Q1. Which three improvements does Cisco IOS XE Software offer over traditional IOS Software? (Choose three.)
A. It can run applications as separate processes on multicore CPUs.
B. It supports drivers for data plane ASICs outside of the operating system.
C. It allows platform-dependent code to be compiled into a single image.
D. It supports multiple IOS instances simultaneously, sharing resources and internal infrastructure for scalability.
E. It allows platform-independent code to be abstracted into a single microkernel for portability across platforms.
F. It uses a QNX Neutrino-based environment underneath the IOS Software.
Answer: A,B,C
Q2. Which option is the result if two adjacent routers are configured for OSPF with different process IDs?
A. The routers are unable to establish an adjacency.
B. The routers establish an adjacency, but route exchange fails.
C. The routers establish an adjacency and exchange routes, but the routes are unreachable.
D. The routers establish an adjacency and exchange routes, and the routes are reachable.
Answer: D
Q3. How many address families can a single OSPFv3 instance support?
A. 1
B. 2
C. 5
D. 10
Answer: A
Q4. An NSSA area has two ABRs connected to Area 0. Which statement is true?
A. Both ABRs translate Type-7 LSAs to Type-5 LSAs.
B. The ABR with the highest router ID translates Type-7 LSAs to Type-5 LSAs.
C. Both ABRs forward Type-5 LSAs from the NSSA area to backbone area.
D. No LSA translation is needed.
Answer: B
Q5. Refer to the exhibit.
If the remaining configuration uses default values, what is the expected output of the show mls qos queue-set command?
A)
B)
C)
D)
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Answer: A
Explanation:
mls qos queue-set output qset-idthreshold queue-id drop-threshold1 drop-threshold2 reserved-threshold maximum-threshold
Configure the WTD thresholds, guarantee the availability of buffers, and configure the maximum memory allocation for the queue-set (four egress queues per port).
By default, the WTD thresholds for queues 1, 3, and 4 are set to 100 percent. The thresholds for queue 2 are set to 200 percent. The reserved thresholds for queues 1, 2, 3,
and 4 are set to 50 percent. The maximum thresholds for all queues are set to 400 percent.
. For qset-id , enter the ID of the queue-set specified in Step 2. The range is 1 to 2.
. For queue-id , enter the specific queue in the queue-set on which the command is performed. The range is 1 to 4.
. For drop-threshold1 drop-threshold2 , specify the two WTD thresholds expressed as a percentage of the queue’s allocated memory. Th e range is 1 to 3200 percent.
. For reserved-threshold , enter the amount of memory to be guaranteed (reserved) for the queue expressed as a percentage of the allocated memory. The range is 1 to 100 percent.
. For maximum-threshold , enable a queue in the full condition to obtain more buffers than are reserved for it. This is the maximum memory the queue can have before the packets are dropped if the common pool is not empty. The range is 1 to 3200 percent
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/1 2-2_55_se/configuration/guide/3750xscg/swqos.html
Q6. Which two statements best describes the difference between active mode monitoring and passive mode monitoring? (Choose two.)
A. Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetFlow.
B. Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link.
C. Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links.
D. Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links.
Answer: B,D
Q7. Which authentication method does OSPFv3 use to secure communication between neighbors?
A. plaintext
B. MD5 HMAC
C. PKI
D. IPSec
Answer: D
Explanation:
In order to ensure that OSPFv3 packets are not altered and re-sent to the device, causing the device to behave in a way not desired by its system administrators, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. OSPFv3 requires the use of IPsec to enable authentication. Crypto images are required to use authentication, because only crypto images include the IPsec API needed for use with OSPFv3.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_ospf/configuration/15-sy/iro-15-sy-book/ip6-route-ospfv3-auth-ipsec.html
Q8. What is the ip dhcp snooping information option command used for?
A. It displays information about the DHCP snooping table.
B. It sends a syslog and an SNMP trap for a DHCP snooping violation.
C. It enables the DHCP snooping host tracking feature.
D. It enables DHCP option 82 data insertion.
Answer: D
Explanation:
To enable DHCP option-82 data insertion, perform this task:
Command
Purpose
Step 1
Router(config)# ip dhcp snooping information option
Enables DHCP option-82 data insertion.
Step 2
Router(config)# ip dhcp snooping information option replace
Or:
Router(config-if)# ip dhcp snooping information option replace
(Optional) Replaces the DHCP relay information option received in snooped packets with the switch's option-82 data.
Step 3
Router(config)# do show ip dhcp snooping | include 82
Verifies
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html
Q9. DRAG DROP
Answer:
Q10. A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?
