Professional Documents
Culture Documents
300-101 All Question PDF
300-101 All Question PDF
After applying the access list on a Cisco router, the network engineer notices that the router CPU
utilization has risen to 99 percent. What is the reason for this?
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding
switched.
B. A packet that matches access-list with the “log” keyword is fast switched.
C. A packet that matches access-list with the “log” keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.
Correct Answer: C
New Question 2:
What does the following access list, which is applied on the external interface FastEthernet 1/0
of the perimeter router, accomplish?
C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any
intrusion attempts.
D. It prevents private internal addresses to be accessed directly from outside.
Correct Answer: C
New Question 3:
A. Track the up/down state of a loopback interface and shut down this interface during
maintenance.
B. Adjust the HSRP priority without the use of preemption.
C. Disable and enable all active interfaces on the active HSRP node.
D. Enable HSRPv2 under global configuration, which allows for maintenance mode.
Correct Answer: A
New Question 4:
Which two commands would be used to troubleshoot high memory usage for a process? (Choose
two.)
A. router#show memory allocating-process table
B. router#show memory summary
C. router#show memory dead
D. router#show memory events
E. router#show memory processor statistics
New Question 5:
Updated & Revised 11/1/16
The enterprise network WAN link has been receiving several denial of service attacks from both
IPv4 and IPv6 sources. Which three elements can you use to identify an IPv6 packet via its
header, in order to filter future attacks? (Choose three.)
A. Traffic Class
B. Source address
C. Flow Label
D. Hop Limit
E. Destination Address
F. Fragment Offset
New Question 6:
A network engineer has set up VRF-Lite on two routers where all the interfaces are in the same
VRF. At a later time, a new loopback is added to Router 1, but it cannot ping any of the existing
interfaces. Which two configurations enable the local or remote router to ping the loopback from
any existing interface? (Choose two.)
A. adding a static route for the VRF that points to the global route table
B. adding the loopback to the VRF
C. adding dynamic routing between the two routers and advertising the loopback
D. adding the IP address of the loopback to the export route targets for the VRF
E. adding a static route for the VRF that points to the loopback interface
F. adding all interfaces to the global and VRF routing tables
New Question 7:
Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network?
(Choose three.)
A. simplified Layer 3 network virtualization
B. improved shared services support
C. enhanced management, troubleshooting, and usability
D. reduced configuration and deployment time for dot1q trunking
E. increased network performance and throughput
F. decreased BGP neighbor configurations
New Question 8:
Correct Answer: D
New Question 9:
On which two types of interface is Frame Relay switching supported? (Choose two.)
A. serial interfaces
B. Ethernet interfaces
C. fiber interfaces
D. ISDN interfaces
E. auxiliary interfaces
Which two statements about AAA implementation in a Cisco router are true? (Choose two.)
A. RADIUS is more flexible than TACACS+ in router management.
B. RADIUS and TACACS+ allow accounting of commands.
C. RADIUS and TACACS+ encrypt the entire body of the packet.
D. RADIUS and TACACS+ are client/server AAA protocols.
E. Neither RADIUS nor TACACS+ allow for accounting of commands.
Which option represents the minimal configuration that allows inbound traffic from the
172.16.1.0/24 network to successfully enter router R, while also limiting spoofed 10.0.0.0/8
hosts that could enter router R?
A. (config)#ipcef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx allow-default
B. (config)#ipcef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx
C. (config)#no ipcef
(config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via rx
D. (config)#interface fa0/0
(config-if)#ip verify unicast source reachable-via any
Correct Answer: A
Updated & Revised 11/1/16
Which outbound access list, applied to the WAN interface of a router, permits all traffic except
for http traffic sourced from the workstation with IP address 10.10.10.1?
A. ip access-list extended 200
deny tcp host 10.10.10.1 eq 80 any
permit ip any any
B. ip access-list extended 10
deny tcp host 10.10.10.1 any eq 80
permit ip any any
C. ip access-list extended NO_HTTP
deny tcp host 10.10.10.1 any eq 80
D. ip access-list extended 100
deny tcp host 10.10.10.1 any eq 80
permit ip any any
Correct Answer: D
A. Easy Trunk
B. Dot1e
C. Virtual Network Trunk
D. VNET Tags
E. MBGP
Correct Answer: C
Updated & Revised 11/1/16
In which two ways can split horizon issues be overcome in a Frame Relay network environment?
