Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

300-101 Practice Questions Free

Table of Contents

Toggle
  • 300-101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full 300-101 Practice Questions Free

300-101 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the 300-101 certification exam? Kickstart your success with our 300-101 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with 300-101 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free 300-101 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

Which two reductions are the correct reductions if the IPv6 address 2001:0d02:0000:0000:0014:0000:0000:0095? (Choose two)

A. 2001:0d02:::0014:::0095

B. 2001:d02::14::95

C. 2001:d02:0:0:14::95

D. 2001:d02::14:0:0:95

 


Suggested Answer: CD

We can’t use triple colons (:::) in IPv6 presentation. Also we can’t use double colons (::) twice. You can use it only once in any address because if two double colons are placed in the same address, there will be no way to identify the size of each block of 0s.
Remember the following techniques to shorten an IPv6 address:
– Omit leading 0s in the address field, so :0000 can be compressed to just and :0d02 can be compressed to :d02 (but :1d00 can not be compressed to :1d)
– Use double colons (::), but just once, to represent a contiguous block of 0s,
So –
2001:0d02:0000:0000:0014:0000:0000:0095 can be compressed to
2001:d02:0:0:14::95
OR –
2001:d02::14:0:0:95

Question 2

An EUl-64 bit address is formed by adding a reserved 16-bit value, in which position of the Mac address?

A. between the vendor OID and the NIC-specific part of the MAC address.

B. after the NIC-specific part of the MAC address.

C. before the vendor OID part of the MAC address.

D. anywhere in the Mac address, because the value that is added is reserved. A

 


Suggested Answer: Explanation

 

Question 3

Considering the IPv6 address independence requirement, which process do you avoid when you use NPTv6 for translation?

A. IPv6 duplication and conservation

B. IPsec AH header modification

C. checksum verification

D. rewriting of higher layer information

 


Suggested Answer: D

The IPv6-to-IPv6 Network Prefix Translation (NPTv6) serves as a useful mechanism for implementing address independence in an IPv6 environment. A major benefit associated with NPTv6 is the fact that it avoids the requirement for an NPTv6 Translator to rewrite the transport layer headers which reduces the load on network devices. NPTv6 also does not interfere with encryption of the full IP payload.
References:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-16/nat-xe-16-book/iadnat-asr1k-nptv6.html

Question 4

Which protocol can you use to remotely install an IOS on a Cisco switch?

A. SFTP

B. NetFlow

C. FTP

D. SNMP

 


Suggested Answer: C

 

Question 5

Which two statements about route redistribution when implementing OSPF are true? (Choose two.)

A. Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.

B. OSPF can import routes learned using EIGRP, RIP, and IS-IS.

C. OSPF routes cannot be exported into EIGRP, RIP, and IS-IS.

D. At the interdomain level, OSPF cannot import routes learned using BGP.

 


Suggested Answer: E. OSPF routes can be exported into BGP.

Reference:
http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_5
5_se/configuration/guide/swiprout.html (See configuring OSPF)

Question 6

Which option is the best for protecting CPU utilization on a device?

A. fragmentation

B. COPP

C. ICMP redirects

D. ICMP unreachable messages

 


Suggested Answer: B

 

Question 7

What is the hop count ...RIP?

A. 15

B. 255

C. 0

D. 16

 


Suggested Answer: A

 

Question 8

498 DRAG DROP
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 9

A network engineer wants an NTP client to be able to update the local system without updating or synchronizing with the remote system. Which option for the ntp command is needed to accomplish this? access-group

A. peer

B. query-only

C. serve-only

D. serve

 


Suggested Answer: D

 

Question 10

When a tunnel interface is configured in the default mode, which statement about routers and the tunnel destination address is true?

A. The router must have WCCP redirects enabled inbound from the tunnel destination.

B. The router must have redirects enabled outbound toward the tunnel destination.

C. The router must have a route installed toward the tunneldestination.

D. The router must have Cisco Discovery Protocol enabled on the tunnel to form a CDP neighborship with the tunnel destination.

