Q1. Which set of commands conditionally advertises 172.16.0.0/24 as long as 10.10.10.10/32 is in the routing table?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation:
Advertise maps are used for conditional routing to advertise specified prefixes if something which is specified in exist map exists. In our question we need to advertise 172.16.0.0/24 if 10.10.10.10/32 exists in the routing table so we have to use commanD. “neighbor x.x.x.x advertise-map <prefix-list of 172.16.0.0/24> exist-map <prefix-list of 10.10.10.10/32>”. Therefore B is correct.
Q2. Which three options are characteristics of a Type 10 LSA? (Choose three.)
A. It is an area-local, opaque LSA.
B. Data is flooded to all routers in the LSA scope.
C. It is used for traffic-engineering extensions to OSPF.
D. It is a link-local, opaque LSA.
E. Data is flooded only to the routers in the LSA scope that understand the data.
F. It is used for traffic-engineering extensions to LDP.
Answer: A,B,C
Q3. Refer to the exhibit.
Which two statements about this configuration are true? (Choose two.)
A. Spoke devices will be dynamically added to the NHRP mappings.
B. The next-hop server address must be configured to 172.168.1.1 on all spokes.
C. The next-hop server address must be configured to 192.168.1.1 on all spokes.
D. R1 will create a static mapping for each spoke.
Answer: A,C
Explanation:
NHRP is a client/server model protocol which is defined by RFC2332. The hub is considered to be the Next Hop Server (NHS) and the spokes are considered to be the Next Hop Client (NHC). The hub must be configured as the next-hop server. NHRP provides a mapping between the inside and outside address of a tunnel endpoint. These mappings can be static or dynamic. In a dynamic scenario, a next-hop server (NHS) is used to maintain a list of possible tunnel endpoints. Each endpoint using the NHS registers its own public and private mapping with the NHS. The local mapping of the NHS must always be static. It is important to note that the branch points to the inside or protected address of the NHS server. This scenario is an example of dynamic mappings.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMV PN_2_Phase2.html
Q4. DRAG DROP
Drag and drop the DSCP PHB on the left to the corresponding binary representation on the right.
Answer:
Q5. DRAG DROP
Drag and drop the DMVPN command on the left to the corresponding function on the right.
Answer:
Q6. Which option is a core event publisher for EEM?
A. Timer
B. Policy Director
C. Applet
D. Script
Answer: A
Explanation:
EEM is a flexible, policy-driven framework that supports in-box monitoring of different components of the system with the help of software agents known as event detectors. The figure below shows the relationship between the EEM server, core event publishers (event detectors), and the event subscribers (policies). Basically, event publishers screen events and publish them when there is a match on an event specification that is provided by the event subscriber. Event detectors notify the EEM server when an event of interest occurs. The EEM policies that are configured using the Cisco command-line interface (CLI) then implement recovery on the basis of the current state of the system and the actions specified in the policy for the given event. EEM offers the ability to monitor events and take informational or corrective action when the monitored events occur or when a threshold is reached. An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. A script is a form of policy that is written in Tool Command Language (Tcl).
Figure 1. Embedded Event Manager Core Event Detectors
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/15-mt/eem-15-mt-book/eem-overview.html
Q7. In the DiffServ model, which class represents the lowest priority with the lowest drop probability?
A. AF11
B. AF13
C. AF41
D. AF43
Answer: A
Explanation:
Assured Forwarding (AF) Behavior Group
Class 1
Class 2
Class 3
Class 4
Low Drop
AF11 (DSCP 10)
AF21 (DSCP 18)
AF31 (DSCP 26)
AF41 (DSCP 34)
Med Drop
AF12 (DSCP 12)
AF22 (DSCP 20)
AF32 (DSCP 28)
AF42 (DSCP 36)
High Drop
AF13 (DSCP 14)
AF23 (DSCP 22)
AF33 (DSCP 30)
AF43 (DSCP 38)
Reference: http://en.wikipedia.org/wiki/Differentiated_services
Q8. Which two statements about logging are true? (Choose two.)
A. Log messages are sent to the console port by default.
B. Log messages are displayed in a Telnet session by default.
C. Interface status changes are logged at the Notification level.
D. Interface status changes are logged at the Informational level.
E. System restart messages are logged at the Critical level.
F. Reload requests are logged at the Notification level.
Answer: A,C
Explanation:
By default, switches send the output from system messages and debug privileged EXEC commands to a logging process. The logging process controls the distribution of logging messages to various destinations, such as the logging buffer, terminal lines, or a UNIX syslog server, depending on your configuration. The process also sends messages to the console.
