Month End Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 300-410 Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) is now Stable and Pass

300-410 Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Question and Answers

Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

Last Update 4 days ago
Total Questions : 530

300-410 Exam is stable now with all latest questions are added 4 days ago. Just download our Full package and start your journey with Cisco Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) certification. All these Cisco Exam 300-410 questions are real and verified by our Experts in the related industry fields.

300-410 PDF

300-410 PDF (Printable)
$53.2
$132.99

300-410 Testing Engine

300-410 PDF (Printable)
$58
$144.99

300-410 PDF + Testing Engine

300-410 PDF (Printable)
$72.8
$181.99
Question # 1

O: 90

Refer to the following output:

Router#show ip nhrp detail

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47

Typ

E.  

dynamic, Flags: authoritative unique nat registered used

NBMA address: 10.12.1.2

What does theauthoritative flag mean in regards to the NHRP information?

Options:

A.  

It was obtained directly from the next-hop server.

B.  

Data packets are process switches for this mapping entry.

C.  

NHRP mapping is for networks that are local to this router.

D.  

The mapping entry was created in response to an NHRP registration request.

E.  

The NHRP mapping entry cannot be overwritten.

Discussion 0
Question # 2

Refer to the exhibit.

Question # 2

An engineer is trying to connect to a device with SSH but cannot connect. The engineer connects by using the console and finds the displayed output when troubleshooting. Which command must be used in configuration mode to enable SSH on the device?

Options:

A.  

no ip ssh disable

B.  

ip ssh enable

C.  

ip ssh version 2

D.  

crypto key generate rsa

Discussion 0
Question # 3

What is a role of route distinguishers in an MPLS network?

Options:

A.  

Route distinguishers definewhich prefixes are imported and exported on the edge router

B.  

Route distinguishers allow multiple instances of a routing table to coexist within the edge router.

C.  

Route distinguishers are used for label bindings.

D.  

Route distinguishers make a unique VPNv4 address across the MPLS network

Discussion 0
Question # 4

After some changes in the routing policy, it is noticed that the router in AS 45123 is being used as a transit AS router for several service provides. Which configuration ensures that the branch router in AS 45123 advertises only the local networks to all SP neighbors?

A)

Question # 4

B)

Question # 4

C)

Question # 4

D)

Question # 4

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 5

Which two protocols can cause TCP starvation? (Choose two)

Options:

A.  

TFTP

B.  

SNMP

C.  

SMTP

D.  

HTTPS

E.  

FTP

Discussion 0
Question # 6

Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a commonfiber?

Options:

A.  

shared risk link group-disjoint

B.  

linecard-disjoint

C.  

lowest-repair-path-metric

D.  

interface-disjoint

Discussion 0
Question # 7

Refer to the exhibit.

Question # 7

Users report that IP addresses cannot be acquired from the DHCP server. The DHCP

server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the issue within the current resources?

Options:

A.  

Modify the subnet mask to the network 192.168.1.0 255.255.254.0 command in the DHCP pool

B.  

Configure the DHCP lease time to a smaller value

C.  

Configure the DHCP lease time to a bigger value

D.  

Add the network 192.168.2.0255.255.255.0 command to the DHCP pool

Discussion 0
Question # 8

Refer to the exhibit.

Question # 8

After redistribution is enabled between the routingprotocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?

Options:

A.  

Set the administrative distance 100 under the RIP process on R2.

B.  

Filter the prefix 10.1.1.0/24 when redistributedfrom OSPF to EIGRP.

C.  

Filter the prefix 10.1.1.0/24 when redistributed from RIP to EIGRP.

D.  

Redistribute the directly connected interfaces on R2.

Discussion 0
Question # 9

What is an advantage of using BFD?

Options:

A.  

It detects local linkfailure at layer 1 and updates routing table.

B.  

It detects local link failure at layer 2 and updates routing protocols.

C.  

It has sub-second failure detection for layer 1 and layer 3 problems.

D.  

It has sub-second failure detection for layer 1 and layer 2problems.

Discussion 0
Question # 10

Refer to the exhibit.

Question # 10

What is the result of applying this configuration?

Options:

A.  

The router can form BGP neighborships with any other device.

B.  

The router cannot form BGP neighborships with any other device.

