Q1. Assume that the following MAC addresses are used for the bridge ID MAC address by four different switches in a network. Which switch will be elected as the spanning-tree root bridge?
A. SwitchA uses MAC 1000.AA-AA-AA-AA-AA-AA.
B. SwitchB uses MAC 2000.BB-BB-BB-BB-BB-BB.
C. SwitchC uses MAC 3000.CC-CC-CC-CC-CC-CC.
D. SwitchD uses MAC 4000.DD-DD-DD-DD-DD-DD.
Answer: A
Explanation:
The switch with the highest switch priority (the lowest numerical priority value) is elected as the root switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the VLAN becomes the root switch.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swstp.html
Q2. Which statement about the overload bit in IS-IS is true?
A. The IS-IS adjacencies on the links for which the overload bit is set are brought down.
B. Routers running SPF ignore LSPs with the overload bit set and hence avoid blackholing traffic.
C. A router setting the overload bit becomes unreachable to all other routers in the IS-IS area.
D. The overload bit in IS-IS is used only for external prefixes.
Answer: B
Explanation:
The OL bit is used to prevent unintentional blackholing of packets in BGP transit networks. Due to the nature of these protocols, IS-IS and OSPF converge must faster than BGP. Thus there is a possibility that while the IGP has converged, IBGP is still learning the routes. In that case if other IBGP routers start sending traffic towards this IBGP router that has not yet completely converged it will start dropping traffic. This is because it isnt yet aware of the complete BGP routes. OL bit comes handy in such situations. When a new IBGP neighbor is added or a router restarts, the IS-IS OL bit is set. Since directly connected (including loopbacks) addresses on an “overloaded” router are considered by other routers, IBGP can be bought up and can begin exchanging routes. Other routers will not use this router for transit traffic and will route the packets out through an alternate path. Once BGP has converged, the OL bit is cleared and this router can begin forwarding transit traffic.
Reference: https://routingfreak.wordpress.com/category/ospf-vs-is-is/
Q3. Which command correctly configures standby tracking for group 1 using the default decrement priority value?
A. standby 1 track 100
B. standby 1 track 100 decrement 1
C. standby 1 track 100 decrement 5
D. standby 1 track 100 decrement 20
Answer: A
Q4. On an MPLS L3VPN, which two tasks are performed by the PE router? (Choose two.)
A. It exchanges VPNv4 routes with other PE routers.
B. It typically exchanges iBGP routing updates with the CE device.
C. It distributes labels and forwards labeled packets.
D. It exchanges VPNv4 routes with CE devices.
E. It forwards labeled packets between CE devices.
Answer: A,C
Explanation:
MPLS VPN functionality is enabled at the edge of an MPLS network. The PE router performs these tasks: .
Exchanges routing updates with the CE router .
Translates the CE routing information into VPN version 4 (VPNv4) routes .
Exchanges VPNv4 routes with other PE routers through the Multiprotocol Border Gateway Protocol (MP-BGP)
A PE router binds a label to each customer prefix learned from a CE router and includes the label in the network reachability information for the prefix that it advertises to other PE routers. When a PE router forwards a packet received from a CE router across the provider network, it labels the packet with the label learned from the destination PE router. When the destination PE router receives the labeled packet, it pops the label and uses it to direct the packet to the correct CE router. Label forwarding across the provider backbone is based on either dynamic label switching or traffic engineered paths. A customer data packet carries two levels of labels when traversing the backbone
Reference: http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4-2/lxvpn/configuration/guide/vcasr9kv342/vcasr9k42v3.html
Q5. Which three options are three of the default EIGRP administrative distances? (Choose three.)
A. Internal, 90
B. External, 170
C. Summary, 5
D. Outside Local, 100
E. Inside Local, 180
F. Inside Global, 1
Answer: A,B,C
Explanation:
The following table lists the default administrative distances for various routing protocols used on Cisco routers.
Routing Protocol
Administrative distance
Directly connected interface
0
Static route out an interface
1
Static route to next-hop address
1
DMNR - Dynamic Mobile Network Routing
3
EIGRP summary route
5
External BGP
20
Internal EIGRP
90
IGRP
100
OSPF
110
IS-IS
115
Routing Information Protocol (RIP)
120
Exterior Gateway Protocol (EGP)
140
On Demand Routing (ODR)
160
External EIGRP
170
Internal BGP
200
Floating Static Route (ex. DHCP-learned)
254
Unknown
255
Reference: http://en.wikipedia.org/wiki/Administrative_distance
Q6. Refer to the exhibit.
IPv6 SLAAC clients that are connected to the router are unable to acquire IPv6 addresses. What is the reason for this issue?