 


Suggested Answer: C

 

Question 11

What is the default OSPF hello interval on a Frame Relay point-to-point network?

A. 10

B. 20

C. 30

D. 40

 


Suggested Answer: A

 

Question 12

Which command creates a manual summary on an interface when using EIGRP?

A. summary-address eigrp 100 172.32.0.0 255.255.254.0

B. ip summary-address eigrp 100 172.32.0.0 255.255.254.0

C. area 100 range 172.32.0.0 255.255.254.0

D. ip summary-address 100.172.32.0.0 255.255.254.0

 


Suggested Answer: B

 

Question 13

A network administrator executes the command clear ip route. Which two tables does this
"Pass Any Exam. Any Time." - www.actualtests.com                         4 command clear and rebuild? (Choose two.)

A. IP routing

B. FIB

C. ARP cache

D. MAC address table

E. Cisco Express Forwarding table

F. topology table

 


Suggested Answer: AB

 

Question 14

What does stateful NAT64 do that stateless NAT64 does not do?

A. Stateful NAT64 maintains bindings or session state while performing translation

B. Stateful NAT64 maintains bindings of IPv4 to IPv6 link-local addresses

C. Stateful NAT64 translates IPv4 to IPv6

D. Stateful NAT64 translates IPv6 to IPv4

 


Suggested Answer: A

Reference:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/enterprise-ipv6-solution/white_paper_c11-676278.html

Question 15

PPPoE requires certain signals and information to establish, accept, control and terminate the session.
The basic signalling is shown below.

A. (PPPoE Active Discovery Request), PADI (PPPoE Active Discovery Initiation)

B. (PPPoR Active Discovery Request), PARP (PPPoE Active Discovery Initiation)

C. (PPPoE Active Discovery Reaching), PADI (PPPoE Active Discovery Initiating)

D. (PPP Active Discovery Request), PADI (PPP Active Discovery Initiation)

 


Suggested Answer: A

 

Question 16

Refer to the exhibit.
 Image
On all routers in the network, EIGRP has been configured for load balancing across the three links. However, traffic destined for Network B from R1 is only load balanced over paths R1- R2-R5 and R1-R3-R5. What is the cause of the problem?

A. EIGRP will not select more than two links for unequal cost path load balancing.

B. Because the path has a different link type, EIGRP will not select path R1-R4-R5 for load balancing.

C. Because Router R4 is not a feasible successor, EIGRP will not select path R1-R4-R5 for load balancing.

D. EIGRP will not select path R1-R4-R5 for load balancing unless the value of the variance parameter is increased.

 


Suggested Answer: C

 

Question 17

Which of the following is a GRE Tunnel characteristic?

A. GRE impose more CPU overhead than IPSec on VPN gateways

B. GRE tunnels can run through IPsec tunnels.

C. GRE Tunnel doesn’t have support for IPv6

D. GRE consists of two sub-protocols: Encapsulated Security Payload (ESP) and Authentication Header (AH).

 


Suggested Answer: B

If you run an IPsec tunnel through a GRE tunnel, then we call it as “IPsec over GRE”

Question 18

Refer to the exhibit.
 Image
What happens when the router stops receiving advertisements for the 10.1.2.0/24 network?

A. The summary route will be removed from the table.

B. The summary route will remain in the table.

C. The more specific routes will be advertised from the table.

D. 10.1.2.0/24 will still be advertised but packets destined for it will be dropped when they reach this router.

 


Suggested Answer: B

If you look very closely at the routing table output, we can conclude that R1 has “auto- summary” enabled under the EIGRP routing process.
D 10.0.0.0/8 is a summary, 00:23:20, Null 0
Anytime the “auto-summary” is enabled under the routing process the router will install a summary route to “null 0” as long as the router has one or more subnets within the “classful” network. In the case above, you have two directly connected interfaces (Serial1 & Serial2) that are within the “classful” network. Therefore, regardless of whether you leran a route via EIGRP that is in the “classful” network, R1 will still install this summary route to “null 0”.