C.  

The router cannot form BGP neighborships with any device that is matched by the access list named “BGP”.

D.  

The router can form BGP neighborships with any device that is matched by the access list named “BGP”.

Discussion 0
Question # 11

Drag and drop the SNMP attributes in Cisco IOS devices from the left onto the correct SNMPv2c or SNMPV3 categories on the right.

Question # 11

Options:

Discussion 0
Question # 12

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)

Question # 12

Options:

A.  

Configure access-list 1 permit 10.1.1.0.0.0.0.3.

B.  

Configure access-list 1 permit 10.1.1.1.0.0.0.252.

C.  

Configure access-list 1 andmatch under route-map Leak-Route.

D.  

Configure route-map Leak-Route permit 10 and match access-list 1.

E.  

Configure route-map Leak-Route permit 20.

Discussion 0
Question # 13

A network engineer needs to verify IP SLA operations on an interface that shows onindication of

excessive traffic.

Which command should the engineer use to complete this action?

Options:

A.  

show frequency

B.  

show track

C.  

show reachability

D.  

show threshold

Discussion 0
Question # 14

Refer to the exhibit.

Question # 14

An IP SLA is configured to use the backup default route whenthe primary is down, but it is not working as desired. Which command fixes the issue?

Options:

A.  

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2 10 track 1

B.  

R1(config)# ip route 0.0.0.0.0.0.0.0.2.2.2.2

C.  

R1(config)#ip sla track 1

D.  

R1(config)# ip route 0.0.0.0.0.0.0.0.1.1.1.1 track 1

Discussion 0
Question # 15

During the maintenance window an administrator accidentally deleted the Telnet-related

configuration that permits a Telnet connection from the inside network (Eth0/0) tothe outside of the networking between Friday – Sunday night hours only. Which configuration resolves the issue?

A)

Question # 15

B)

Question # 15

C)

Question # 15

D)

Question # 15

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 16

Refer to the exhibit.

Question # 16

After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both

spoke-to-spoke and hub were notestablishing. Which two actions resolve the issue? (Choose two.)

Options:

A.  

Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3

B.  

Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.

C.  

Change the mode from mode tunnel to mode transport on R3

D.  

Change the mode from mode transport to mode tunnel on R2.

E.  

Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3

Discussion 0
Question # 17

Which list defines the contents of an MPLS label?

Options:

A.  

20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTL

B.  

32-bit label; 3-bit trafficclass; 1-bit bottom stack; 8-bit TTL

C.  

20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

D.  

32-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limit

Discussion 0
Question # 18

Refer to the exhibit.

Question # 18

The server for the finance department is not reachable consistently on the 200.30.40.0/24 network and after every second month it gets a new IP address. Which two actions must be taken toresolve this Issue? (Choose two.)

Options:

A.  

Configure the server to use DHCP on the network with default gateway 200 30.40.100.

B.  

Configure the server with a static IP address and default gateway.

C.  

Configure the router to exclude a server IP address.

D.  

Configure the server to use DHCP on the network with default gateway 200 30.30.100.

E.  

Configure the router to exclude a server IP address and default gateway.

Discussion 0
Question # 19

A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on theswitch to show the time of the flap according to the clock on the device?

Options:

A.  

service timestamps log uptime

B.  

clock summer-time mst recurring 2 Sunday mar 2:00 1 Sunday nov 2:00

C.  

service timestamps log datetime localtime show-timezone

D.  

clock calendar-valid

Discussion 0
Question # 20

Refer to the exhibit.

Question # 20

A network engineer for AS64512 must remove the inbound and outbound traffic from link A during maintenance without closing the BGP session so that there ............ a backuplink over link A toward the ASN. Which BGP configuration on R1 accomplishes this goal?

A)

Question # 20

B)

Question # 20

C)

Question # 20

D)

Question # 20

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 21

Refer to theexhibit.

Question # 21

An administrator configured a Cisco router for TACACS authentication, but the router is using the local enable password instead Which action resolves the issue?

Question # 21

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 22

A newly installed spoke router is configured forDMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?

