Q1. Refer to the exhibit.
What does the return code 3 represent in this output?
A. The mapping of the replying router for the FEC is different.
B. The packet is label-switched at stack depth.
C. The return code is reserved.
D. The upstream index is unknown.
E. The replying router was the proper egress for the FEC.
Answer: E
Explanation:
Return Codes The Return Code is set to zero by the sender. The receiver can set it to one of the values listed below. The notation <RSC> refers to the Return Subcode. This field is filled in with the stack-depth for those codes that specify that. For all other codes, the Return Subcode MUST be set to zero.
Value Meaning
0 No return code
1 Malformed echo request received
2 One or more of the TLVs was not understood
3 Replying router is an egress for the FEC at stack-depth <RSC>
4 Replying router has no mapping for the FEC at stack-depth <RSC>
Reference: https://www.ietf.org/rfc/rfc4379.txt
Q2. Which two options are contained in the MSG part of a syslog message? (Choose two.)
A. TAG field
B. CONTENT field
C. three-digit priority value
D. IP address of the sending device
E. TLS port number
Answer: A,B
Q3. Which three statements are true about unicast RPF? (Choose three.)
A. Unicast RPF requires CEF to be enabled.
B. Unicast RPF strict mode works better with multihomed networks.
C. Unicast RPF strict mode supports symmetric paths.
D. Unicast RPF strict mode supports asymmetric paths.
E. CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance.
F. Unicast RPF loose mode is typically used with ISP networks.
Answer: A,C,F
Q4. Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Answer: A,B,C
Q5. Refer to the exhibit.
If a port is configured as shown and receives an untagged frame, of which VLAN will the untagged frame be a member?
A. VLAN 1
B. VLAN 2
C. VLAN 3
D. VLAN 4
Answer: B
Explanation:
When typing: Switch(config-if)#switchport mode?
access Set trunking mode to ACCESS unconditionally
dynamic Set trunking mode to dynamically negotiate access or trunk mode
trunk Set trunking mode to TRUNK unconditionally
and
Switch(config-if)#switchport mode dynamic?
auto Set trunking mode dynamic negotiation parameter to AUTO
desirable Set trunking mode dynamic negotiation parameter to DESIRABLE
So if we configure Fa0/1 as dynamic auto mode, it will not initiate any negotitation but waiting for the other end negotiate to be a trunk with DTP. If the other end does not ask it to become a trunk then it will become an access port. Therefore when using the “show interface fastEthernet0/1 switchport” command we will see two output lines “ Administrative Mode. dynamic auto” and “Operational Mode. static access” Note. To set this port to VLAN 2 as the output above just use one additional command. “switchport access vlan 2”.
Now back to our question, from the output we see that Fa0/1 is operating as an access port on VLAN 2 so if it receive untagged frame it will suppose that frame is coming from VLAN 2.
Q6. DRAG DROP
Drag and drop the Cisco IOS XE subpackage on the left to the function it performs on the right.
Answer:
Q7. Which option is the result if two adjacent routers are configured for OSPF with different process IDs?
A. The routers are unable to establish an adjacency.
B. The routers establish an adjacency, but route exchange fails.
C. The routers establish an adjacency and exchange routes, but the routes are unreachable.
D. The routers establish an adjacency and exchange routes, and the routes are reachable.
Answer: D
Q8. Which two statements about MAC ACLs are true? (Choose two.)
A. They support only inbound filtering.
B. They support both inbound and outbound filtering.
C. They are configured with the command mac access-list standard.
D. They can filter non-IP traffic on a VLAN and on a physical interface.
Answer: A,D
Explanation:
MAC ACL, also known as Ethernet ACL, can filter non-IP traffic on a VLAN and on a physical Layer 2 interface by using MAC addresses in a named MAC extended ACL. The steps to configure a MAC ACL are similar to those of extended named ACLs. MAC ACL supports only inbound traffic filtering.
Reference: http://www.ciscopress.com/articles/article.asp?p=1181682&seqNum=4
Q9. DRAG DROP
Drag and drop the IPv6 address on the left to the correct IPv6 address type on the right.
Answer:
Q10. Refer to the exhibit.
Which statement is true about a VPNv4 prefix that is present in the routing table of vrf one and is advertised from this router?
A. The prefix is advertised only with route target 100:1.
B. The prefix is advertised with route targets 100:1 and 100:2.
C. The prefix is advertised only with route target 100:3.
D. The prefix is not advertised.
E. The prefix is advertised with route targets 100:1, 100:2, and 100:3.
Answer: A
Explanation:
The route target used for prefix advertisements to other routers is defined on the route-target export command, which shows 100:1 in this case for VPNv4 routes.