Question 19

Your network consists of a large hub-and-spoke Frame Relay network with a CIR of 56 kb/s for each spoke.
Which statement about the selection of a dynamic protocol is true? Choose the best response.

A. EIGRP would be appropriate if LMI type ANSI is NOT used.

B. EIGRP would be appropriate, because the Frame Relay spokes could be segmented into their own areas.

C. EIGRP would be appropriate, because by default, queries are not propagated across the slow speed Frame Relay links.

D. EIGRP would be appropriate, because you can manage how much bandwidth is consumed over the Frame Relay interface.

 


Suggested Answer: D

By default, EIGRP will limit itself to using no more than 50% of the interface bandwidth. The primary benefit of controlling EIGRP’s bandwidth usage is to avoid losing EIGRP packets, which could occur when EIGRP generates data faster than the interface line can absorb it. This is of particular benefit on Frame Relay networks, where the access interface bandwidth and the PVC capacity may be very different.

Question 20

Which PPP authentication method sends authentication information in clear text?

A. MS CHAP

B. CDPCP

C. CHAP

D. PAP

 


Suggested Answer: D

PAP authentication involves a two-way handshake where the username and password are sent across the link in clear text; hence, PAP authentication does not provide any protection against playback and line sniffing.
CHAP authentication, on the other hand, periodically verifies the identity of the remote node using a three-way handshake. After the PPP link is established, the host sends a “challenge” message to the remote node. The remote node responds with a value calc”lated usi”g a one-way hash function. The host checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged; otherwise, the connection is terminated.
Reference:
http://www.cisco.com/c/en/us/support/docs/wan/point-to-point-protocol-ppp/10241-ppp-callin-hostname.html

Question 21

What does the default value of the EIGRP variance command of 1 mean?

A. Load balancing is disabled on this router.

B. The router performs equal-cost load balancing.

C. Only the path that is the feasible successor should be used.

D. The router only performs equal-cost load balancing on all paths that have a metric greater than 1.

 


Suggested Answer: B

 

Question 22

Refer to the exhibit.
 Image
In a redundant hub-and-spoke deployment using EIGRP, what feature can be used to ensure that routers C through F are not used as transit routers for data traveling from router B to network 10.1.1.0? Select the best response

A. Use address summarization at routers C, D, E, and F.

B. Use the EIGRP Stub feature on routers C, D, E, and F.

C. Use passive-interface on the spoke links in routers A and B.

D. Change the administrative distance in routers A and B for routes learned from routers C, D, E, and F.

 


Suggested Answer: B

 

Question 23

Which feature can automatically assign IP addresses in a PPPoE environment?

A. DHCP

B. BOOTP

C. PPP

D. APIPA

 


Suggested Answer: C

 

Question 24

An EUI-64-bit address is formed by adding a reserved 16-bit value in which position of the Mac address?

A. Between the vendor OID and the NIC-specific part of the MAC address.

B. After the NIC-specific part of the MAC address.

C. Before the vendor OID part of the MAC address.

D. Anywhere in the Mac address, because the value that is added is reserved.

 


Suggested Answer: A

 

Question 25

Refer to the exhibit.
 Image
You are the network administrator responsible for the NProuter, the 10.1.1.1 router, and the 10.1.1.2 router. What can you determine about the OSPF operations from the debug output?

A. The NProuter has two OSPF neighbors in the “Full” adjacency state.

B. The NProuter serial0/0 interface has the OSPF dead timer set to 10 seconds.

C. The NProuter serial0/0 interface has been configured with an OSPF network type of “pointto-point”.

D. The 10.1.1.1 and 10.1.1.2 routers are not using the default OSPF dead and hello timers setting.

 


Suggested Answer: E. The “Mismatched” error is caused by the expiration of the OSPF timers.