Options:

A.  

ip tcp adjust-mss 1360

crypto ipsec fragmentation after-encryption

B.  

ip tcp adjust-mtu 1360

crypto ipsec fragmentation after-encryption

C.  

ip tcp adjust-mss 1360

crypto ipsec fragmentation mtu-discovery

D.  

ip tcp adjust-mtu 1360

crypto ipsec fragmentation mtu-discovery

Discussion 0
Question # 23

Refer to the exhibit.

Question # 23

Reachability between servers in a network deployed with DHCPv6 is unstable. Which command must be removed from the configuration to make DHCPv6 function?

Options:

A.  

ipv6 dhcp server DHCPPOOL

B.  

ipv6 address 2001:0:1:4::/64

C.  

ipv6 nd ra suppress

D.  

address prefix 2001:0:1:4::/64 lifetime infinite infinite

Discussion 0
Question # 24

Refer to the exhibit.

Question # 24

A loopoccurs between R1, R2, and R3 while EIGRP is run with poison reverse enabled. Which action prevents the loop between R1, R2, and R3?

Options:

A.  

Configure route tagging

B.  

Enable split horizon

C.  

Configure R2 as stub receive-only

D.  

Configure route filtering

Discussion 0
Question # 25

Question # 25

Refer to the exhibit. An engineer configured SNMP traps to record spoofed packets drop of more than 48000 a minute on the ethernet0/0 interlace. During an IP spoofingattack, the engineer noticed that no notifications have been received by the SNMP server. Which configuration resolves the issue on R1?

Options:

A.  

ip verity unicast notification threshold 48000

B.  

ip verify unicast notification threshold 8000

C.  

ip verifyunicast notification threshold 800

D.  

ip verify unicast notification threshold 80

Discussion 0
Question # 26

What are the two goals of micro BFD sessions? (Choose two.)

Options:

A.  

The high bandwidth member link of a link aggregation group must run BFD

B.  

Run the BFD session with 3x3 ms hello timer

C.  

Continuity for each member link of a link aggregation group must be verified

D.  

Eny member link on a link aggregation group must run BFD

E.  

Each member link of a link aggregation group must run BF

D.  

Discussion 0
Question # 27

Refer to the exhibit.

Question # 27

An engineer cannot copy theIOS.binfile from the FTP server to the switch.

Which action resolves the issue?

Options:

A.  

Allow file permissions to download the file from the FTP server.

B.  

Add the IOS.bin file, which does not exist on FTP server.

C.  

Make memory space on the switch flash or USB drive to download the file.

D.  

Use the copy flash:/ftp://cisco@10.0.0.2/IOS.bincommand.

Discussion 0
Question # 28

Question # 28

Refer tothe exhibit. The company implemented uRPF to address an antispoofing attack. A network engineer received a call from the ITsecurity department that the regional data center is under an IP attack Which configuration must be implemented on R1 to resolve this issue?

Question # 28

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 29

Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies?

Options:

A.  

RIB

B.  

FEC

C.  

LDP

D.  

CEF

Discussion 0
Question # 30

Which 0S1 model is used to insert an MPLS label?

Options:

A.  

between Layer 5 and Layer6

B.  

between Layer 1 and Layer 2

C.  

between Layer 3 and Layer 4

D.  

between Layer 2 and Layer 3

Discussion 0
Question # 31

Refer to the exhibit.

Question # 31

R1 is configured with IP SLA to check the availability of the server behind R6 but it kept failing. Which configuration resolves the issue?

Options:

A.  

R1(config)# ip sla 700

R1(config-track)# delay down 30 up 20

B.  

R1(config)# ip sla 700

R1(config-track)# delay down 20 up 30

C.  

R1(config)# track 700 ip sla 700

R1(config-track)# delay down 30 up 20

D.  

R1(config)# track 700 ip sla 700

R1(config-track)# delay down 20 up 30

Discussion 0
Question # 32

A network administrator is troubleshooting a high utilization issue on the route processor of a router that was reported by NMS The administrator logged into the router to check the control plane policing andobserved that the BGP process is dropping a high number of routing packets and causing thousands of routes to recalculate frequently. Which solution resolves this issue?

Options:

A.  

Police the cir for BGP, conform-action transmit, and exceed action transmit.

B.  

Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frde-transmit.

C.  

Shape the cir for BGP. conform-action transmit, and exceed action transmit.

D.  

