Q1. Which circumstance can cause packet loss due to a microburst?
A. slow convergence
B. a blocked spanning-tree port
C. process switching
D. insufficient buffers
Answer: D
Explanation:
Micro-bursting is a phenomenon where rapid bursts of data packets are sent in quick succession, leading to periods of full line-rate transmission that can overflow packet buffers of the network stack, both in network endpoints and routers and switches inside the network.
Symptoms of micro bursts will manifest in the form of ignores and/ or overruns (also shown as accumulated in “input error” counter within show interface output). This is indicative of receive ring and corresponding packet buffer being overwhelmed due to data bursts coming in over extremely short period of time (microseconds).
Reference: http://ccieordie.com/?tag=micro-burst
Q2. Which standard feature can be exploited by an attacker to perform network reconnaissance?
A. IP-directed broadcast
B. maintenance operations protocol
C. ICMP redirects
D. source quench
Answer: C
Q3. DRAG DROP
Drag each statement about EtherChannel protocols on the left to the matching EtherChannel protocol on the right.
Answer:
Q4. DRAG DROP
Drag and drop the BGP attribute on the left to the correct category on the right.
Answer:
Q5. What is a reason for an EIGRP router to send an SIA reply to a peer?
A. to respond to an SIA query with the alternative path requested
B. to respond to a query reporting that the prefix has gone stuck-in-active
C. to respond to an SIA query that the router is still waiting on replies from its peers
D. to respond to a reply reporting that the prefix has gone stuck-in-active
Answer: C
Q6. Refer to the exhibit.
If router R1 is functioning as a DHCPv6 server and you enter the command show ipv6 dhcp binding, which two options are pieces of information in the output? (Choose two.)
A. The IA PD
B. The DUID
C. The prefix pool
D. The DNS server
E. The Rapid-Commit setting
Answer: A,B
Explanation:
In the following example, the show ipv6 dhcp binding command shows information about two clients, including their DUIDs, IAPDs, prefixes, and preferred and valid lifetimes:
Router# show ipv6 dhcp binding
Client: FE80::202:FCFF:FEA5:DC39 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5DC1C
IA PD. IA ID 0x00040001, T1 0, T2 0
Prefix: 3FFE:C00:C18:11::/68
preferred lifetime 180, valid lifetime 12345
expires at Nov 08 2002 02:24 PM (12320 seconds)
Client: FE80::202:FCFF:FEA5:C039 (GigabitEthernet2/1/0)
DUID. 000300010002FCA5C01C
IA PD. IA ID 0x00040001, T1 0, T2 0
Prefix: 3FFE:C00:C18:1::/72
preferred lifetime 240, valid lifetime 54321
expires at Nov 09 2002 02:02 AM (54246 seconds)
Prefix: 3FFE:C00:C18:2::/72
preferred lifetime 300, valid lifetime 54333
expires at Nov 09 2002 02:03 AM (54258 seconds)
Prefix: 3FFE:C00:C18:3::/72
preferred lifetime 280, valid lifetime 51111
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/xe-3s/dhcp-xe-3s-book/ip6-dhcp-prefix-xe.html
Q7. Which statement about the feasibility condition in EIGRP is true?
A. The prefix is reachable via an EIGRP peer that is in the routing domain of the router.
B. The EIGRP peer that advertises the prefix to the router has multiple paths to the destination.
C. The EIGRP peer that advertises the prefix to the router is closer to the destination than the router.
D. The EIGRP peer that advertises the prefix cannot be used as a next hop to reach the destination.
Answer: C
Explanation:
The advertised metric from an EIGRP neighbor (peer) to the local router is called Advertised Distance (or reported distance) while the metric from the local router to that network is called Feasible Distance. For example, R1 advertises network 10.10.10.0/24 with a metric of 20 to R2. For R2, this is the advertised distance. R2 calculates the feasible distance by adding the metric from the advertised router (R1) to itself. So in this case the feasible distance to network 10.10.10.0/24 is 20 + 50 = 70.
Before a router can be considered a feasible successor, it must pass the feasibility condition rule. In short, the feasibility condition says that if we learn about a prefix from a neighbor, the advertised distance from that neighbor to the destination must be lower than our feasible distance to that same destination. Therefore we see the Advertised Distance always smaller than the Feasible Distance to satisfy the feasibility condition.
Q8. DRAG DROP
Drag and drop the events on the left to dispaly the correct sequence on the right when CoPP is enabled.