Explanation –
First we should understand clearly about the line
Dead R 120 C 10, Hello R 30 C 30
The R here means Received and C means Configured. In other words, Dead R is the Dead Timer Received from the neighbor and the Dead C is the Dead Timer of the local router.
Therefore in this case Dead R 120 C 10 means the Death Timer of the neighbor is 120 seconds while the local Dead Timer is 10 seconds, which causes a mismatch. Also we can learn that the local OSPF dead timer is set to 10 seconds.
For your information, by default, OSPF uses a 10-second hello timer and 40-second hold timer on broadcast and point-to-point links, and a 30-second hello timer and 120-second hold timer for all other network types.

Question 26

Image
Refer to exhibit. If the IGP in AS65000 is RIPv2, which networks are displayed when you enter show ip route on router R2?

A. VLSM subnets in 10.0.0.0/16 and the major network 10.2.0.0/16 only

B. VLSM subnets in 10.0.0.0/16 and the major network 10.2.0.0/16 only

C. VLSM subnets in 10.0.0.0/16 only

D. major networks 10.1.0.0/16 and 10.2.0.0/16 only

E. VLSM subnets in 10.0.0.0/16 and the major networks 10.1.0.0/16 10.2.0.0/16 D

 


Suggested Answer: Explanation

 

Question 27

Refer to the exhibit.
 Image
A Boston company bought the assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration and certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet.
Which configuration change do you recommend?

A. Turn off autosummarization on routers N1 and B1.

B. Add IP summary addresses to the Internet-pointing interfaces of routers N1 and B1.

C. Turn off auto summarization on routers N2 and B2.

D. Add wildcard masks to the network commands on routers N2 and B2.

 


Suggested Answer: A

 

Question 28

After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of "fFFE" inserted into the address. Based on this information, what do you conclude about these IPv6 addresses?

A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.

B. The addresses were misconfigured and will not function as intended.

C. IPv6 addresses containing “FFFE” indicate that the address is reserved for multicast.

D. The IPv6 universal/local flag (bit 7) was flipped.

E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.

 


Suggested Answer: A

Extended Unique Identifier (EUI), as per RFC2373, allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identify them EUI-64). This feature is a key benefit over IPv4 as it eliminates the need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained through the 48-bit
MAC address. The Mac address is first separated into two 24-bits, with one being OUI (Organizationally Unique Identifier) and the other being NIC specific. The
16-bit 0xFFFE is then inserted between these two 24-bits to for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which can only appear in
.
EUI-64 generated from the EUI-48 MAC address
Here is an example showing how the Mac Address is used to generate EUI.
Reference Image
Next, the seventh bit from the left, or the universal/local (U/L) bit, needs to be inverted. This bit identifies whether this interface identifier is universally or locally administered. If 0, the address is locally administered and if 1, the address is globally unique. It is worth noticing that in the OUI portion, the globally unique addresses assigned by the IEEE have always been set to 0 whereas the locally created addresses have 1 configured. Therefore, when the bit is inverted, it maintains its original scope (global unique address is still global unique and vice versa). The reason for inverting can be found in RFC4291 section 2.5.1.
Reference Image
Once the above is done, we have a fully functional EUI-64 format address.
Reference:
https://supportforums.cisco.com/document/100566/understanding-ipv6-eui-64-bit-address

Question 29

A network engineer wants to notify a manager in the event that the IP SLA connection loss threshold is reached. Which two features are needed to implement this functionality? (Choose two.)

A. Cisco IOS EEM

B. SNMP traps

C. threshold action

D. MOS

E. logging local

 


Suggested Answer: BC

References:

Question 30

Which two statements about GRE tunnel keys are true? (Choose two.)

A. The key ID must be the same on each device.

B. They prevent the injection of unwanted frames.

C. They prevent the injection of unwanted packets.

D. They must be stored to a keychain.

E. They provide the highe level of security that is available. AC

 


Suggested Answer: Explanation

 

Question 31

Choose correct statement about Dynamic NAT. (Choose two.)

