Q1. Which statement about the BGP originator ID is true?
A. The route reflector always sets the originator ID to its own router ID.
B. The route reflector sets the originator ID to the router ID of the route reflector client that injects the route into the AS.
C. The route reflector client that injects the route into the AS sets the originator ID to its own router ID.
D. The originator ID is set to match the cluster ID.
Answer: B
Explanation:
An RR reflecting the route received from a RR-Client adds:
. Originator ID- a 4-byte BGP attribute that is created by the RR. This attribute carries the Router ID of the originator of the route in the local AS. If the update comes back to the originator, it ignores the update.
. Cluster List- A Cluster List is a list of Cluster IDs that an update has traversed. When a route reflector sends a route received from a client to a non-client, it appends the local Cluster ID. If a route reflector receives a route whose Cluster List contains the local Cluster ID, it ignores the update.
Reference: https://sites.google.com/site/amitsciscozone/home/bgp/bgp-route-reflectors
Q2. Which two statements about reverse ARP are true? (Choose two.)
A. Its servers require static mappings.
B. It works with AutoInstall to configure new devices.
C. It provides IP addresses for subnet masks.
D. It provides IP addresses for default gateways.
E. It requires less maintenance than DHCP.
Answer: A,B
Q3. What is the ip dhcp snooping information option command used for?
A. It displays information about the DHCP snooping table.
B. It sends a syslog and an SNMP trap for a DHCP snooping violation.
C. It enables the DHCP snooping host tracking feature.
D. It enables DHCP option 82 data insertion.
Answer: D
Explanation:
To enable DHCP option-82 data insertion, perform this task:
Command
Purpose
Step 1
Router(config)# ip dhcp snooping information option
Enables DHCP option-82 data insertion.
Step 2
Router(config)# ip dhcp snooping information option replace
Or:
Router(config-if)# ip dhcp snooping information option replace
(Optional) Replaces the DHCP relay information option received in snooped packets with the switch's option-82 data.
Step 3
Router(config)# do show ip dhcp snooping | include 82
Verifies
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html
Q4. Which congestion-avoidance or congestion-management technique can cause global synchronization?
A. Tail drop
B. Random early detection
C. Weighted random early detection
D. Weighted fair queuing
Answer: A
Explanation:
Tail Drop
Tail drop treats all traffic equally and does not differentiate between classes of service. Queues fill during periods of congestion. When the output queue is full and tail drop is in effect, packets are dropped until the congestion is eliminated and the queue is no longer full.
Weighted Random Early Detection
WRED avoids the globalization problems that occur when tail drop is used as the congestion avoidance mechanism on the router. Global synchronization occurs as waves of congestion crest only to be followed by troughs during which the transmission link is not fully utilized. Global synchronization of TCP hosts, for example, can occur because packets are dropped all at once. Global synchronization manifests when multiple TCP hosts reduce their transmission rates in response to packet dropping, then increase their transmission rates once again when the congestion is reduced.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfconav.ht ml#wp1002048
Q5. Which CoS value is mapped to DSCP 48 by default?
A. 6
B. 7
C. AF21
D. AF44
E. AF41
F. 46
Answer: A
Q6. Refer to the exhibit.
Which statement about the R1 configuration is true?
A. It permits host 10.1.1.2 to establish a Telnet connection to R1.
B. It limits remote hosts to two SSH connection attempts.
C. SSH connections to R1 will log out after a 5-minute idle interval.
D. Hosts that reside on network 10.0.0.0/8 can SSH to R1.
E. The R1 timeout for outgoing SSH connection attempts is 30 seconds.
Answer: E
Explanation:
The timeout for outgoing SSH connection is defined by the “ip sshh time-out” command (in seconds), which is configured here as 30.
Q7. Which three statements about VTP version 3 are true? (Choose three.)
A. It supports other databases in addition to VLAN.
B. It supports VLANs up to 4095.
C. It supports the synchronization of switch configuration templates between switches in the domain.
D. It supports the transfer of information about private VLAN structures.
E. It supports the transfer of PVST+ configuration information.
F. It supports RSTP.
Answer: A,B,D
Explanation:
Much work has gone into improving the usability of VTP version 3 in three major areas:
. The new version of VTP offers better administrative control over which device is allowed to update other devices' view of the VLAN topology. The chance of unintended and disruptive changes is significantly reduced, and availability is increased. The reduced risk of unintended changes will ease the change process and help speed deployment.
. Functionality for the VLAN environment has been significantly expanded. Two enhancements are most beneficial for today's networks:
– In addition to supporting the earlier ISL VLAN range from 1 to 1001, the new version supports the whole IEEE 802.1Q VLAN range up to 4095.
– In addition to supporting the concept of normal VLANs, VTP version 3 can transfer information regarding Private VLAN (PVLAN) structures.
