P.S. Downloadable 300-101 pdf are available on Google Drive, GET MORE: https://drive.google.com/open?id=1rlPNNoD0ZdgZsqoRN-j_tpudN825BWM5
New Questions 13
Which command do you enter to display log messages with a timestamp that includes the length of time since the device was last rebooted?
A. service timestamps log uptime
B. logging facility 20
C. service timestamps debugging localtime msec
D. logging console errors
E. logging monitor 7
F. service timestamps log datetime msec
Answer: A
New Questions 14
What is the result of the command ip flow-export destination 10.10.10.1 5858?
A. It configures the router to export cache flow information to IP 10.10.10.1 on port UDP/5858.
B. It configures the router to export cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858.
C. It configures the router to receive cache flow information from IP 10.10.10.1 on port UDP/5858.
D. It configures the router to receive cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858.
Answer: A
New Questions 15
Which option is the first task that a device that is configured with NAT64 performs when it receives an incoming IPv6 packet that matches the stateful NAT64 prefix?
A. It translates the IPv6 header into an IPv4 header.
B. It checks the IPv6 packet against the NAT64 stateful prefix.
C. It translates the IPv6 source address to an IPv4 header.
D. It translates the^ IPv4 destination address into a new NAT64 state.
E. It performs an IPv6 route lookup.
Answer: A
New Questions 16
Which option is invalid when configuring Unicast Reverse Path Forwarding?
A. allow self ping to router
B. allow default route
C. allow based on ACL match
D. source reachable via both
Answer: D
New Questions 17
Which statement about the NPTv6 protocol is true?
A. It is used to translate IPv4 prefixes to IPv6 prefixes.
B. It is used to translate an IPv6 address prefix to another IPv6 prefix.
C. It is used to translate IPv6 prefixes to IPv4 subnets with appropriate masks.
D. It is used to translate IPv4 addresses to IPv6 link-local addresses.
Answer: B
New Questions 18
To enable BGP tunneling over an IPv4 backbone, the IPv4 address 192.168.30.1 is converted into a valid IPv6 address. Which three IPv6 addresses are acceptable formats for the IPv4 address? (Choose three.)
A. 192.168.30.1:0:0:0:0:0:0
B. 0:0:0:0:0:0:192.168.30.1
C. ::192.168.30.1 D. C0A8:1E01::
E. 192.168.30.1:: F. ::C0A8:1E01
Answer: B,C,F
New Questions 19
Which two statements about NHRP in a DMVPN environment are true? (Choose two )
A. It can authenticate VPN endpoints.
B. It can identity PIM-SM RPs over a tunnel.
C. It routes traffic through the tunnel.
D. It provides address resolution to route traffic
E. It requires each endpoint to have a unique network ID.
Answer: A,D
New Questions 20
At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?
A. Layer4
B. Layer 2
C. Layer 1
D. Layer 3
Answer: B
New Questions 21
Which mode of uRPF causes a router interface to accept a packet, if the network to which the packetu2021s source IP address belongs is found in the routeru2021s FIB?
A. Strict mode
B. Loose mode
C. Auto mode
D. Desirable mode
Answer: B
Explanation:
EXPLANATION/REFRENCE
A number of common types of DoS attacks take advantage of forged or rapidly changing source IP addresses, allowing attackers to thwart efforts by ISPs to locate or filter these attacks. Unicast RPF was originally created to help mitigate such attacks by providing an automated, scalable mechanism to implement the Internet Engineering Task Force (IETF) Best Common Practices 38/Request for Comments 2827 (BCP 38/RFC 2827) anti-spoofing filtering on the customer-to-ISP network edge. By taking advantage of the information stored in the Forwarding Information Base (FIB) that is created by the CEF switching process, Unicast RPF can determine whether IP packets are spoofed or malformed by matching the IP source address
and ingress interface against the FIB entry that reaches back to this source (a so-called reverse lookup). Packets that are received from one of the best reverse path routes back out of the same interface are forwarded as normal. If there is no reverse path route on the sam e interface from which the packet was received, it might mean that the source address was modified, and the packet is dropped (by default).
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_urpf/configuration/xe-3s/sec-data-urpf-xe-3s-book/sec-unicast-rpf-loose-mode.html?referring_site=RE&pos=1&page=http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/srpf_gsr.html#GUID-FFFA94D5- EEFB-4215-9EE1-DB37CD01C2CA
New Questions 22
Refer to the Exhibit.
All interfaces on each router are participating in the EIGRP 100 process. Interface Loopback 2 on HQ-R2 is currently in shutdown mode. An engineer issues the eigrp stub command on router BR1. Which statements about the query messages sent from router HQ-R2 for a route to reach the 12.12.12.12/32 network is true?
A. Router HQ-R2 sends a query message to the feasible successor for a route to 12.12.12.12/32 network.
B. BR1 receives query messages from HQ-R2 for a route to 12.12.12.12/32 network.
C. Router HQ-R1 receives query messages from HQ-R2 for a route to 12.12.12.12/32 network.
D. Router HQ-R1 and BR1 receives query messages from HQ-R2 for a route to 12.12.12/32 network.
Answer: D
Recommend!! Get the Downloadable 300-101 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-300-101/ (New 487 Q&As Version)