300-410 VOL2 Question - PowerPoint PPT Presentation

About This Presentation
Title:

300-410 VOL2 Question

Description:

300-410 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) VOL2 – PowerPoint PPT presentation

Number of Views:8
Slides: 7
Provided by: jashonjon3
Tags:

less

Transcript and Presenter's Notes

Title: 300-410 VOL2 Question


1
  • 300-410 Implementing Cisco Enterprise Advanced
    Routing and Services (ENARSI) VOL2
  • QUESTION NO 1
  • In a typical MPLS VPN, which routers act as the
    MPLS label imposition and disposition points in
    the network?
  • CE Router
  • P router
  • PE Router
  • Core router
  • Answer C
  • QUESTION NO 2
  • In an MPLS network, which of the following
    describes the role of the Provider (P) router?
  • To connect to customer edge (CE) devices
  • To connect to PE routers and act as transit
    routers
  • To impose MPLS labels
  • To filter VPN routes in the core
  • Answer B
  • QUESTION NO 3
  • The MPLS LDP autoconfiguration feature allows you
    to enable LDP on every interface that is
    associated with an IGP instance. Which of the
    following Interior Gateway Protocols support
    this? (Choose two)
  • OSPF
  • IS-IS
  • BGP
  • RIP
  • EIGRP
  • Answer A, B

QUESTION NO 4 In an MPLS VPN network, how are
customer routes controlled and distributed?
2
  • Through the use of GRE tunnels
  • Customer routes are redistributed into the IGP
    that the service provider is using
  • Customer routes are redistributed into BGP within
    the service provider
  • It is distributed through the use of route
    targets
  • Answer D
  • QUESTION NO 5
  • At which layer of the OSI model is an MPLS label
    imposed?
  • Layer 2
  • Layer 3
  • Between layers 2 and 3
  • Between layers 3 and 4
  • Answer C
  • QUESTION NO 6
  • Which of the following are valid IPv6 Router
    Advertisement (RA) Guard modes? (Select two)
  • Guard mode
  • Host mode
  • Router mode
  • Open mode
  • Closed mode
  • Answer B, C
  • QUESTION NO 7
  • Which of the following statements are true
    regarding the e IPv6 RA Guard feature?
  • This feature is support on LAG bundles interfaces
  • This feature is supported on private VLANs
  • Packets dropped by the IPv6 RA Guard feature
    cannot be spanned.
  • This feature offers protection in networks where
    IPv6 traffic is tunneled.
  • Answer B

3
  • QUESTION NO 8
  • Unicast Reverse Path Forwarding (uRPF) has been
    configured on a service provider network to
    protect itself from spoofed based attacks. Which
    of the following are valid uRPF modes? (Select
    two)
  • Strict mode
  • Open mode
  • Closed mode
  • Block mode
  • Loose mode
  • Answer A, E
  • QUESTION NO 9
  • Which of the following are commonly used ports
    when implementing RADIUS based authentication
    and accounting? Select two)
  • UDP port 1644 for authentication
  • UDP port 1812 for authentication
  • TCP port 1812 for authentication
  • UDP port 1813 for accounting
  • TCP port 1813 for accounting
  • UDP port 1644 for accounting
  • Answer B, D
  • QUESTION NO10
  • Which of the following are valid restrictions
    when configuring Control Plane Policing (CoPP) on
    Cisco devices? (Choose two)
  • You can not use the log keyword with CoPP on
    the access list entries
  • CEF must be disabled
  • The only match types supported with CoPP is ip
    precedence, ip dscp, and access-group
  • Only standard accesslists are supported.
  • Answer A, C

QUESTION NO 11
4
  • Which of the following are used to validate the
    source of IPv6 traffic and are considered IPv6
    layer 2 snooping features?
  • DHCPv6 Guard
  • DHCPv6 Root Guard
  • IPv6 Source Guard
  • IPv6 Prefix Guard
  • Answer C, D
  • QUESTION NO 12
  • You want to implement AAA on router R1 for a more
    robust authentication and authorization system.
    What is typically the first global command used
    to do this?
  • aaa new-model
  • aaa enable
  • aaa server-group
  • aaa authentication login
  • Answer A
  • QUESTION NO 13
  • A time-based access list has been configured on
    R1 to allow SSH access to the device only on
    weekdays. Which of the following are valid
    options when using the time range command?
    (Select two)
  • relative
  • recurring
  • absolute
  • periodic
  • Answer C, D
  • QUESTION NO 14
  • First-Hop Security (FHS) is a set of features to
    optimize IPv6 link operation, and help with scale
    in large L2 domains. Which of the following are
    valid First-Hop Security features supported by
    Cisco? (Select three)
  • IPv6 RA Guard
  • IPv6 Source Guard

5
  • DHCPv6 Guard
  • IPv6 Snooping
  • DHCPv6 Snooping
  • Answer A, C, D
  • QUESTION NO 15
  • What are the four stages of obtaining an IP
    address from a DHCP server that corresponds to
    the acronym DORA?
  • Discover, Offer, Release, Addressing
  • Discover, Obtain, Request, Acknowledge
  • Determine, Offer, Release, Acknowledge
  • Discover, Offer, Request, Acknowledge
  • Answer D
  • QUESTION NO 16
  • SNMPv2 has been used throughout a network to
    manage all of the network devices. You have been
    asked to migrate to an SNMPv3 solution instead.
    What is the biggest advantage to migrating from
    SNMPv2 to SNMPv3?
  • Enhanced security, including encryption of
    passwords
  • Enhanced performance, supporting more messages
    per minute.
  • Enhanced scaling, supporting thousands more
    devices per network segment than SNMPv2.
  • Using a push model instead of pull. SNMPv3 uses
    telemetry to push data to SNMP management
    stations in real time.
  • Answer A
  • QUESTION NO 17
  • You are configuring Netflow on various network
    elements in order to gain visibility into the
    traffic types used. How many export destinations
    can this Network data be sent to?
  • Up to 2
  • Up to 4
  • Up to 8
  • There is no limitation on the number of flow data
    export destinations.

6
Answer A
  • QUESTION NO 18
  • A Cisco router has just been configured for NTP
    and is synchronized with the configured NTP
    server. However, log messages still show an
    incorrect time. What else should be done to match
    the log messages time stamps with the NTP based
    time?
  • Wait a bit longer for the synchronized time to
    get applied to new log messages.
  • Configure the service timestamps log datetime
    localtime command in global mode.
  • Configure the service timestamps log datetime
    synchronize command globally
  • Configure the service timestamps log ntp
    command in global config mode.
  • Answer B
  • QUESTION NO 19
  • There is an issue between two nodes within your
    network, and you are using Cisco DNA Center Path
    Trace to help troubleshoot the problem. Which of
    the following statements are true regarding the
    Path Trace tool?
  • Overlapping IP addresses are supported.
  • Path trace between a fabric client and a
    non-fabric client is supported
  • Path trace between a wired client and a wireless
    client is supported
  • Only TCP traffic is supported.
  • Answer C
  • QUESTION NO 20
  • Which of the following are valid DHCP options
    that DHCP servers can be configured to use with
    DHCP clients when offering a lease? (Choose two)
  • DHCP Option 1 subnet mask
  • DHCP Option 3 Lease Duration
  • DHCP Option 4 Client host name
  • DHCP Option 6 DNS servers
  • Answer A, E
Write a Comment
User Comments (0)
About PowerShow.com