300-410 Exam Questions

Total 563 Questions

Last Updated Exam :

Topic 2, Exam Pool B

Refer to the exhibit. A network administrator redistributed the default static route into OSPF toward all internal routers to reach to Internet. Which set of commands restores reachability to the Internet by internal routers?


A.

router ospf 1
default-information originate


B.

router ospf 1
network 0.0.0.0 0.0.0.0 area 0


C.

router ospf 1

redistribute connected 0.0.0.0


D.

router ospf 1
redistribute static subnets





A.
  

router ospf 1
default-information originate



Refer to the exhibit.

SanFrancisco and Boston routers are choosing slower links to reach each other despite the direct links being up Which configuration fixes the issue?

 


A.

Option A


B.

Option B


C.

Option C


D.

Option D





D.
  

Option D



An engineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAME. WRONGDIGEST". Which action resolves the issue?


A.

Configure the correct authentication password using SNMPv3 authPriv .


B.

Configure the correct authentication password using SNMPv3 authNoPriv.


C.

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.


D.

Configure correct authentication and privacy passwords using SNMPv3 authPriv.





D.
  

Configure correct authentication and privacy passwords using SNMPv3 authPriv.



In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)


A.

by IPv6 routing protocols to securely build neighborships without the need of authentication


B.

by the recovery mechanism to recover the binding table in the event of a device reboot


C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways


D.

by various IPv6 guard features to validate the data link layer address


E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features





B.
  

by the recovery mechanism to recover the binding table in the event of a device reboot



D.
  

by various IPv6 guard features to validate the data link layer address



Explanation:
Overview of the IPv6 First-Hop Security Binding Table A database table of IPv6 neighbors connected to the device is created from information
sources such as NDP snooping. This database, or binding table, is used by variousIPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.
IPv6 First-Hop Security Binding Table Recovery MechanismThe IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?


A.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction


B.

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction


C.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction


D.

Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction





B.
  

Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction



Refer to the exhibit.

BGP and EIGRP are mutually redistributed on R3, and EIGRP and OSPF are mutually redistributed on R1. Users report packet loss and interruption of service to applications hosted on the 10.1.1.0724 prefix. An engineer tested the link from R3 to R4 with no packet loss present but has noticed frequent routing changes on R3 when running the debug ip
route command. Which action stabilizes the service?


A.

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.


B.

Repeat the test from R4 using ICMP ping on the local 10.1.1.0/24 prefix, and fix any Layer 2 errors on the host or switch side of the subnet. ^ C. Place an OSPF distribute-list outbound on R3 to block the 10.1.10/24 prefix from being advertised back to R3.


C.

Reduce frequent OSPF SPF calculations on R3 that cause a high CPU and packet loss on traffic traversing R3.





A.
  

Tag the 10.1.1.0/24 prefix and deny the prefix from being redistributed into OSPF on R1.



An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?


A.

Option A


B.

Option B


C.

Option C


D.

Option D





D.
  

Option D



Refer to the exhibit.

Which action resolves the adjacency issue?


A.

Match the hello interval timers.


B.

Configure the same EIGRP process IDs.


C.

Match the authentication keys.


D.

Configure the same autonomous system numbers.





D.
  

Configure the same autonomous system numbers.



Explanation:
EIGRP does not have process ID as it uses Autonomous System (AS) numbers only. This is not an authentication problem or we would see this error from the debug:
EIGRP: Ethernet0/0: ignored packet from 10.1.1.3, opcode = 1 (missing authentication or key-chain missing)
If the AS numbers between two routers are different then the neighbor relationship cannot be formed.

Refer to the exhibits.

When DMVPN is configured, which configuration allows spoke-to-spoke communication using loopback as a tunnel source?


A.

Configure crypto isakmp key cisco address 0.0.0.0 on the hub.


B.

Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.


C.

Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.


D.

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.





D.
  

Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.



A DMVPN single hub topology is using IPsec + mGRE with OSPF. What should be configured on the hub to ensure it will be the designated router?


A.

tunnel interface of the hub with ip nhrp ospf dr


B.

OSPF priority to 0


C.

route map to set the metrics of learned routes to 110


D.

OSPF priority greater than 1





D.
  

OSPF priority greater than 1




Page 20 out of 57 Pages
Previous