A. Router advertisements are not sent by the router.
B. Duplicate address detection is disabled but is required on multiaccess networks.
C. The interface is configured to support DHCPv6 clients only.
D. The configured interface MTU is too low for IPv6 to be operational.
Answer: A
Q7. DRAG DROP
Drag and drop the SNMP element on the left to the corresponding definition on the right.
Answer:
Q8. When the BGP additional-paths feature is used, what allows a BGP speaker to differentiate between the different available paths?
A. The remote BGP peer prepends its own next-hop address to the prefix.
B. A unique path identifier is encoded into a dedicated field to the NLRI.
C. A route distinguisher is appended to the prefix by the receiving BGP speaker.
D. The additional path information is encoded in an extended community.
Answer: B
Q9. Which option is the default point of insertion for the BGP cost community?
A. before best path calculation
B. after best path calculation
C. after the IGP metric comparison
D. after the router ID comparison
Answer: C
Q10. DRAG DROP
Drag and drop the RIP configuration command on the left to the function it performs on the right.
Answer:
Q11. Which statement is true about trunking?
A. Cisco switches that run PVST+ do not transmit BPDUs on nonnative VLANs when using a dot1q trunk.
B. When removing VLAN 1 from a trunk, management traffic such as CDP is no longer passed in that VLAN.
C. DTP only supports autonegotiation on 802.1q and does not support autonegotiation for ISL.
D. DTP is a point-to-point protocol.
Answer: D
Explanation:
Ethernet trunk interfaces support different trunking modes. You can set an interface as trunking or nontrunking or to negotiate trunking with the neighboring interface. To autonegotiate trunking, the interfaces must be in the same VTP domain. Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a Point-to-Point Protocol. However, some internetworking devices might forward DTP frames improperly, which could cause misconfigurations.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/12-2_55_se/configuration/guide/scg3750/swvlan.html
Q12. Which technology is an application of MSDP, and provides load balancing and redundancy between the RPs?
A. static RP
B. PIM BSR
C. auto RP
D. anycast RP
Answer: D
Explanation:
Using Anycast RP is an implementation strategy that provides load sharing and redundancy in Protocol Independent Multicast sparse mode (PIM-SM) networks. Anycast RP allows two or more rendezvous points (RPs) to share the load for source registration and the ability to act as hot backup routers for each other. Multicast Source Discovery Protocol (MSDP) is the key protocol that makes Anycast RP possible.
Reference: www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/anycast.html
Q13. Which two modes of operation does BFD support? (Choose two.)
A. synchronous mode
B. asynchronous mode
C. demand mode
D. echo mode
E. aggressive mode
F. passive mode
Answer: B,C
Explanation:
A session may operate in one of two modes: asynchronous mode and demand mode. In
asynchronous mode, both endpoints periodically send Hello packets to each other. If a number of those packets are not received, the session is considered down. In demand mode, no Hello packets are exchanged after the session is established; it is assumed that the endpoints have another way to verify connectivity to each other, perhaps on the underlying physical layer. However, either host may still send Hello packets if needed.
Reference: http://en.wikipedia.org/wiki/Bidirectional_Forwarding_Detection
Q14. Which three options are sources from which a SPAN session can copy traffic? (Choose three.)
A. ports
B. EtherChannels
C. VLANs
D. subnets
E. primary IP addresses
F. secondary IP addresses
Answer: A,B,C
Explanation:
. SPAN Sources
The interfaces from which traffic can be monitored are called SPAN sources. Sources designate the traffic to monitor and whether to copy ingress, egress, or both directions of traffic. SPAN sources include the following:
. Ethernet ports
. Port channels
. The inband interface to the control plane CPU — You can monitor the inband interface only from the default VDC. Inband traffic from all VDCs is monitored.
. VLANs — When a VLAN is specified as a SPAN source, all supported interfaces in the VLAN are SPAN sources.
. Remote SPAN (RSPAN) VLANs
. Fabric port channels connected to the Cisco Nexus 2000 Series Fabric Extender .
Satellite ports and host interface port channels on the Cisco Nexus 2000 Series Fabric Extender
— These interfaces are supported in Layer 2 access mode, Layer 2 trunk mode, and Layer 3 mode.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_14span.html#wp1239492
Q15. What is the new designation for the MPLS EXP (experimental) bits?
A. QoS bits
B. traffic class bits
C. flow bits
D. precedence bits
Answer: B
Explanation:
To avoid misunderstanding about how this field may be used, it has become increasingly necessary to rename this field. This document changes the name of the EXP field to the "Traffic Class field" ("TC field"). In doing so, it also updates documents that define the current use of the EXP field.
Reference: https://tools.ietf.org/html/rfc5462