A. No configuration must be added.
B. stack ID
C. IP address
D. VLAN information
E. VTP information
Answer: A
Q11. Refer to the exhibit.
Which two statements about the device that generated the output are true? (Choose two.)
A. The SPT-bit is set.
B. The sparse-mode flag is set.
C. The RP-bit is set.
D. The source-specific host report was received.
Answer: A,D
Explanation:
In this example we can see that the s, T, and I flags are set. Here is a list of the flags and their meanings:
show ip mroute Field Descriptions
Field Description
Flags:
Provides information about the entry.
D - Dense
Entry is operating in dense mode.
S - Sparse
Entry is operating in sparse mode.
B - Bidir Group
Indicates that a multicast group is operating in bidirectional mode.
s - SSM Group Indicates that a multicast group is within the SSM range of IP addresses. This flag is reset if the SSM range changes.
C - Connected
A member of the multicast group is present on the directly connected interface.
L - Local
The router itself is a member of the multicast group.
P - Pruned
Route has been pruned. The Cisco IOS software keeps this information so that a downstream member can join the source.
R - RP-bit set
Indicates that the (S, G) entry is pointing toward the RP. This is typically prune state along the shared tree for a particular source.
F - Register flag
Indicates that the software is registering for a multicast source.
T - SPT-bit set
Indicates that packets have been received on the shortest path source tree.
J - Join SPT
For (*, G) entries, indicates that the rate of traffic flowing down the shared tree is exceeding the SPT-Threshold set for the group. (The default SPT-Threshold setting is 0 kbps.) When the J- Join shortest path tree (SPT) flag is set, the next (S, G) packet received down the shared tree triggers an (S, G) join in the direction of the source, thereby causing the router to join the source tree.
For (S, G) entries, indicates that the entry was created because the SPT-Threshold for the group was exceeded. When the J- Join SPT flag is set for (S, G) entries, the router monitors the traffic rate on the source tree and attempts to switch back to the shared tree for this source if the traffic rate on the source tree falls below the SPT-Threshold of the group for more than 1 minute.
M - MSDP created entry
Indicates that a (*, G) entry was learned through a Multicast Source Discovery Protocol (MSDP) peer. This flag is only applicable for a rendezvous point (RP) running MSDP.
X - Proxy Join Timer Running
Indicates that the proxy join timer is running. This flag is only set for (S, G) entries of an RP or "turnaround" router. A "turnaround" router is located at the intersection of a shared path (*, G) tree and the shortest path from the source to the RP.
A - Advertised via MSDP
Indicates that an (S, G) entry was advertised through an MSDP peer. This flag is only applicable for an RP running MSDP.
U - URD
Indicates that a URD channel subscription report was received for the (S, G) entry.
I - Received Source Specific Host Report
Indicates that an (S, G) entry was created by an (S, G) report. This (S, G) report could have been created by IGMPv3, URD, or IGMP v3lite. This flag is only set on the designated router (DR).
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_ssm.html
Q12. Which BGP aggregate address configuration advertises only the aggregate address, with attributes inherited from the more specific routes?
A. summary-only as-set
B. as-set
C. summary
D. summary-only
Answer: A
Explanation:
Example:
router bgp 300
neighbor 2.2.2.2 remote-as 100
neighbor 3.3.3.3 remote-as 200
neighbor 4.4.4.4 remote-as 400
aggregate-address 160.0.0.0 255.0.0.0 summary-only as-set
!--- With the as-set configuration command, the aggregate
!--- inherits the attributes of the more-specific routes.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/5441-aggregation.html
Q13. Refer to the exhibit.
Which two conditions can cause this error message to be displayed on the console? (Choose two.)
A. The EtherChannel is configured as desirable on both ends.
B. The port-channel on the adjacent device is misconfigured.
C. There is a speed and duplex mismatch on interface fa0/12.
D. The EtherChannel is configured as auto on one of the interfaces.
Answer: B,C
Q14. Which two features are used for inspection when IPv6 address glean is enabled? (Choose two.)
A. DHCP messages
B. ND messages
C. ICMPv6 messages
D. UDP messages
E. TCP messages
Answer: A,B
Explanation:
IPv6 address glean is the foundation for many other IPv6 features that depend on an accurate binding table. It inspects ND and DHCP messages on a link to glean addresses, and then populates the binding table with these addresses. This feature also enforces address ownership and limits the number of addresses any given node is allowed to claim.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6f-15-s-book/ip6-snooping.html
Q15. Which Layer 2 tunneling technique eliminates the need for pseudowires?
A. OTV
B. L2TPv3
C. AToM
D. VPLS
Answer: A