Table 29-3 Message Logging Level Keywords
Level Keyword
Level
Description
Syslog Definition
emergencies
0
System unstable
LOG_EMERG
alerts
1
Immediate action needed
LOG_ALERT
critical
2
Critical conditions
LOG_CRIT
errors
3
Error conditions
LOG_ERR
warnings
4
Warning conditions
LOG_WARNING
notifications
5
Normal but significant condition
LOG_NOTICE
informational
6
Informational messages only
LOG_INFO
debugging
7
Debugging messages
LOG_DEBUG
The software generates four other categories of messages:
. Error messages about software or hardware malfunctions, displayed at levels warnings through emergencies. These types of messages mean that the functionality of the switch is affected. For information on how to recover from these malfunctions, see the system message guide for this release.
. Output from the debug commands, displayed at the debugging level. Debug commands are typically used only by the Technical Assistance Center.
Interface up or down transitions and system restart messages, displayed at the notifications level. This message is only for information; switch functionality is not affected.
. Reload requests and low-process stack messages, displayed at the informational level. This message is only for information; switch functionality is not affected.
References: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2950/software/release/12-
1_9_ea1/configuration/guide/scg/swlog.html
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swlog.html
Q9. Refer to the exhibit.
Which two pieces of information in this Wireshark capture indicate that you are viewing EIGRP traffic? (Choose two.)
A. the header length
B. the protocol number
C. the destination address
D. the Class Selector
E. the source address
F. the header checksum
Answer: B,C
Explanation:
EIGRP uses protocol number 88, which shows as EIGRP in the capture. Also, we in the capture that the destination IP address is 224.0.0.10, which is the Enhanced Interior Gateway Routing Protocol (EIGRP) group address is used to send routing information to all EIGRP routers on a network segment.
Q10. Which algorithm heavily influenced the algorithm used by path-vector protocols?
A. Bellman-Ford
B. SPF
C. DUAL
D. Spanning-Tree
E. Adaptive
F. Deflection
Answer: A
Explanation:
A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing algorithms to avoid "Count to Infinity" problems.
Reference: http://en.wikipedia.org/wiki/Path_vector_protocol
Q11. Which two statements about PBR route maps are true? (Choose two.)
A. They can use extended ACLs to identify traffic.
B. They can route unicast traffic without interface-level classification.
C. They can be applied to both ingress and egress traffic.
D. They can classify traffic based on prefix-lists.
E. They can set the metric and IP precedence bits.
Answer: A,B
Q12. Which two options are EIGRP route authentication encryption modes? (Choose two.)
A. MD5
B. HMAC-SHA-256bit
C. ESP-AES
D. HMAC-AES
Answer: A,B
Explanation:
Packets exchanged between neighbors must be authenticated to ensure that a device accepts packets only from devices that have the same preshared authentication key. Enhanced Interior Gateway Routing Protocol (EIGRP) authentication is configurable on a per-interface basis; this means that packets exchanged between neighbors connected through an interface are authenticated. EIGRP supports message digest algorithm 5 (MD5) authentication to prevent the introduction of unauthorized information from unapproved sources. MD5 authentication is defined in RFC 1321. EIGRP also supports the Hashed Message Authentication Code-Secure Hash Algorithm-256 (HMAC-SHA-256) authentication method.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/xe-3s/ire-xe-3s-book/ire-sha-256.html
Q13. Which two statements about the default behavior of IS-IS are true? (Choose two.)
A. The default IS-IS router type is L1/L2.
B. The default IS-IS metric type is wide.
C. The default IS-IS interface circuit type is L1/L2.
D. By default, two IS-IS routers must use the same hello interval and hold timer in order to become neighbors.
Answer: A,C
Q14. Which TCP mechanism prevents the sender from sending data too quickly for the receiver to process?
A. Congestion control
B. Error detection
C. Selective acknowledgement
D. Flow control
Answer: D
Explanation:
In data communications, flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overwhelming a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node.
Reference: http://en.wikipedia.org/wiki/Flow_control_(data)
Q15. DRAG DROP
Drag and drop the Cisco IOS XE subpackage on the left to the function it performs on the right.
Answer: