Practice Free 300-410 Exam Online Questions
Which routing protocol is used by the PE router to advertise routes to a CE router without redistribution or static after removing the RD tag from the P router?
- A . IS-IS
- B . OSPF
- C . BGPIPv4
- D . MP-BGP
A network administrator must optimize the segment size of the TCP packet on the DMVPN IPsec protected tunnel interface, which carries application traffic from the head office to a designated branch. The TCP segment size must not overwhelm the MTU of the outbound link.
Which configuration must be applied to the router to improve the application performance?
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Refer to the exhibit.
A network administrator is trying to access a branch router using TACACS+ username and password credentials, but the administrator cannot log in to the router because the WAN connectivity is down.
The branch router has following AAA configuration:
aaa new-model
aaa authorization commands 15 default group tacacs+
aaa accounting commands 1 default stop-only group tacacs+
aaa accounting commands 15 default stop-only group tacacs+
tacacs-server host 10.100.50.99
tacacs-server key CI$co123
Which command will resolve this problem when WAN connectivity is down?
- A . aaa authentication login default group tacacs+ local
- B . aaa authentication login default group tacacs+ enable
- C . aaa authentication login default group tacacs+ console
- D . aaa authentication login console group tacacs+ enable
A
Explanation:
With the “aaa authentication login default group tacacs+ local ” command configured, when logging in, the password supplied will be attempted to be verified by the TACACS+ server before access is granted. If the server is unavailable/unreachable, then the switch will fall back to using the local authentication database.
Refer to the exhibit.
EIGRP adjacency between router A and router C is not working as expected.
Which two configurations resolve the issue? (Choose two)
A)
B)
C)
D)
E)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
- E . Option E
Refer to the exhibit.
Traffic from R3 to the central site does not use alternate paths when R3 cannot reach 10 10 10 2 Traffic on R3 destined to R4 takes an alternate route via 10 10 10.6 when 10 10 10 4 is not accessible from R3.
Which configuration switches traffic destined to 10 10 10 2 from R3 on the alternate path’’
- A . R3(config)#ip route 192.168.10.1 255.255.265.255 10.10.10.2 track 20
- B . R2(config)#ip route 10.10 10 3 255 255.255 255 10.0.0.6
- C . R3(config)#track( 20 ip sla 20 reachability
- D . R6(config)#ip route 10.10.10 3 255.255.255.255 10.0.0.30
Refer to the exhibit.
The R1 and R2 configurations are:
The neighbor is not coming up.
Which two sets of configurations bring the neighbors up? (Choose two.)
- A . R2
ip route 10.1.1.1 255.255.255.255 192.168.1.1
!
router bgp 200
neighbor 10.1.1.1 tti-security hops 1
neighbor 10.1.1.1 update-source loopback 0 - B . R2
ip route 10.1.1.1 255.255.255.255 192.168.1.1
!
router bgp 200
neighbor 10.1.1.1 disable-connected-check
neighbor 10.1.1.1 update-source loopback 0 - C . R2
ip route 10.1.1.2 255.255.255.255 192.168.1.2
!
router bgp 100
neighbor 10.1.1.2 ttl-security hops 1
neighbor 10.1.1.2 update-source loopback 0 - D . R1
ip route 10.1.1.2 255.255.255.255 192.168.1.2
!
router bgp 100
neighbor 10.1.1.1 ttl-security hops 1
neighbor 10.1.1.2 update-source loopback 0 - E . R1
ip route 10.1.1.2 255.255.255.255 192.168.1.2
!
router bgp 100
neighbor 10.1.1.2 disable-connected-check
neighbor 10.1.1.2 update-source Loopback0
B,E
Explanation:
Disable-connected-check enables a directly connected eBGP neighbor to peer using a loopback address without adjusting the default TTL of 1. In disable connected check the router does not decrease the TTL of an IP packet that is destined to itself so it only counts or considers as one hop between the two loopbacks of the routers.
Refer to the exhibit.
Which action adds the 10 1 7.6-32 route to the BGP table?
- A . Add a static roue for the 10 1 7 &32 network
- B . Add the network 10.1.7.6 mask 255.255.255.255 backdoor command
- C . Add summaty-address10.1.7.6.255.255.2550
- D . Add the network 10.1.7.6 mask 255.255.255.255 command
Which function does LDP provide in an MPLS topology?
- A . It enables a MPLS topology to connect multiple VPNs to P routers.
- B . It provides hop-by-hop forwarding in an MPLS topology for LSRs.
- C . It exchanges routes for MPLS VPNs across different VRFs.
- D . It provides a means for LSRs to exchange IP routes.
B
Explanation:
LDP provides a standard methodology for hop-by-hop, or dynamic label, distribution in an MPLS network by assigning labels to routes that have been chosen by the underlying Interior Gateway Protocol (IGP) routing protocols. The resulting labeled paths, called label switch paths (LSPs), forward label traffic across an MPLS backbone to particular destinations.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ldp/configuration/12-4t/mp-ldp-12-4t-book.pdf
An engineer failed to run diagnostic commands on devices using Cisco DNA Center.
Which action in Cisco DNA Center resolves the issue?
- A . Enable Command Runner
- B . Enable APIs
- C . Enable CDP
- D . Enable Secure Shell
Refer to the exhibit.
An engineer noticed that the router log messages do not have any information about when the event occurred.
Which action should the engineer take when enabling service time stamps to improve the logging functionality at a granular level?
- A . Configure the debug uptime option
- B . Configure the msec option
- C . Configure the time zone option
- D . Configure the tog uptime option