only the client will be
authenticated but the client’s password has expired and must be changed. Which PPP server
configuration allows the call to be completed?
Answer: C
Explanation
The MSCHAP Version 2 supports the Password Aging feature, which notifies clients that the
password has expired and provides a generic way for the user to change the password.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-
mt/sec-usr-aaa-15-mt-book/mschap_version_2.pdf
Note: The “calling” keyword specifies that the router will refuse to answer CHAP authentication
challenges received from the peer, but will still require the peer to answer any CHAP challenges
the router sends -> Only the client will be authenticated.
Question 31
Answer: C
Question 32
A network engineer wants to implement an SNMP notification process for host machines using the
strongest security available. Which command accomplishes this task?
Answer: C
Explanation
Both SNMPv1 and v2 did not focus much on security and they provide security based
on community string only. Community string is really just a clear text password (without
encryption). Any data sent in clear text over a network is vulnerable to packet sniffing and
interception.
SNMPv3 provides significant enhancements to address the security weaknesses existing in the
earlier versions. The concept of community string does not exist in this version. SNMPv3 provides
a far more secure communication using entities, users and groups. This is achieved by
implementing three new major features:
+ Message integrity: ensuring that a packet has not been modified in transit.
+ Authentication: by using password hashing (based on the HMAC-MD5 or HMAC-SHA
algorithms) to ensure the message is from a valid source on the network.
+ Privacy (Encryption): by using encryption (56-bit DES encryption, for example) to encrypt the
contents of a packet.
Note: Although SNMPv3 offers better security but SNMPv2c however is still more common.
Question 33
Which issue is important to address when integrating two networks with different routing protocol?
Answer: E
Question 34
Drag and drop the DMVPN components from the left onto the correct descriptions on the right.
Answer:
Question 35
%Interfact GigabitEthernet1: IPv4 disabled and address(es) removed due to enabling VRF
CUST_A
An engineer is enabling VPN service for a customer and notices this output when placing the
customer-facing interface into a VRF. Which action corrects the issue?
Answer: A
Explanation
If the interface was assigned an IP address before joining to an VRF then that IP address would be
removed so we have to reconfigure it.
Question 36
Which two statements about VRF-Lite configurations are true? (Choose two)
Answer: B E
Explanation
In VRF-Lite, Route distinguisher (RD) identifies the customer routing table and “allows customers
to be assigned overlapping addresses”. The below example shows overlapping IP addresses
configured on two interfaces which belong to two different VPNs:
Router(config)#ip vrf VRF_BLUE
Router(config-vrf)# rd 100:1
Router(config-vrf)# exit
Router(config)#ip vrf VRF_GREEN
Router(config-vrf)# rd 100:2
Router(config-vrf)# exit
Router(config)# interface GigabitEthernet0/1
Router(config-if)# ip vrf forwarding VRF_BLUE
Router(config-if)# ip address 10.0.0.1 255.0.0.0
Router(config-vrf)# exit
Router(config)# interface GigabitEthernet0/2
Router(config-if)# ip vrf forwarding VRF_GREEN
Router(config-if)# ip address 10.0.0.1 255.0.0.0
Question 37
Which two statements about PPPoE packet types are true? (Choose two)
A. PADR is a broadcast packet sent from the client to request a new server
B. PADI is an initialization packet sent as a broadcast message
C. PADO is a unicast reply packet sent to the client
D. PADO is a broadcast reply packet sent to the client
E. PADR is a unicast confirmation packet sent to the client
Answer: B C
Explanation
+ PPPoE Active Discovery Initiation (PADI): The client initiates a session by broadcasting a
PADI packet to the LAN to request a service.
+ PPPoE Active Discovery Offer (PADO): Any access concentrator that can provide the service
requested by the client in the PADI packet replies with a PADO packet that contains its own name,
the unicast address of the client, and the service requested. An access concentrator can also use
the PADO packet to offer other services to the client.
+ PPPoE Active Discovery Request (PADR): From the PADOs it receives, the client selects one
access concentrator based on its name or the services offered and sends it a PADR packet to
indicate the service or services needed.
+ PPPoE Active Discovery Session-Confirmation (PADS): When the selected access concentrator
receives the PADR packet, it accepts or rejects the PPPoE session:
– To accept the session, the access concentrator sends the client a PADS packet with a unique
session ID for a PPPoE session and a service name that identifies the service under which it
accepts the session.
– To reject the session, the access concentrator sends the client a PADS packet with a service
name error and resets the session ID to zero.
+ After a session is established, the client or the access concentrator can send a PPPoE Active
Discovery Termination (PADT) packet anytime to terminate the session. The PADT packet contains
the destination address of the peer and the session ID of the session to be terminated. After this
packet is sent, the session is closed to PPPoE traffic.
Question 38
Which two statements are examples of the differences between IPv4 and IPv6 EIGRP? (Choose
two)
Answer: D E
Explanation
Although the configuration and management of EIGRP for IPv4 and EIGRP for IPv6 are similar,
they are configured and managed separately. A few (not all) examples of differences include
these:
+ The network command is not used in IPv6; EIGRP is configured via links.
+ The ipv6 keyword is used in many of the EIGRP commands.
+ Needs to be explicitly enabled on each interface when configuring EIGRP.
Note:
The following are a few (not all) examples of similarities shared by IPv4 EIGRP and IPv6 EIGRP:
+ DUAL is used for route calculation and selection with the same metrics.
+ It is scalable to large network implementations.
+ Neighbor, routing, and topology tables are maintained.
+ Both equal-cost load balancing and unequal-cost load balancing are offered.