Police the pir for BGP, conform-action set-prec-transmit, and exceed actionset-clp-transmit.

Discussion 0
Question # 33

Refer to the exhibit.

Question # 33

R1 and R2 are configured for EIGRP peering using authentication and the neighbors failed to comeup. Which action resolves the issue?

Options:

A.  

Configure a matching key-id number on both routers

B.  

Configure a matching lowest key-id on both routers

C.  

Configure a matching key-chain name on both routers

D.  

Configure a matching authentication type on bothrouter

Discussion 0
Question # 34

What is a function of an end device configured with DHCPv6 guard?

Options:

A.  

If it is configured as aserver, only prefix assignments are permitted.

B.  

If it is configured as a relay agent, only prefix assignments are permitted.

C.  

If it is configured as a client, messages are switched regardless of the assigned role.

D.  

If it is configured as a client, only DHCP requests are permitted.

Discussion 0
Question # 35

Refer to the exhibit.

Question # 35

An engineer configured NetFlow on R1, butthe NMS server cannot see the flow from ethernet 0/0 of R1. Which configuration resolves the issue?

Options:

A.  

flow monitor Flowmonitor1

source Ethernet0/0

B.  

interface Ethernet0/1

ip flow monitor Flowmonitor1 input

ip flow monitor Flowmonitor1 output

C.  

interface Ethernet0/0

ip flow monitor Flowmonitor1 input

ip flow monitor Flowmonitor1 output

D.  

flow exporter FlowAnalyzer1

source Ethernet0/0

Discussion 0
Question # 36

Question # 36

Question # 36

Refer to the exhibit. The administrator is troubleshooting a BGP peering between PE1 and PE3 that is unable to establish Which action resolves the issue?

Options:

A.  

P2 must have a route to PE3 to establish a BGP session to PE1

B.  

Disable sending ICMPunreachables on P2 to allow PE1 to establish a session with PE3

C.  

Ensure that the PE3 loopback address is used as a source for BGP peering to PE1

D.  

Remove the traffic filtering rules on P2 blocking the BGP communication between PE1 and PE3

Discussion 0
Question # 37

Refer to the exhibit.

Question # 37

After a new regional office is set up,not all guests can access the internet via guest Wi

Fi. Clients are getting the correct IP address from guest Wi-Fi VLAN 364. which action resolves the issue ?

Options:

A.  

Allow 10.66.46.0/23 in the outbound ACL

B.  

Allow DNS traffic through the outbound ACL

C.  

Allow DNS traffic through the inbound ACL

D.  

Allow 10.66.46.0/23 in the inbound ACL

Discussion 0
Question # 38

Refer to the exhibit.

Question # 38

An engineer must establish a point-to-point GRE VPN between R1 and the remote site. Which configuration accomplishes the task for the remote site?

Options:

A.  

Interface Tunnel1

tunnel source 199.1.1.1

tunnel destination 200.1.1.3

ip address 192.168.1.3 255.255.255.0

B.  

Interface Tunnel1

tunnel source 200.1.1.3

tunnel destination 199.1.1.1

ip address 192.168.1.1.255.255.255.0

C.  

Interface Tunnel1

tunnel source 200.1.1.3

tunnel destination 199.1.1.1

ip address 192.168.1.3.255.255.255.0

D.  

Interface Tunnel

lunnelsource 199.1.1.1

tunnel destination 200.1.1.3

ip address 192.168.1.1.255.255.255.0

Discussion 0
Question # 39

Users report issues with reachability between areas as soon as an engineer configured summary routes between areas in amultiple area OSPF autonomous system. Which action resolves the issue?

Options:

A.  

Configure the summary-address command on the ASBR.

B.  

Configure the summary-address command on the ABR.

C.  

Configure the area range command on the ABR.

D.  

Configure the area range command on the ASBR.

Discussion 0
Question # 40

Question # 40

Refer to the exhibit. An engineer configured NetFlow onR1, but the flows do not reachthe NMS server from R1. Which configuration resolves this Issue?

Question # 40

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 41

Refer to the exhibit.

Question # 41

PC-2 failed to establish a Telnet connection to the terminal server. Whichconfiguration resolves the issue?