A. inside local

B. outside local

C. this list will be translated to this subnet (which is pool)

D. outside global

 


Suggested Answer: AC

 

Question 32

A network engineer is configuring two dedicated Internet connections within the Internet module. One connection is the primary connection to all wired business communications, while the other is the primary connection for all customer wireless traffic. If one of the links goes down, the affected traffic needs to be redirected to the redundant link.
Which current technology should be deployed to monitor the scenario?

A. PBR

B. IP QoS

C. MMC

D. IP SLA

E. IP SAA

 


Suggested Answer: D

 

Question 33

Which technology was originally developed for routers to handle fragmentation in the path between end points?

A. PMTUD

B. MSS

C. windowing

D. TCP

E. global synchronization

 


Suggested Answer: A

ath MTU Discovery (PMTUD) is a standardized technique in computer networking for determining the maximum transmission unit (MTU) size on the network
P –
path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in Internet Protocol
Version 4 (IPv4).[1] However, all modern operating systems use it on endpoints. In IPv6, this function has been explicitly delegated to the end points of a communications session.[2]
PMTUD is standardized for IPv4 in RFC 1191 and for IPv6 in RFC 1981. RFC 4821 describes an extension to the techniques that works without support from
Internet Control Message Protocol.
<img src=”https://www.examtopics.com/assets/media/exam-media/02670/0013700001.png” alt=”Reference Image” />

Question 34

In which state do DR and BDR establish adjacency with each OSPF router in the network?

A. Init State

B. Exstart State

C. Exchange State

 


Suggested Answer: D. Loading State

DR and BDR will only establish adjacency with each OSPF router on broadcast multiacacess networks. So Init state is the correct answer.

Question 35

Into which two types of areas would an area border router (ABR) inject a default route? (Choose two)

A. stub

B. the autonomous system of an exterior gateway protocol (EGP)

C. NSSA

D. totally stubby

E. the autonomous system of a different interior gateway protocol (IGP)

F. area 0

 


Suggested Answer: AD

Both stub area & totally stubby area allow an ABR to inject a default route. The main difference between these 2 types of areas is:
+ Stub area replaces LSA Type 5 (External LSA “” created by an ASBR to advertise network from another autonomous system) with a default route
+ Totally stubby area replaces both LSA Type 5 and LSA Type 3 (Summary LSA “” created by an ABR to advertise network from other areas, but still within the
AS, sometimes called interarea routes) with a default route.
Below summarizes the LSA Types allowed and not allowed in area types:
<img src=”https://www.examtopics.com/assets/media/exam-media/02670/0056700001.png” alt=”Reference Image” />

Question 36

Which IP SLA operation requires Cisco endpoints?

A. UDP Jitter for VoIP

B. ICMP Path Echo

C. ICMP Echo

D. UDP Jitter

 


Suggested Answer: A

With the addition of real-time traffic (ie: VoIP), the focus shifts not just in the reliability of the network, but also on the delays involved in transmitting the data. Real- time traffic is delay sensitive. For Voice data, packet loss is manageable to some extent, but frequent losses impair communication between endpoints.
The UDP jitter operation is the most popular operation because the user can obtain packet loss, jitter and latency from one operation. This also includes unidirectional measurements as well. The Jitter operation is designed to measure the delay, delay variance and packet loss in IP networks by generating active
UDP traffic. It sends N packets, each of size S, from source router to a target router (which requires Cisco IOS IP SLAs responder enabled) each T milliseconds apart. All these parameters are user configurable.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_udp_jitter.pdf

Question 37

Which two tasks must you perform to configure a BGP peer group? (Choose two.)

A. Activate each neighbor.

B. Activate the default route.

C. Configure the soft-update value.

D. Assign neighbor to the peer-group.

E. Set the advertisement interval.

 


Suggested Answer: AD

 

Question 38

Which logical operator do you use to ensure that the status of an object track list is up only when all configured objects are up?

