Ensurepass

 

 

QUESTION 221

Which two statements about the metric-style wide statement as it applies to route redistribution are true? (Choose two.)

 

A.

It is used in IS-IS.

B.

It is used in OSPF.

C.

It is used in EIGRP.

D.

It is used for accepting TLV.

E.

It is used in PIM for accepting mroutes.

F.

It is used for accepting external routes.

 

Correct Answer: AD

Explanation:

To configure a router running IS-IS to generate and accept only new-style TLVs (TLV stands for type, length, and value object), use the metric-style wide command.

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/TE_1208S.html#wp49409

 

 

QUESTION 222

You are tasked with configuring a router on an OSPF domain to import routes from an EIGRP domain and summarize the routes to 192.168.64.0. Which statement configures the summarized route and provides equal-path route redundancy?

 

A.

area 32 range 192.168.64.0 255.255.192.0 cost 100

B.

area 32 range 192.168.64.0 255.255.63.0 cost 100

C.

area 32 range 192.168.64.0 255.255.64.0 cost 100

D.

area 32 range 192.168.64.0 255.255.192.0 multi-path

 

Correct Answer: A

Explanation:

area range

To consolidate and summarize routes at an area boundary, use the area range command in router configuration mode. To disable this function, use the no form of this command.

Syntax Description

area-id

Identifier of the area about which routes are to be summarized. It can be specified as either a decimal value or as an IP address.

ip-address

IP address.

mask

IP address mask.

advertise

(Optional) Sets the address range status to advertise and generates a Type 3 summary link-state advertisement (LSA).

not-advertise

(Optional) Sets the address range status to DoNotAdvertise. The Type 3 summary LSA is suppressed, and the component networks remain hidden from other networks.

cost cost

(Optional) Metric or cost for this summary route, which is used during OSPF SPF calculation to determine the shortest paths to the destination. The value can be 0 to 16777215.

 

Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/iproute/command/reference/fiprrp_r/1rfospf.html#wp1017596

 

 

QUESTION 223

Packets from a router with policy-based routing configured are failing to reach the next hop. Which two additions can you make to the router configuration to enable the packets to flow correctly? (Choose two.)

 

A.

Enable ip proxy-arp on the exiting interface.

B.

Specify the next hop as an address.

C.

Specify the next hop as an interface.

D.

Add a match-any permit statement to the route map.

 

Correct Answer: AB

Explanation:

Here is an example:

Router(config)#route-map Engineers permit 20

Router(config-route-map)#match ip address 2

Router(config-route-map)#set interface Ethernet1

Here, instead of specifying a next-hop, it specifies that any packets matching this rule will be forwarded directly out the interface Ethernet1. This means that either the destination device must be on this segment, or there must be a router configured with Proxy ARP that can forward the packet to the ultimate destination.

 

 

QUESTION 224

Which two options are EIGRP route authentication encryption modes? (Choose two.)

 

A.

MD5

B.

HMAC-SHA-256bit

C.

ESP-AES

D.

HMAC-AES

 

Correct Answer: AB

Explanation:

Packets exchanged between neighbors must be authenticated to ensure that a device accepts packets only from devices that have the same preshared authentication key. Enhanced Interior Gateway Routing Protocol (EIGRP) authentication is configurable on a per-interface basis; this means that packets exchanged between neighbors connected through an interface are authenticated. EIGRP supports message digest algorithm 5 (MD5) authentication to prevent the introduction of unauthorized information from unapproved sources. MD5 authentication is defined in RFC 1321. EIGRP also supports the Hashed Message Authentication Code-Secure Hash Algorithm-256 (HMAC-SHA-256) authentication method.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/xe-3s/ire-xe-3s-book/ire-sha-256.html

 

 

QUESTION 225

Which neighbor-discovery message type is used to verify connectivity to a neighbor when the link- layer address of the neighbor is known?

 

A.

neighbor solicitation

B.

neighbor advertisement

C.

router advertisement

D.

router solicitation

 

Correct Answer: A

Explanation:

IPv6 Neighbor Solicitation Message

A value of 135 in the Type field of the ICMP packet header identifies a neighbor solicitation message. Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.

Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message

 

clip_image002

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3s/ip6b-xe-3s-book/ip6-neighb-disc-xe.html

 

 

QUESTION 226

DRAG DROP

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 227

DRAG DROP

clip_image008

 

Correct Answer:

clip_image010

 

 

QUESTION 228

DRAG DROP

clip_image012

 

Correct Answer:

clip_image014

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 229

DRAG DROP

clip_image016

 

Correct Answer:

clip_image018

 

 

QUESTION 230

DRAG DROP

clip_image020

 

Correct Answer:

clip_image022

 

 

Free VCE & PDF File for Cisco 400-101 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.