Q1. Which statement about how a CE router is used in an MPLS VPN is true?
A. It is located on the customer premises, where it peers and exchanges routes with the provider edge router.
B. It is located on the provider premises, where it peers and exchanges routes with the customer edge router.
C. It is located on the customer premises, but it is fully controlled by the provider, which provides a full routing table to the customer.
D. It is located on the provider premises, and it routes only MPLS label traffic.
Answer: A
Q2. Which three protocols can use enhanced object tracking? (Choose three.)
A. HSRP
B. Proxy-ARP
C. VRRP
D. GLBP
E. NTP
F. DHCP
Answer: A,C,D
Explanation:
The Enhanced Object Tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by other processes and HSRP. This feature allows tracking of other objects in addition to the interface line-protocol state. A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing Protocol (GLBP), can register its interest in tracking objects and then be notified when the tracked object changes state.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/configuration/15-mt/iap-15-mt-book/iap-eot.html
Q3. Refer to the exhibit.
If a console port is configured as shown, which response is displayed when you connect to the console port?
A. a blinking cursor
B. the message "Authorized users only"
C. the username prompt
D. three username name prompts followed by a timeout message
E. the message "Connection refused"
Answer: A
Q4. Refer to the exhibit.
Which two statements about how the configuration processes Telnet traffic are true? (Choose two.)
A. Telnet traffic from 10.1.1.9 to 10.10.10.1 is dropped.
B. All Telnet traffic is dropped.
C. Telnet traffic from 10.10.10.1 to 10.1.1.9 is permitted.
D. Telnet traffic from 10.1.1.9 to 10.10.10.1 is permitted.
E. Telnet traffic is permitted to all IP addresses.
Answer: A,C
Explanation:
The ACL applied to the COPP policy matches only telnet traffic from 10.1.1.9 to 10.10.10.1, all other telnet traffic is not matched and therefore not used in the COPP policy, which means this traffic will be handled normally (accepted). For telnet traffic from 10.1.1.9 to 10.10.10.1, the COPP policy has defined this traffic as an exceed, and dropped.
Q5. Refer to the exhibit.
If the remaining configuration uses default values, what is the expected output of the show mls qos queue-set command?
A)
B)
C)
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Answer: A
Explanation:
mls qos queue-set output qset-idthreshold queue-id drop-threshold1 drop-threshold2 reserved-threshold maximum-threshold
Configure the WTD thresholds, guarantee the availability of buffers, and configure the maximum memory allocation for the queue-set (four egress queues per port).
By default, the WTD thresholds for queues 1, 3, and 4 are set to 100 percent. The thresholds for queue 2 are set to 200 percent. The reserved thresholds for queues 1, 2, 3,
and 4 are set to 50 percent. The maximum thresholds for all queues are set to 400 percent.
. For qset-id , enter the ID of the queue-set specified in Step 2. The range is 1 to 2.
. For queue-id , enter the specific queue in the queue-set on which the command is performed. The range is 1 to 4.
. For drop-threshold1 drop-threshold2 , specify the two WTD thresholds expressed as a percentage of the queue’s allocated memory. Th e range is 1 to 3200 percent.
. For reserved-threshold , enter the amount of memory to be guaranteed (reserved) for the queue expressed as a percentage of the allocated memory. The range is 1 to 100 percent.
. For maximum-threshold , enable a queue in the full condition to obtain more buffers than are reserved for it. This is the maximum memory the queue can have before the packets are dropped if the common pool is not empty. The range is 1 to 3200 percent
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_55_se/configuration/guide/3750xscg/swqos.html
Q6. Refer to the exhibit.
R3 prefers the path through R1 to reach host 10.1.1.1.
Which option describes the reason for this behavior?
A. The OSPF reference bandwidth is too small to account for the higher speed links through R2.
B. The default OSPF cost through R1 is less than the cost through R2.
C. The default OSPF cost through R1 is more than the cost through R2.
D. The link between R2 and R1 is congested.
Answer: A
Explanation:
The default formula to calculate OSPF bandwidth is BW = Bandwidth Reference / interface
bandwidth [bps] = 10^8 / / interface bandwidth [bps]
BW of the R1-R3 link = 10^8 / 100Mbps = 10^8 / 10^8 = 1
BW of the R2-R3 link = 10^8 / 1Gbps = 10^8 / 10^9 = 1 (round up)
Therefore OSPF considers the two above links have the same Bandwidth -> R3 will go to 10.1.1.1 via the R1-R3 link. The solution here is to increase the Bandwidth Reference to a higher value using the “auto-cost reference-bandwidth” command under OSPF router mode. For example: Router(config)#router ospf 1 Router(config-router)#auto-cost reference-bandwidth 10000 This will increase the reference bandwidth to 10000 Mbps which increases the BW of the R2-R3 link to 10^10 / 10^8 = 100.
Q7. Refer to the exhibit.
Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A. The scope of the IPv6 multicast address is link-local.
B. The outgoing interface for the IPv6 multicast group should not be a tunnel interface.
C. The R-bit is set in the IPv6 address, but this is not an embedded RP multicast IPv6 address.
D. The S flag should not be set on a first-hop PIM router.
E. A multicast IPv6 address does not start with FF.
Answer: C
Explanation:
.R bit: RP bit: R = 1 indicates the address embeds the address of the Rendezvous Point (RP). The embedded RP address needs to begin with the prefix FF70::/12, But here we see that the address is FF7E::1234.
Q8. Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. OTP uses LISP encapsulation for dynamic multipoint tunneling.
B. OTP maintains the LISP control plane.
C. OTP uses LISP encapsulation to obtain routes from neighbors.
D. LISP learns the next hop.
Answer: A
Q9. Refer to the exhibit.
Why is the host unable to obtain an IP address?
A. IP source guard is configured on the switch port.
B. The DHCP server pool addresses are configured incorrectly.
C. DHCP requests are being blocked.
D. DHCP option 150 is disabled.
Answer: A
Q10. Which two issues is TCP Sequence Number Randomization designed to prevent? (Choose two.)
A. DDOS attacks
B. OS fingerprinting
C. man-in-the-middle attacks
D. ARP poisoning
E. Smurf attack
Answer: B,C