A. and

B. true

C. xor

D. or

 


Suggested Answer: A

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_cli_nxos/l3_object.html

Question 39

To configure 6to4 on a dual-stack edge router. Which three of the following are valid in 6to4 Tunneling configuration? (Choose three)

A. IPv4 Tunnel IP address

B. Tunnel mode (6to4)

C. Tunnel Keepalives

D. IPv4 Tunnel Destination

E. IPv4 Tunnel Source.

F. 6to4 IPv6 address (within 2002::/16)

 


Suggested Answer: BEF

 

Question 40

Refer to the exhibit.
 Image
After configuring the rotes, the network engineer executes the show ip route command. What is the expected result?

A. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 2 subnetsC 10.0.2.0 is directly connected, FastEthernet0/0C 10.0.1.0 is directly connected, FastEthernet0/1S” 0.0.0.0/0[1/0] via 10.0.2.1 [1/0] via 10.0.1.1Router #

B. Gateway of last resort is 10.0.1.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.1.0 is directly connected, FastEthernet0/1 S” 0.0.0.0/0 [1/0] via 10.0.1.1 Router #

C. Gateway of last resort is not set Router #

D. Gateway of last resort is 10.0.2.1 to network 0.0.0.0 10.0.0.0/24 is subnetted, 1 subnet C 10.0.2.0 is directly connected, FastEthernet0/0 S”0.0.0.0/0 [1/0] via 10.0.2.1 Router #

 


Suggested Answer: C

 

Question 41

What is VRF-Lite?

A. VRF without MPLS

B. VRF without VPN

C. VRF without Cisco Express Forwarding switching

D. VRF without independent routing tables

 


Suggested Answer: A

 

Question 42

When policy-based routing (PBR) is being configured, which three criteria can the set command specify? (Choose three.)
 Image

A. All interfaces through which the packets can be routed

B. All interfaces in the path toward the destination

C. Adjacent next hop router in the path toward the destination

D. All routers in the path toward the destination

E. All networks in the path toward the destination

F. Type of service and precedence in the IP packets

 


Suggested Answer: ACF

The set command specifies the action(s) to take on the packets that match the criteria. You can specify any or all of the following:
* precedence: Sets precedence value in the IP header. You can specify either the precedence number or name.
* df: Sets the “Don’t Fragment” (DF) bit in the ip header.
* vrf: Sets the VPN Routing and Forwarding (VRF) instance.
* next-hop: Sets next hop to which to route the packet.
* next-hop recursive: Sets next hop to which to route the packet if the hop is to a router which is not adjacent.
* interface: Sets output interface for the packet.
* default next-hop: Sets next hop to which to route the packet if there is no explicit route for this destination.
* default interface: Sets output interface for the packet if there is no explicit route for this destination.
Reference Image
Reference Image
Reference:
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpbr_ps1835_TSD_Products_Configuration_Guide_Chapter.html

Question 43

Refer to the exhibit. You notice that traffic from R1 to the 192.168.10.0/24 network prefers the path through R3 instead of the least-cost path through R2.
What is the most likely reason for this router selection?
 Image

A. OSPF prefers external routers over interarea router.

B. OSPF prefers interarea routers over intra-area routers.

C. OSPF prefers external routers over intra-area routers.

D. OSPF prefers intra-area routers over interarea routers.

 


Suggested Answer: D

 

Question 44

An engineer is asked to monitor the availability of the next-hop IP address of 172.16.201.25 every 3 seconds using an ICMP echo packet via an ICMP echo probe.
Which two commands accomplish this task? (Choose two.)

A. router(config-ip-sla)#icmp-echo 172.16.201.25 source-interface FastEthernet 0/0

B. router(config-ip-sla-echo)#timeout 3

C. router(config-ip-sla)#icmp-jitter 172.16.201.25 interval 100 D. router(config-ip-sla-echo)#frequency 3

D. router(config-ip-sla)#udp-echo 172.16.201.25 source-port 23 F. router(config-ip-sla-echo)#threshold 3

 


Suggested Answer: AD

 

Question 45

Fill in the Blank.
How to minimize Unicast flooding?
_________________________________
By decreasing the ARP time compared to CAM table time

 


Suggested Answer: Explanation

 

Question 46

What are the three modes of Unicast Reverse Path Forwarding?