Question # 41

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 42

Question # 42

Refer to the exhibit. R1 and R2 cannot establish an EIGRP adjacency. Which action establishes EIGRP adjacency?

Options:

A.  

Remove the current autonomous system number on one of the routers and change to a different value.

B.  

Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.

C.  

Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.

D.  

Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.

Discussion 0
Question # 43

Refer to the exhibit.

Question # 43

When monitoring an IPv6 access list, an engineer notices that the ACL does not have any hits and is causing unnecessary traffic to pass through the interface Which command must be configured to resolve the issue?

Options:

A.  

access-class INTERNET in

B.  

ipv6 traffic-filter INTERNET in

C.  

ipv6 access-class INTERNET in

D.  

ip access-group INTERNET in

Discussion 0
Question # 44

Anengineer configured SNMP notifications sent to the management server using authentication and encrypting data with DES. An error in the response PDU is received as "UNKNOWNUSERNAM

E.  

WRONGDIGEST". Which action resolves the issue?

Options:

A.  

Configure the correct authentication password using SNMPv3 authPriv .

B.  

Configure the correct authentication password using SNMPv3 authNoPriv.

C.  

Configure correct authentication and privacy passwords using SNMPv3 authNoPriv.

D.  

Configure correct authentication and privacy passwords using SNMPv3 authPriv.

Discussion 0
Question # 45

Refer to Exhibit.

Question # 45

Which two configurations allow clients to get dynamic ip addresses assigned?

Options:

A.  

Configure access-list 100 permit udp any any eq61 as the first line

B.  

Configure access-list 100 permit udp any any eq 86 as the first line

C.  

Configure access-list 100 permit udp any any eq 68 as the first line

D.  

Configure access-list 100 permit udp any any eq 69 as the first line

E.  

Configure access-list 100 permit udp any any eq 67 as the first line

Discussion 0
Question # 46

Question # 46

Refer to the exhibit. The engineer configured and connected Router2 to Router1. The link came up but could not establish a Telnet connection to Router1 IPv6 address of 2001:DB8::1. Which configuration allows Router2 to establish a Telnet connection to Router1?

Options:

A.  

jpv6 unicast-routing

B.  

permit ICMPv6 on access list INGRESS for Router2 to obtain IPv6 address

C.  

permit ip any any on access list EGRESS2 on Router1

D.  

IPv6 address on GigabitEthernet0/0

Discussion 0
Question # 47

When determining if a system is capable of support, what is the minimum time spacing required for a BFD control packet to receive once a control packet is arrived?

Options:

A.  

Desired Min TX Interval

B.  

Detect Mult

C.  

Required Min RX Interval

D.  

Required Min Echo RX Interval

Discussion 0
Question # 48

Question # 48

Refer to the exhibit. The remote server is failing to receive the NetFlow data Which action resolves the issue?

Options:

A.  

Modify the flow transport command transport udp 2055 tomove under flow monitor profile.

B.  

Modify the interlace command to Ip flow monitor FLOW-MONITOR-1 Input.

C.  

Modify the udp port under flow exporter profile to Ip transport udp 4739.

D.  

Modify the flow record command record v4_r1 to move under flow exporter profile.

Discussion 0
Question # 49

Exhibit:

Question # 49

Which action resolves the authentication problem?

Options:

A.  

Configure the user name on the TACACS+ server

B.  

Configure the UDP port 1812 to be allowed on the TACACS+server

C.  

Configure the TCP port 49 to be reachable by the router

D.  

Configure the same password between the TACACS+ server and router.

Discussion 0
Question # 50

Refer to the exhibit.

Question # 50

AS65510 iBGP is configured for directly connected neighbors. R4 cannot ping or traceroute network 192 168.100.0/24 Which action resolves this issue?

Options:

A.  

Configure R4 as a route reflector server and configure R1 as a route reflector client

B.  

Configure R1 as a route reflector server and configure R2 and R3 as route reflector clients

C.  

Configure R4 as a route reflector server and configure R2 and R3 as route reflector clients.

D.  

Configure R1 as a route reflector server and configure R4 as a route reflector client

Discussion 0
Question # 51

Refer to the exhibit.

Question # 51

The R1 and R2 configurations are:

Question # 51

The neighbor isnot coming up. Which two sets of configurations bring the neighbors up? (Choose two.)

