Q1. DRAG DROP
Drag and drop each DHCP term on the left to the corresponding definition on the right.
Answer:
Q2. DRAG DROP
Answer:
Q3. Which ICMP message type is used to assist path MTU discovery?
A. destination unreachable
B. redirect message
C. source quench
D. time exceeded
Answer: A
Q4. Refer to the exhibit.
You are bringing a new MPLS router online and have configured only what is shown to bring LDP up. Assume that the peer has been configured in a similar manner. You verify the LDP peer state and see that there are no neighbors. What will the output of show mpls ldp discovery show?
A. Interfaces:
Ethernet0/0 (ldp): xmit
B. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 25.25.25.2:0; IP addr: 192.168.12.2
C. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 192.168.12.2:0; no route
D. Interfaces:
Ethernet0/0 (ldp): xmit/recv
LDP Id: 25.25.25.2:0; no route
Answer: D
Q5. A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?
A. No configuration must be added.
B. stack ID
C. IP address
D. VLAN information
E. VTP information
Answer: A
Q6. Which two features are supported when Cisco HDLC is implemented? (Choose two.)
A. error recovery
B. error detection
C. asynchronous links
D. multiple protocols
Answer: B,D
Explanation:
HDLC’s frame check sequence (FCS) is a 16-bit CRC-CCITT or a 32-bit CRC-32 computed over the Address, Control, and Information fields. It provides a means by which the receiver can detect errors that may have been induced during the transmission of the frame, such as lost bits, flipped bits, and extraneous bits. Cisco’s HDLC contains a proprietary field that is used to support multiple protocols.
Reference: http://en.wikipedia.org/wiki/High-Level_Data_Link_Control
Q7. Which two features are used for inspection when IPv6 address glean is enabled? (Choose two.)
A. DHCP messages
B. ND messages
C. ICMPv6 messages
D. UDP messages
E. TCP messages
Answer: A,B
Explanation:
IPv6 address glean is the foundation for many other IPv6 features that depend on an accurate binding table. It inspects ND and DHCP messages on a link to glean addresses, and then populates the binding table with these addresses. This feature also enforces address ownership and limits the number of addresses any given node is allowed to claim.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6f-15-s-book/ip6-snooping.html
Q8. Which two packet types does an RTP session consist of? (Choose two.)
A. TCP
B. RTCP
C. RTP
D. ICMP
E. BOOTP
F. ARP
Answer: B,C
Explanation:
An RTP session is established for each multimedia stream. A session consists of an IP address with a pair of ports for RTP and RTCP. For example, audio and video streams use separate RTP sessions, enabling a receiver to deselect a particular stream. The ports which form a session are negotiated using other protocols such as RTSP (using SDP in the setup method) and SIP. According to the specification, an RTP port should be even and the RTCP port is the next higher odd port number.
Reference: http://en.wikipedia.org/wiki/Real-time_Transport_Protocol
Q9. Refer to the exhibit.
Which action will solve the error state of this interface when connecting a host behind a Cisco IP phone?
A. Configure dot1x-port control auto on this interface
B. Enable errdisable recovery for security violation errors
C. Enable port security on this interface
D. Configure multidomain authentication on this interface
Answer: D
Explanation:
In single-host mode, a security violation is triggered when more than one device are detected on the data vlan. In multidomain authentication mode, a security violation is triggered when more than one device are detected on the data or voice VLAN. Here we see that single host mode is being used, not multidomain mode.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/50sg/configuration/guide/Wrapper-46SG/dot1x.html#wp1309041
Q10. Which two are features of DMVPN? (Choose two.)
A. It does not support spoke routers behind dynamic NAT.
B. It requires IPsec encryption.
C. It only supports remote peers with statically assigned addresses.
D. It supports multicast traffic.
E. It offers configuration reduction.
Answer: D,E
Explanation:
DMVPN Hub-and-spoke deployment model: In this traditional topology, remote sites (spokes) are aggregated into a headend VPN device at the corporate headquarters (hub). Traffic from any remote site to other remote sites would need to pass through the headend device. Cisco DMVPN supports dynamic routing, QoS, and IP Multicast while significantly reducing the configuration effort.
Reference: http://www.cisco.com/c/en/us/products/collateral/security/dynamic-multipoint-vpn-dmvpn/data_sheet_c78-468520.html
Q11. Refer to the exhibit.
R1 is able to reach only some of the subnets that R2 is advertising. Which two configuration changes can you make to ensure that R1 can reach all routes from R2? (Choose two.)
A. Add an additional permit statement to the LOOPBACKS route map.
B. Modify the LOOPBACKS access list to include all loopback subnets.
C. Add an additional statement in the LOOPBACKS route map to match both Level 1 and Level 2 circuits.
D. Add an additional statement in the LOOPBACKS route map to match the R1 CLNS address.
E. Configure the interfaces between R1 and R2 with a Level 1 IS-IS circuit.
F. Configure the interfaces between R1 and R2 with a Level 2 IS-IS circuit.
Answer: A,B
Explanation:
In this example, the access list is using a 0.0.3.255 wildcard mask, so only the loopback IP’s of 172.16.0.0 – 172.16.3.255 will be included. We need to add another statement to allow loopback 4 to be advertised, or modify the wildcard mask to include them all.
Q12. Which option is true about output policing for the control plane?
A. It improves router performance by limiting traffic sent to the control plane.
B. It improves router performance by limiting traffic sent from the control plane.
C. It improves router performance by limiting traffic sent to and from the control plane.
D. It controls traffic originated from the router.
Answer: D
Q13. Which two Cisco IOS AAA features are available with the local database? (Choose two.)
A. command authorization
B. network access authorization
C. network accounting
D. network access authentication
Answer: A,D
Explanation:
Configuring the Local Database
This section describes how to manage users in the local database. You can use the local database for CLI access authentication, privileged mode authentication, command authorization, network access authentication, and VPN authentication and authorization. You cannot use the local database for network access authorization. The local database does not support accounting.
Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/configuration/guide/conf_gd/aaa.h tml
Q14. Which two conditions must be met by default to implement the BGP multipath feature? (Choose two.)
A. The next-hop routers must be the same.
B. Route reflectors must be enabled.
C. All attributes must have the same values.
D. MPLS must be enabled.
E. The next-hop routers must be different.
Answer: C,E
Q15. Refer to the exhibit.
What is the meaning of the asterisk (*) in the output?
A. PIM neighbor 10.1.5.6 is the RPF neighbor for the group 232.1.1.1 for the shared tree.
B. PIM neighbor 10.1.5.6 is the one that is seen as the RPF neighbor when performing the command show ip rpf 10.1.4.7.
C. PIM neighbor 10.1.5.6 is the winner of an assert mechanism.
D. The RPF neighbor 10.1.5.6 is invalid.
Answer: C
Explanation:
show ip mroute
Field
Descriptions
Field Description
RPF neighbor or RPF nbr
IP address of the upstream router to the source. Tunneling indicates that this router is sending data to the RP encapsulated in register packets.
The hexadecimal number in parentheses indicates to which RP it is registering. Each bit indicates a different RP if multiple RPs per group are used. If an asterisk (*) appears after the IP address in this field, the RPF neighbor has been learned through an assert.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/ipmulti/command/reference/fiprmc_r/1rfmult 3.html