A. strict mode, loose mode, and VRF mode

B. strict mode, loose mode, and broadcast mode

C. strict mode, broadcast mode, and VRF mode

D. broadcast mode, loose mode, and VRF mode

 


Suggested Answer: A

Reference Image
Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. Unicast RPF works in one of three different modes: strict mode, loose
Note that not all network devices support all three modes of operation. Unicast RPF in VRF mode will not be covered in this document. mode, or VRF mode.
When administrators use Unicast RPF in strict mode, the packet must be received on the interface that the router would use to forward the return packet. Unicast
RPF configured in strict mode may drop legitimate traffic that is received on an interface that was not the router’s choice for sending return traffic. Dropping this legitimate traffic could occur when asymmetric routing paths are present in the network.
When administrators use Unicast RPF in loose mode, the source address must appear in the routing table. Administrators can change this behavior using the option, which allows the use of the default route in the source verification process. Additionally, a packet that contains a source address for which allow-default the return route points to the Null 0 interface will be dropped. An access list may also be specified that permits or denies certain source addresses in Unicast RPF loose mode.
Care must be taken to ensure that the appropriate Unicast RPF mode (loose or strict) is configured during the deployment of this feature because it can drop legitimate traffic. Although asymmetric traffic flows may be of concern when deploying this feature, Unicast RPF loose mode is a scalable option for networks that contain asymmetric routing paths.
Reference:
http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html

Question 47

Which two statements about PAP and CHAP authentication are true? (Choose two)

A. PAP uses a challenge string from the server to the client.

B. PAP can query a TACACS+ server to verify access credentials.

C. CHAP requires the client to supply a username and optional password.

D. PAP requires the client to supply a username and optional password.

E. CHAP uses a challenge string from the server to the client.

 


Suggested Answer: BE

 

Question 48

Given the accompanying output, which additional command is needed to redistribute IGRP into EIGRP?
Router eigrp 123 -
Network 10.10.10.0 -
No auto-summary -
Router igrp 123 -
Network 172.16.0.0 -
Network 172.17.0.0 -

A. Under the router igrp mode add redistribute eigrp 123

B. Under the router eigrp mode add redistribute igrp 123

C. Under the router eigrp mode add redistribute igrp 123 subnets

D. None, EIGRP and IGRP are automatically redistributed in this instance.

 


Suggested Answer: D

The point of this question is redistribute IGRP into EIGRP. When redistributing IGRP into EIGRP, there is a feature that they are automatically redistributed if they have same autonomous system number; in opposite, they need to manually redistributed if they have different autonomous system number..

Question 49

Congestion in the network. What is the effect on UDP?

A. Sender will have to buffer more data.

B. Receiver will have to buffer more data before sending packets to higher layers

C. There will be latency.

 


Suggested Answer: C

 

Question 50

Company has migrated to IPv6 in their network.
Which three IPv6 notations represent the same address? (Select three.)

A. 2031::130F::9C0:876A:130B

B. 2031:0000:130F:0000:0000:09C0:876A:130B

C. 2031:0:130F:::9C0:876A:130B

D. 2031::130F:0::9C0:876A:130B

E. 2031:0:130F:0:0:09C0:876A:130B

F. 2031:0:130F::9C0:876A:130B

 


Suggested Answer: BEF

With IP version 6, octets containing all zero’s can be simply represented as :, while consecutive zero fields can be represented as ::.
ANSWER choices E and F are simply the shorthand version of the fully written IPv6 address shown in choice.

Free Access Full 300-101 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of 300-101 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your 300-101 certification journey!

Share18Tweet11
Previous Post

2V0-62.21 Practice Questions Free

Next Post

300-115 Practice Questions Free

Next Post

300-115 Practice Questions Free

300-160 Practice Questions Free

300-320 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.