Q1. Which two attributes were introduced with the Cisco IOS BGP 4-byte ASN feature? (Choose two.)
A. AS4_AGGREGATOR
B. AS4_PATH
C. AS4_PLAIN
D. AS4_DOT
E. AS4_TRANS
Answer: A,B
Q2. Refer to the exhibit.
Which additional information must you specify in this configuration to capture NetFlow traffic?
A. ingress or egress traffic
B. the number of cache entries
C. the flow cache active timeout
D. the flow cache inactive timeout
Answer: A
Explanation:
Configuring NetFlow
Perform the following task to enable NetFlow on an interface. SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip flow {ingress | egress}
5. exit
6. Repeat Steps 3 through 5 to enable NetFlow on other interfaces.
7. end
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Router> enable Enables privileged EXEC mode. .
Enter your password if prompted.
Step 2
configure terminal Example:
........
Example:
Router(config)# interface ethernet 0/0
Specifies the interface that you want to enable NetFlow on and enters interface configuration mode.
Step 4
ip flow {ingress | egress}
Example:
Router(config-if)# ip flow ingress
Enables NetFlow on the interface.
. ingress—Captures traffic that is being received by the interface
. egress—Captures traffic that is being transmitted by the interface
Step 5
exit
Example:
Router(config-if)# exit
(Optional) Exits interface configuration mode and enters global configuration mode.
Note
You need to use this command only if you want to enable NetFlow on another interface.
Step 6
Repeat Steps 3 through 5 to enable NetFlow on other interfaces.
This step is optional.
Step 7
end
Example:
Router(config-if)# end Exits the current configuration mode and returns to privileged EXEC mod
Reference: http://www.cisco.com/c/en/us/td/docs/ios/netflow/configuration/guide/12_2sr/nf_12_2sr_boo k/cfg_nflow_data_expt.html
Q3. Refer to the exhibit.
Which option is the most likely explanation of the duplicate address message logged?
A. HSRP misconfiguration
B. a PC with IP of 10.10.1.1
C. spanning-tree-loop
D. a hardware problem
Answer: A
Q4. In GETVPN, which key is used to secure the control plane?
A. Traffic Encryption Key (TEK)
B. content encryption key (CEK)
C. message encryption key (MEK)
D. Key Encryption Key (KEK).
Answer: D
Explanation:
GDOI introduces two different encryption keys. One key secures the GET VPN control plane; the other key secures the data traffic. The key used to secure the control plane is commonly called the Key Encryption Key (KEK), and the key used to encrypt data traffic is known as Traffic Encryption Key (TEK).
Reference: Group Encrypted Transport VPN (Get VPN) Design and Implementation Guide PDF
Q5. Which algorithm heavily influenced the algorithm used by path-vector protocols?
A. Bellman-Ford
B. SPF
C. DUAL
D. Spanning-Tree
E. Adaptive
F. Deflection
Answer: A
Explanation:
A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing algorithms to avoid "Count to Infinity" problems.
Reference: http://en.wikipedia.org/wiki/Path_vector_protocol
Q6. You are tasked with configuring a router on an OSPF domain to import routes from an EIGRP domain and summarize the routes to 192.168.64.0.
Which statement configures the summarized route and provides equal-path route redundancy?
A. area 32 range 192.168.64.0 255.255.192.0 cost 100
B. area 32 range 192.168.64.0 255.255.63.0 cost 100
C. area 32 range 192.168.64.0 255.255.64.0 cost 100
D. area 32 range 192.168.64.0 255.255.192.0 multi-path
Answer: A
Explanation:
area range
To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use the no form of this command.
Syntax Description
area-id
Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address.
ip-address
IP address.
mask
IP address mask.
advertise
(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA).
not-advertise
(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks.
cost cost
(Optional) Metric or cost for this summary route, which is used during OSPF SPF calculation to determine the shortest paths to the destination. The value can be 0 to 16777215.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf. html#wp1017596
Q7. External EIGRP route exchange on routers R1 and R2 was failing because the routers had duplicate router IDs. You changed the eigrp router-id command on R1, but the problem persists. Which additional action must you take to enable the routers to exchange routes?
A. Change the corresponding loopback address.
B. Change the router ID on R2.
C. Reset the EIGRP neighbor relationship.
D. Clear the EIGRP process.
Answer: D
Q8. Refer to the exhibit.
If IS-IS is configured utilizing default metrics, what is the cost for Router 4 to reach the 10.2.2.0/24 network?
A. 1
B. 20
C. 30
D. 63
Answer: C
Explanation:
By default, every link is an IS-IS network has a metric of 10.
Q9. Which option is a core event publisher for EEM?
A. Timer
B. Policy Director
C. Applet
D. Script
Answer: A
Explanation:
EEM is a flexible, policy-driven framework that supports in-box monitoring of different components of the system with the help of software agents known as event detectors. The figure below shows the relationship between the EEM server, core event publishers (event detectors), and the event subscribers (policies). Basically, event publishers screen events and publish them when there is a match on an event specification that is provided by the event subscriber. Event detectors notify the EEM server when an event of interest occurs. The EEM policies that are configured using the Cisco command-line interface (CLI) then implement recovery on the basis of the current state of the system and the actions specified in the policy for the given event. EEM offers the ability to monitor events and take informational or corrective action when the monitored events occur or when a threshold is reached. An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. A script is a form of policy that is written in Tool Command Language (Tcl).
Figure 1. Embedded Event Manager Core Event Detectors
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/15-mt/eem-15-mt-book/eem-overview.html
Q10. Which is the way to enable the control word in an L2 VPN dynamic pseudowire connection on router R1?
A. R1(config)# pseudowire-class cw-enable
R1(config-pw-class)# encapsulation mpls
R1(config-pw-class)# set control-word
B. R1(config)# pseudowire-class cw-enable
R1(config-pw-class)# encapsulation mpls
R1(config-pw-class)# enable control-word
C. R1(config)# pseudowire-class cw-enable
R1(config-pw-class)# encapsulation mpls
R1(config-pw-class)# default control-word
D. R1(config)# pseudowire-class cw-enable
R1(config-pw-class)# encapsulation mpls
R1(config-pw-class)# control-word
Answer: D
Explanation:
The following example shows how to enable the control word in an AToM dynamic pseudowire connection:
Device(config)# pseudowire-class cw-enable
Device(config-pw-class)# encapsulation mpls
Device(config-pw-class)# control-word
Device(config-pw-class)# exit
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mpls/command/mp-cr-book/mp-a1.html