Q1. Which two statements about BGP loop prevention are true? (Choose two.)
A. Advertisements from PE routers with per-neighbor SOO configured include a Site of Origin value that is equal to the configured value of the BGP peering.
B. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
C. AS-override aids BGP loop prevention, but alternate loop prevention mechanisms are also necessary.
D. Advertisements from the neighbors a BGP peering include a Site of Origin value that is separate from the configured value of the BGP peering.
E. If the configured Site of Origin value of a BGP peering is greater than the Site of Origin value on a route it receives, route advertisement is blocked to prevent a route loop.
F. If the configured Site of Origin value of a BGP peering is equal to the Site of Origin value on a route it receives, route advertisement is permitted.
Answer: A,B
Q2. DRAG DROP
Drag and drop the NHRP flag on the left to the corresponding meaning on the right.
Answer:
Q3. Which address is a MAC address that is mapped from an IPv6 address (RFC 2464)?
A. 3333.FF17.FC0F
B. FFFE. FF17.FC0F
C. FF34.3333.FF17
D. FF7E.FF17.FC0F
Answer: A
Explanation:
An IPv6 packet with a multicast destination address DST, consisting of the sixteen octets DST through DST, is transmitted to the Ethernet multicast address whose first two octets are the value 3333 hexadecimal and whose last four octets are the last four octets of DST.
Reference: https://tools.ietf.org/html/rfc2464
Q4. For which two conditions is Cisco Express Forwarding recursion disabled by default when the BGP Prefix Independent Convergence functionality is enabled? (Choose two.)
A. next hops learned with a /24 mask
B. next hops learned with any mask shorter than /32
C. next hops learned with a /32 mask
D. next hops that are directly connected
Answer: C,D
Explanation:
Recursion is the ability to find the next longest matching path when the primary path goes down. When the BGP PIC feature is not installed, and if the next hop to a prefix fails, Cisco Express Forwarding finds the next path to reach the prefix by recursing through the FIB to find the next longest matching path to the prefix. This is useful if the next hop is multiple
hops away and there is more than one way of reaching the next hop.
However, with the BGP PIC feature, you may want to disable Cisco Express Forwarding recursion for the following reasons:
. Recursion slows down convergence when Cisco Express Forwarding searches all the FIB entries.
. BGP PIC Edge already precomputes an alternate path, thus eliminating the need for Cisco Express Forwarding recursion.
When the BGP PIC functionality is enabled, Cisco Express Forwarding recursion is disabled by default for two conditions:
. For next hops learned with a /32 network mask (host routes)
. For next hops that are directly connected
For all other cases, Cisco Express Forwarding recursion is enabled.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/irg-bgp-mp-pic.html
Q5. In the DiffServ model, which class represents the highest priority with the highest drop probability?
A. AF11
B. AF13
C. AF41
D. AF43
Answer: D
Explanation:
AF43 — Assured forwarding, high drop probability, Class 4 DSCP, and Flash-override precedence.
Table of AF Classes and Drop Priority
Drop Precedence
Class 1
Class 2
Class 3
Class 4
Low drop
AF11
DSCP 10
001010
AF21
DSCP 18
010010
AF31
DSCP 26
011010
AF41
DSCP 34
100010
Medium drop
AF12
DSCP 12
001100
AF22
DSCP 20
010100
AF32
DSCP 28
011100
AF42
DSCP 36
100100
High drop
AF13
DSCP 14
001110
AF23
DSCP 22
010110
AF33
DSCP 30
011110
AF43
DSCP 38
100110
Reference:
https://www.informit.com/library/content.aspx?b=CCIE_Practical_Studies_II&seqNum=56
Q6. Refer to the exhibit.
If IS-IS is configured utilizing default metrics, what is the cost for Router 4 to reach the 10.2.2.0/24 network?
A. 1
B. 20
C. 30
D. 63
Answer: C
Explanation:
By default, every link is an IS-IS network has a metric of 10.
Q7. Which EIGRP configuration results in subsecond failover outside of the basic routing
protocol convergence?
A. bfd all-interfaces
B. timers active-time disabled
C. timers active-time 1
D. timers nsf route-hold 20
Answer: A
Q8. Refer to the exhibit.
Which option is the most likely explanation of the duplicate address message logged?
A. HSRP misconfiguration
B. a PC with IP of 10.10.1.1
C. spanning-tree-loop
D. a hardware problem
Answer: A
Q9. How many bytes comprise the system ID within an IS-IS NET?