(choose two.)
A. Configuring one physical serial interface with Frame Relay to various remote sites.
B. Configure a loopback interface with Frame Relay to various remote sites.
C. Configuring multiple subinterfaces on a single physical interface to various remote sites.
D. Enabling split horizon.
E. Disabling split horizon
Correct Answer: D
New Question 16:
Which three IP SLA performance metrics can you use to monitor enterprise-class networks?
(Choosethree.)
A. Delay
B. Reliability
C. Packet loss
D. Traps
E. Connectivity
What command can you enter to configure an enable password that uses an encrypted password
Correct Answer: D
A network engineer wants to notify a manager in the events that the IP SLA connection loss
threshold reached. Which two features are need to implements this function? (choose two)
A. MOS
B. Threshold action
C. Cisco EEM
D. SNMP traps
E. IOS
At which layer does Cisco Express Forwarding use adjacency tables to populate addressing
information?
A. Layer 1
B. Layer 2
Updated & Revised 11/1/16
C. Layer 3
D. Layer 4
Correct Answer: B
when the tunnel interface is configured in default mode, which statement about routers and the
tunnel destination address is true
A. The router must have a route installed towards the tunnel destination
B. The router must have wccp redirects enabled inbound from the tunnel destination
C. The router must have cisco discovery protocol enabled on the tunnel to form a CDP
neighborship with the tunnel destination
D. The router must have redirects enabled outbound towards the tunnel destination
Correct Answer: A
Correct Answer: D
New Question 22:
In Rapid-Commit mode , the DHCP client obtain configuration parameters from the server
through a rapid two message exchange. What two messages?
A. SOLICIT
B. ADVERTISE
C. REQUEST
Updated & Revised 11/1/16
D. CONFIRM
E. RENEW
F. REBIND
G. REPLY
Correct Answer: A, G
A network administrator notices that the BGP state drops and logs are generated for missing
BGP hello keepalives. What is the potential problem?
A. InCorrect Answer: neighbor options
B. Hello timer mismatch
C. BGP path MTU enabled
D. MTU mismatch
Correct Answer: D
Refer to the exhibit showing complete command output. What type of OSPF router is Router A?
A. ABR
Updated & Revised 11/1/16
B. ASBR
C. Edge Router
D. Internal Router
Correct Answer: A
Considering the IPv6 address independence requirements, which process do you avoid when you
use NPTv6 for translation?
Correct Answer:A
Which two statements about NTP operation are true? (Choose two.)
A. If multiple NTP servers are configured, the one with the lowest stratum is preferred
B. By default, NTP communications use UDP port 123.
C. If multiple NTP servers are configured, the one with the highest stratum is preferred.
D. Locally configured time overrides time received from an NTP server.
E. “Stratum” refers to the number of hops between the NTP client and the NTP server.
NTP questions
Correct Answer: A, B
Which two attributes describe UDP within a TCP/IP network? (Choose two.)
A. Acknowledgments
B. Unreliable delivery
C. Connectionless communication
D. Connection-oriented communication
E. Increased headers
Correct Answer: B, C
Correct Answer: A
Which IP SLA operation can be used to measure round-trip delay for the full path and
hop-by-hop round-trip delay on the network?
A. HTTP
B. ICMP path echo
C. TCP connect
D. ICMP echo
Correct Answer: B
A network engineer wants to display the statistics of an active tunnel on a DMVPN network.
Which command should the administrator execute to accomplish this task?
A. Router#show crypto ipsec sa
B. Router#show crypto isakmp peers
C. Router#show crypto isakmp sa
D. Router#show crypto ipsec transform-set
E. Router#show crypto engine connections active
Updated & Revised 11/1/16
Correct Answer: A
New Question 32:
Refer to the exhibit. A network engineer has configured GRE between two IOS routers. The state
of the tunnel interface is continuously oscillating between up and down. What is the solution to
this problem?
A. Create a more specific static route to define how to reach the remote router.
B. Create a more specific ARP entry to define how to reach the remote router.
C. Save the configuration and reload the router.
D. Check whether the internet service provider link is stable
Correct Answer: A
What is the optimal location from which to execute a debug command that produces an
excessive amount of information?