. The third area of major improvement is support for databases other than VLAN (for example, MST).
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/solution_guide_c78_508010.html
Q8. Which two statements about Inverse ARP are true? (Choose two.)
A. It uses the same operation code as ARP.
B. It uses the same packet format as ARP.
C. It uses ARP stuffing.
D. It supports static mapping.
E. It translates Layer 2 addresses to Layer 3 addresses.
F. It translates Layer 3 addresses to Layer 2 addresses.
Answer: B,E
Explanation:
Inverse Address Resolution Protocol (Inverse ARP or InARP) is used to obtain Network Layer addresses (for example, IP addresses) of other nodes from Data Link Layer (Layer 2) addresses. It is primarily used in Frame Relay (DLCI) and ATM networks, in which Layer 2 addresses of virtual circuits are sometimes obtained from Layer 2 signaling, and the corresponding Layer 3 addresses must be available before those virtual circuits can be used.
Since ARP translates Layer 3 addresses to Layer 2 addresses, InARP may be described as its inverse. In addition, InARP is implemented as a protocol extension to ARP: it uses the same packet format as ARP, but different operation codes.
Reference: http://en.wikipedia.org/wiki/Address_Resolution_Protocol
Q9. Which two statements about private VLANs are true? (Choose two.)
A. Only one isolated VLAN can be mapped to a primary VLAN.
B. Only one community VLAN can be mapped to a primary VLAN.
C. Multiple isolated VLANs can be mapped to a primary VLAN.
D. Multiple community VLANs can be mapped to a primary VLAN.
Answer: A,D
Explanation:
An isolated VLAN is a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports. You can configure only one isolated VLAN in a PVLAN domain. An isolated VLAN can have several isolated ports. The traffic from each isolated port also remains completely separate. Only one isolated VLAN can be mapped under a given primary VLAN. A community VLAN is a secondary VLAN that carries upstream traffic from the community ports to the promiscuous port and to other host ports in the same community. You can configure multiple community VLANs in a PVLAN domain. The ports within one community can communicate, but these ports cannot communicate with ports in any other community or isolated VLAN in the private VLAN.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus6000/sw/layer2/6x/b_6k_L ayer2_Config_6x/b_6k_Layer2_Config_602N12_chapter_011.html
Q10. Which option describes a limitation of Embedded Packet Capture?
A. It can capture data only on physical interfaces and subinterfaces.
B. It can store only packet data.
C. It can capture multicast packets only on ingress.
D. It can capture multicast packets only on egress.
Answer: C
Explanation:
Restrictions for Embedded Packet Capture
. In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform.
. EPC only captures multicast packets on ingress and does not capture the replicated packets on egress.
. Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/epc/configuration/15-mt/epc-15-mt-book/nm-packet-capture.html
Q11. Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)
A. IP address
B. routing table
C. forwarding table
D. access control lists
E. NetFlow configuration
Answer: A,B,C
Q12. What is the range of addresses that is used for IPv4-mapped IPv6 addresses?
A. 2001. db9. . /32
B. 2001. db8. . /32
C. 2002. . /16
D. . . ffff. /16
E. . . ffff. 0. 0/96
Answer: E
Explanation:
IPv4-Mapped Addresses FFFF:0:0/96 are the IPv4-mapped addresses [RFC4291]. Addresses within this block should not appear on the public Internet.
Reference: https://tools.ietf.org/html/rfc5156
Q13. DRAG DROP
Drag and drop the IPv6 address on the left to the correct IPv6 address type on the right.
Answer:
Q14. DRAG DROP
Drag and drop each BGP attribute on the left to the matching description on the right.
Answer:
Q15. MPLS LDP IGP synchronization is configured on a link. The OSPF adjacency on that link is UP but MPLS LDP synchronization is not achieved. Which statement about this scenario is true?
A. The router excludes the link from its OSPF LSA type 1.
B. The router flushes its own router LSA.
C. The router advertises the link in its router LSA with max-metric.
D. The router advertises an LSA type 2 for this link, with the metric set to max-metric.
E. The router advertises the link and OSPF adjacency as it would when the synchronization is achieved.
Answer: C
Explanation:
To enable LDP-IGP Synchronization on each interface that belongs to an OSPF or IS-IS process, enter the mpls ldp sync command. If you do not want some of the interfaces to have LDP-IGP Synchronization enabled, issue the no mpls ldp igp sync command on those interfaces. If the LDP peer is reachable, the IGP waits indefinitely (by default) for synchronization to be achieved. To limit the length of time the IGP session must wait, enter the mpls ldp igp sync holddown command. If the LDP peer is not reachable, the IGP establishes the adjacency to enable the LDP session to be established. When an IGP adjacency is established on a link but LDP-IGP Synchronization is not yet achieved or is lost, the IGP advertises the max-metric on that link.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsldpsyn.html