Options:

A.  

R2

ip route 10.1.1.1 255.255.255.255 192.168.1.1

router bgp 200

neighbor 10.1.1.1 tti-security hops 1

neighbor 10.1.1.1 update-source loopback 0

B.  

R2

ip route10.1.1.1 255.255.255.255 192.168.1.1

router bgp 200

neighbor 10.1.1.1 disable-connected-check

neighbor 10.1.1.1 update-source loopback 0

C.  

R2

ip route 10.1.1.2 255.255.255.255 192.168.1.2

router bgp 100neighbor 10.1.1.2 ttl-security hops 1

neighbor 10.1.1.2 update-source loopback 0

D.  

R1

ip route 10.1.1.2 255.255.255.255 192.168.1.2

router bgp 100

neighbor 10.1.1.1 ttl-security hops 1

neighbor 10.1.1.2 update-source loopback 0

E.  

R1

ip route 10.1.1.2 255.255.255.255 192.168.1.2

router bgp 100

neighbor 10.1.1.2 disable-connected-check

neighbor 10.1.1.2 update-source Loopback0

Discussion 0
Question # 52

Refer to the exhibit.

Question # 52

A network is under a cyberattack. A network engineer connected to R1 by SSH and enabled the terminal monitor via SSH session to find the source and destination of the attack. The session was flooded with messages, which made it impossible for the engineer to troubleshoot the issue. Which command resolves this issue on R1?

Options:

A.  

no terminal monitor

B.  

(config)#terminal no monitor

C.  

#terminal no monitor

D.  

(config)#no terminal monitor

Discussion 0
Question # 53

Refer to the exhibit.

Question # 53

A network administrator reviews the branch router console log to troubleshoot the OSPF adjacency issue with the DR router. Which action resolves this issue?

Options:

A.  

Advertise the branch WAN interface matching subnet for the DR site.

B.  

Configure matching hello and dead intervals between sites.

C.  

Configure the WAN interface for DR site in the related OSPF area.

D.  

Stabilize the DR site flapping link to establish OSPF adjacency.

Discussion 0
Question # 54

Question # 54

Refer to the exhibit. The OSPF neighbor relationship is not coming up What must be configured to restore OSPF neighbor adjacency?

Options:

A.  

OSPF on theremote router

B.  

matching hello timers

C.  

use router ID

D.  

matching MTU values

Discussion 0
Question # 55

Refer to the exhibit.

Question # 55

A company with autonomous system number AS65401 has obtained IP address block 209.165.200.224/27 fro, ARIN. Thecompany needed more IP addresses and was assigned block 209.165.202.128/27 from ISP2. An engineer is ISP1 reports they are receiving ISP2 routes from AS65401. Which configuration onR1 resolves the issue?

A)

Question # 55

B)

Question # 55

C)

Question # 55

D)

Question # 55

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 56

Which IGPs are supported by the MPLS LDP autoconfiguration feature?

Options:

A.  

RIPv2 and OSPF

B.  

OSPF and EIGRP

C.  

OSPF and ISIS

D.  

ISIS andRIPv2

Discussion 0
Question # 57

Refer to Exhibit.

Question # 57

Traffic from the branch network should route through HQ R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCHrouter toward HQ_R1 router but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?

Options:

A.  

HQ_R1(config)#ip sla responder

HQ_R1(config)#ip sla responder icmp-echo 172.16.35.2

B.  

BRANCH(config)#ip sla 1

BRANCH(config-ip-sla)#icmp-echo 172.16.35.1

C.  

HQ_R2(config)#ip sla responder

HQ_R2(config)#ip sla responder icmp-echo 172.16.35.5

D.  

BRANCH(config)#ip sla 1

BRANCH(config-ip-sla)#icmp-echo 172.16.35.2

Discussion 0
Question # 58

Refer to the exhibit.

Question # 58

R1 is beingmonitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?

Options:

A.  

Modify the CoPP policy to increase the configured exceeded limit for SNMP.

B.  

Modify the access list to include snmptrap.

C.  

Modify the CoPP policy to increase the configured CIR limit for SNMP.

D.  

Modify the access list to add a second line to allow udp any any eq snmp

Discussion 0