A. Vty lines
B. SNMP commands
C. A console port
D. An AUX port
Correct Answer: A
Correct Answer: C
New Question 35:
Updated & Revised 11/1/16
A network engineer receives reports about poor voice quality issues at a remote site. The
network engineer does a packet capture and sees out-of-order packets being delivered. Which
option can cause the VOIP quality to suffer?
Correct Answer: D
What following parameters for the EIGRP authentication need to match in order for EIGRP
neighbors to establish a neighbor relationship?
Correct Answer: C
Correct Answer: C
A network engineer is configuring the router for NetFlow data exporting. What is required in
order for NDE to begin exporting data?
A. Source
B. Flow mask
C. Destination
D. Interface type
E. Traffic type
F. NetFlow version
Correct Answer: C
A network engineer wants to ensure an optimal end-to-end delay bandwidth product. The delay
is less than 64 KB. Which TCP feature ensures steady state throughput?
A. Window scaling
B. Network buffers
C. Round-trip timers
D. TCP acknowledgments
Correct Answer: A
Reter to the exhibit. Router 1 cannot ping router 2 via the Frame Relay between them. Which
two statements describe the problems? (Chooses two.)
A. Encapsulation is mismatched.
Updated & Revised 11/1/16
Which type of Ipv6 address is an identifier for a single interface on a single node?
A. Anycast
B. Broadcast
C. Multicast
D. Unicast
On the OSPF Evaluation Simlet, everything is the same except for the question regards to
the Link between R3 and R2. See below for details:
Check the serial links connected to R3. Which statements are Correct Answer:?
Updated & Revised 11/1/16
A. The neighbor command must be used on R1-R3 link to keep the adjacency up
B. The OSPF timer values of R2-R3 link are 30, 120, 120
C. The OSPF timer values of R1-R3 link should be 10,40,40
D. R3 must flood LSUs to all the routers on the network.
Correct Answer : A
Explanation:
The answer is no longer option B, now the answer is A since the values of the link between R3
and R2 changed. The values are no longer 30,120,120. The link between R1 and R3 is NBMA,
thus, it needs the neighbor command to keep the adjacency up.
Other than a working EIGRP configuration, which option must be the same on all routers for
EIGRP authentication key rolleover to work correctly?
A. SMTP
B. SNMP
C. Passwords
D. Time
Correct Answer: D
to the Exhibit
A network engineer is troubleshooting a DMVPN setup between the hub and the spoke. The
engineer executes the command show crypto isakmp sa and observes the output that is displayed.
What is the problem?
Corect Answer: B
In which form does PAP authentication send the username and password across the link?
A. Encrypted
B. Password protected
C. Clear text
D. Hashed
Correct Answer: C
An engineer is using a network sniffer to troubleshoot DHCPv6 between a router and hosts on
the LAN with the following configuration:
Interface Ethernet0
A. reply
B. request
C. advertise
D. acknowledge
E. solicit
F. accept
How should a router that is being used in a Frame Relay network be configured to keep split
horizon issues from preventing routing updates?
A. Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to
the subinterface.
B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast
traffic.
Correct Answer: A
Which mode of uRPF causes a router interface to accept a packet, if the network to which the
packet’s source IP address belongs is found in the router’s FIB?
A. Strict mode
B. Loose mode
C. Auto mode
D. Desirable mode
Correct Answer: B
A. Uses UDP
Updated & Revised 11/1/16
D. Cisco-proprietary
A. a routing loop
C. high latency
transit Router.
Your company uses Voice over IP (VoIP). The system sends UDP datagrams containing the
voice data between communicating hosts. When areas of the network become busy, some of the
datagrams arrive at their destination out of order. What happens when this occurs?
A. UDP will send an ICMP Information request message to the source host.
B. UDP will pass the information in the datagrams up to the next OSI layer in the order in
D. UDP will use the sequence numbers in the datagram headers to reassemble the data
Updated & Revised 11/1/16
Correct Answer: B
Which alerts will be seen on the console when running the command: logging console warnings?
A. warnings only
Correct Answer: C
C. ICMP Echo
D. UDP Jitter
Correct Answer: A
(Sorry do not know the answer choices for this one. Refer to Explanation for information)
Explanation: If needed, you can set the priority value to 0 in order to configure a router to never
become a DR/BDR. This is necessary in hub and spoke networks where the hub should be
configured to become the DR, where as the spokes should neither be DR nor BDR.
Updated & Revised 11/1/16
B. Default Route
C. ACL access
D. Searchable both
Correct Answer: C