A. 4 bytes
B. 6 bytes
C. 8 bytes
D. 16 bytes
E. 20 bytes
Answer: B
Explanation:
Routers are identified with NETs of 8 to 20 bytes. ISO/IEC 10589 distinguishes only three fields in the NSAP address format: a variable-length area address beginning with a single octet, a system ID, and a 1-byte n-selector. Cisco implements a fixed length of 6 bytes for the system ID, which is like the OSPF router ID.
Reference: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.sh tml
Q10. Which technology can create a filter for an embedded packet capture?
A. Control plane policing
B. Access lists
C. NBAR
D. Traffic shaping
Answer: B
Explanation:
A filter can be applied to limit the capture to desired traffic. Define an Access Control List (ACL) within config mode and apply the filter to the buffer:
ip access-list extended BUF-FILTER
permit ip host 192.168.1.1 host 172.16.1.1
permit ip host 172.16.1.1 host 192.168.1.1
monitor capture buffer BUF filter access-list BUF-FILTER
Reference: http://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html
Q11. Refer to the exhibit.
A Cisco Catalyst 6500 Series Switch experiences high CPU utilization. What can be the cause of this issue, and how can it be prevented?
A. The hardware routing table is full. Redistribute from BGP into IGP.
B. The software routing table is full. Redistribute from BGP into IGP.
C. The hardware routing table is full. Reduce the number of routes in the routing table.
D. The software routing table is full. Reduce the number of routes in the routing table.
Answer: C
Explanation:
FIB TCAM Exception - If you try to install more routes than are possible into the FIB TCAM you will see the following error message in the logs:
CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched
%CFIB-SP-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched.
%CFIB-SP-STBY-7-CFIB_EXCEPTION : FIB TCAM exception, Some entries will be software switched.
This error message is received when the amount of available space in the TCAM is exceeded. This results in high CPU. This is a FIB TCAM limitation. Once TCAM is full, a flag will be set and FIB TCAM exception is received. This stops from adding new routes to the TCAM. Therefore, everything will be software switched. The removal of routes does not help resume hardware switching. Once the TCAM enters the exception state, the system must be reloaded to get out of that state. You can view if you have hit a FIB TCAM exception with the following command:
6500-2#sh mls cef exception status
Current IPv4 FIB exception state = TRUE
Current IPv6 FIB exception state = FALSE
Current MPLS FIB exception state = FALSE
When the exception state is TRUE, the FIB TCAM has hit an exception.
The maximum routes that can be installed in TCAM is increased by the mls cef maximum-routes command.
Reference: https://supportforums.cisco.com/document/59926/troubleshooting-high-cpu-6500-sup720
Q12. When deploying redundant route reflectors in BGP, which attribute can you configure on the route reflector to allow routes to be identified as belonging to the same group?
A. ROUTER_ID
B. CLUSTER_ID
C. ORIGINATOR_ID
D. PEER_GROUP
Answer: B
Explanation:
Together, a route reflector and its clients form a cluster. When a single route reflector is deployed in a cluster, the cluster is identified by the router ID of the route reflector. The bgp cluster-id command is used to assign a cluster ID to a route reflector when the cluster has one or more route reflectors. Multiple route reflectors are deployed in a cluster to increase redundancy and avoid a single point of failure. When multiple route reflectors are configured in a cluster, the same cluster ID is assigned to all route reflectors. This allows all route reflectors in the cluster to recognize updates from peers in the same cluster and reduces the number of updates that need to be stored in BGP routing tables.
Reference: http://ieoc.com/forums/t/5326.aspx
Q13. Refer to the exhibit.
Which two route types are advertised by a router with this configuration? (Choose two.)
A. connected
B. external
C. summary
D. static
E. redistributed
Answer: A,C
Q14. Which two statements about a network running MPLS VPN with IS-IS IGP are true? (Choose two.)
A. IS-IS traffic engineering uses wide metric TLV type 135 with an up/down bit to define a leaked route.
B. IS-IS traffic engineering uses wide metric TLV type 128 with an internal/external bit and an up/down bit to define a leaked route.
C. IS-IS traffic engineering uses wide metric TLV type 130 with an internal/external bit and an up/down bit to define a leaked route.
D. If the IS-IS up/down bit is set to 1, the leaked route originated in the L1 area.
E. The MPLS VPN IS-IS core is inherently protected against IP-based attacks.
Answer: A,E
Q15. What are two reasons to use the ip ospf database filter all out command? (Choose two.)
A. to maintain a centralized OSPF database on a single master device
B. to avoid flooding LSAs on low-speed links
C. to ensure a consistent OSPF database across the network
D. to selectively filter OSPF routes without disrupting the SPF algorithm
E. to filter only type 7 LSAs from an OSPF area
F. to enable OSPF to send triggered updates
Answer: A,B