Reference: http://www.ciscopress.com/articles/article.asp?p=2137516&seqNum=4
Question 39
VRF HUB (VRF Id = 3): default RD 100:10; VRF SPOKE (VRF Id = 4): default RD 200:20;
default VPNID <not set> default VPNID <not set>
New CLI format, supports multiple address- New CLI format, supports multiple
families address-families
Flags: 0x180C Flags: 0x180C
Interfaces: Interfaces:
G1/1 G1/2
Address family ipv4 unicast (Table ID = 0x3) Address family ipv4 unicast (Table ID = 0x4)
Flags: 0x0 Flags: 0x0
Export VPN route-target communities Export VPN route-target communities
RT 100:10 RT 200:20
Import VPN route-target communities Import VPN route-target communities
RT 100:10 RT 200:20 RT 200:20
No import route-map No import route-map
No global export route-map No global export route-map
No export route-map No export route-map
VRF label distribution protocol: not configured VRF label distribution protocol: not configured
VRF label allocation mode: per-prefix VRF label allocation mode: per-prefix
Address family ipv6 unicast (Table ID = Address family ipv6 unicast (Table ID =
0x1E000001) 0x1E000001)
A network engineer is modifying configurations for a customer that currently uses VPN connectivity
between their sites The customer has added a new spoke site but it does not have reachability to
servers located at the hub. Based on the output which statement describes the cause?
Answer: D
Question 40
Answer: D
Question 41
A. It ensures that there are appropriate levels of service for network applications
B. It classifies various traffic types by examining information within Layers 3 trough 7.
C. It measures how the network treats traffic for specific applications by generating traffic that
bears similar characteristics to application traffic
D. It keeps track of the number of packets and bytes that are observed in each flow by storing
information in a cache flow
Answer: C
Question 42
Answer: B
Question 43
A. option 57
B. option 82
C. option 66
D. option 68
Answer: C
Explanation
For Cisco phones IP addresses can be assigned manually or by using DHCP. Devices also require
access to a TFTP server that contains device configuration name files (.cnf file format), which
enables the device to communicate with Cisco Call Manager.
Cisco IP Phones download their configuration from a TFTP server. When a Cisco IP Phone starts, if
it does not have both the IP address and TFTP server IP address pre-configured, it sends a request
with option 150 to the DHCP server to obtain this information.
DHCP Option 150 is Cisco proprietary. The IEEE standard that matches with this requirement is
Option 66. Like option 150, option 66 is used to specify the Name of the TFTP server.
Question 44
What type of address OSPFv3 uses to form adjacency and send updates?
A. FF02::5
B. link-local
C. IPv4 address
D. IPv6 address multicast
Answer: A
A. authpriv
B. noauthnopriv
C. authnopriv
D. noauthpriv
Answer: B
A network engineer executes the show crypto ipsec sa command. Which three pieces of
information are displayed in the output? (Choose three)
Answer: A B C
Explanation
This command shows IPsec Security Associations (SAs) built between peers. An example of the
output of above command is shown below:
The first part shows the interface and cypto map name that are associated with the interface. Then
the inbound and outbound SAs are shown. These are either AH or ESP SAs. In this case, because
you used only ESP, there are no AH inbound or outbound SAs.
Note: Maybe “inbound crypto map” here mentions about crypto map name.
Question 47
Answer:
Question 48
What are two reasons to use multicast to deliver video traffic, instead of unicast or broadcast?
Answer: D E
Question 48
Which two statements about PAP authentication in a PPP environment are true? (Choose two)
Answer: A B
Explanation
PPP has two built-in security mechanisms which are Password Authentication Protocol (PAP)
and Challenge Handshake Authentication Protocol (CHAP).
Another difference between PAP and CHAP is PAP performs authentication at the initial link
establishment only while CHAP performs authentication at the initial link establishment and
periodically after that. The challenge text is random and unique so the “result” is also unique from
time to time. This prevents playback attack (in which a hacker tries to copy the “result” text sent
from Client to reuse).
Question 49
Which two tasks should you perform to begin troubleshooting a network problem? (Choose two)
Answer: A B
Explanation
Reference: http://www.ciscopress.com/articles/article.asp?p=2273070
Question 50
Which two piece of information can you learn by viewing the routing table? (Choose two)
Answer: B E
Question 51
Which two facts must you take into account when you deploy PPPoE? (Choose two)
Answer: B E
Explanation
The PPPoE Client DDR Idle Timer feature supports the dial-on-demand routing (DDR) interesting
traffic control list functionality of the dialer interface with a PPP over Ethernet (PPPoE) client, but
also keeps original functionality (PPPoE connection up and always on after configuration) for those
PPPoE clients that require it.
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2sb/12_2sba/feature/guide/sbpecls.ht
ml
But it is just an optional feature and we don’t need DDR idle timers to be configured to support
VPDN login -> Answer A is not correct.
DDR is support in PPPoE since IOS v12.2 -> Answer C is not correct.
We can assign IP addresses via DHCP on the PPPoE interface -> Answer D is not correct.
Prior to Cisco IOS Release 12.4(15)T, one ATM PVC supported one PPPoE client. With the
introduction of the Multiple PPPoE Client feature in Cisco IOS Release 12.4(15)T, one ATM PVC
supports multiple PPPoE clients, allowing second line connection and redundancy. Multiple PPPoE
clients can run concurrently on different PVCs, but each PPPoE client must use a separate dialer
interface and a separate dialer pool. Therefore answer E is still correct.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/15-mt/bba-15-
mt-book/bba-ppoe-client.pdf