Answer:
Q9. Which statement is true about IGMP?
A. Multicast sources send IGMP messages to their first-hop router, which then generates a PIM join message that is then sent to the RP.
B. Multicast receivers send IGMP messages to their first-hop router, which then forwards the IGMP messages to the RP.
C. IGMP messages are encapsulated in PIM register messages and sent to the RP.
D. Multicast receivers send IGMP messages to signal their interest to receive traffic for specific multicast groups.
Answer: D
Explanation:
In the example shown above, the receivers (the designated multicast group) are interested in receiving the video data stream from the source. The receivers indicate their interest by sending an Internet Group Management Protocol (IGMP) host report to the routers in the network. The routers are then responsible for delivering the data from the source to the receivers.
Reference:
http://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_o vr.html
Q10. DRAG DROP
Drag and drop each BGP feature on the left to the corresponding function it performs on the right.
Answer:
Q11. Refer to the exhibit.
Which statement is true?
A. BGP peer 10.1.2.3 is performing inbound filtering.
B. BGP peer 10.1.2.3 is a route reflector.
C. R1 is a route reflector, but BGP peer 10.1.2.3 is not a route reflector client.
D. R1 still needs to send an update to the BGP peer 10.1.2.3.
Answer: D
Explanation:
On R1 the routing table version (Tbl Ver) for 10.1.2.3 is 1, other routers have version 2, so it needs to send an update to the 10.1.2.3 peer.
Q12. Which two statements about Cisco Express Forwarding are true? (Choose two.)
A. Cisco Express Forwarding tables contain reachability information and adjacency tables contain forwarding information.
B. Cisco Express Forwarding tables contain forwarding information and adjacency tables contain reachability information.
C. Changing MAC header rewrite strings requires cache validation.
D. Adjacency tables and Cisco Express Forwarding tables can be built separately.
E. Adjacency tables and Cisco Express Forwarding tables require packet process-switching.
Answer: A,D
Explanation:
Main Components of CEF
Information conventionally stored in a route cache is stored in several data structures for Cisco Express Forwarding switching. The data structures provide optimized lookup for efficient packet forwarding. The two main components of Cisco Express Forwarding operation are the forwarding information base (FIB) and the adjacency tables. The FIB is conceptually similar to a routing table or information base. A router uses this lookup table to make destination-based switching decisions during Cisco Express Forwarding operation. The FIB is updated when changes occur in the network and contains all routes known at the time. Adjacency tables maintain Layer 2 next-hop addresses for all FIB entries. This separation of the reachability information (in the Cisco Express Forwarding table) and the forwarding information (in the adjacency table), provides a number of benefits:
. The adjacency table can be built separately from the Cisco Express Forwarding table, allowing both to be built without any packets being process-switched.
. The MAC header rewrite used to forward a packet is not stored in cache entries, so changes in a MAC header rewrite string do not require validation of cache entries.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipswitch_cef/configuration/15-mt/isw-cef-15-mt-book/isw-cef-overview.html
Q13. Which two statements about the C-bit and PW type are true? (Choose two.)
A. The C-bit is 1 byte and the PW type is 15 bytes.
B. The PW type indicates the type of pseudowire.
C. The C-bit is 3 bits and the PW type is 10 bits.
D. The C-bit set to 1 indicates a control word is present.
E. The PW type indicates the encryption type.
Answer: B,D
Explanation:
The control word carries generic and Layer 2 payload-specific information. If the C-bit is set to 1, the advertising PE expects the control word to be present in every pseudowire packet on the pseudowire that is being signaled. If the C-bit is set to 0, no control word is expected to be present. Pseudowire Type—PW Type is a 15-bit field that represents the type of pseudowire.
Reference: http://www.ciscopress.com/articles/article.asp?p=386788&seqNum=2
Q14. Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)
A. SIP
B. HTTP
C. FTP
D. SMTP
E. POP3
Answer: A,C
Q15. Which statement about the function of poison reverse in EIGRP is true?
A. It tells peers to remove paths that previously might have pointed to this router.
B. It tells peers to remove paths to save memory and bandwidth.
C. It provides reverse path information for multicast routing.
D. It tells peers that a prefix is no longer reachable.
Answer: A
Explanation:
Poison Reverse in EIGRP states: “Once you learn of a route through an interface, advertise it as unreachable back through that same interface”. For more information please read here. http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html#splithorizon.