Exam Logo

Cisco (300-410-ENARSI) Exam Questions And Answers page 13

IPv6 is enabled in the infrastructure to support customers with an IPv6 network over WAN and to connect the head office to branch offices in the local network. One of the customers is already running IPv6 and wants to enable IPv6 over the DMVPN network infrastructure between the headend and branch sites.

Which configuration command must be applied to establish an mGRE IPv6 tunnel neighborship?
Layer 3 Technologies VPN Technologies
OSPF area border routers (ABRs) advertise a default route to stub and totally stubby areas.

Which command is the BEST command to configure a cost of 25 for the default route advertised to area 1?
Layer 3 Technologies Infrastructure Services
R1 and R2 are configured as eBGP neighbors. R1 is in AS100 and R2 is in AS200. R2 is advertising these networks to R1:
172.16.16.0/20
172.16.3.0/24
172.16.4.0/24
192.168.1.0/24
192.168.2.0/24
172.16.0.0/16

The network administrator on R1 must improve convergence by blocking all subnets of 172.16.0.0/16 major network with a mask lower than 23 from coming in.

Which set of configurations accomplishes the task on R1?
Layer 3 Technologies Infrastructure Security and Services
R2 has a locally originated prefix 192.168.130.0/24 and has these configurations:


What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?
Layer 3 Technologies Infrastructure Security and Services
Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing.

Which two actions resolve the issue? (Choose two.)

Layer 3 Technologies VPN Technologies
Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock.

What is the reason for this error?

Infrastructure Security and Services Infrastructure Services
Refer to the exhibit. An engineer configures a static route on a router, but when the engineer checks the route to the destination, a different next hop is chosen.

What is the reason for this?

Layer 3 Technologies Infrastructure Security and Services
Refer to the exhibit. An engineer has configured policy-based routing and applied the configuration to the correct interface. How is the configuration applied to the traffic that matches the access list?

Layer 3 Technologies Infrastructure Security and Services
Refer to the exhibit. An engineer is trying to block the route to 192.168.2.2 from the routing table by using the configuration that is shown. The route is still present in the routing table as an OSPF route.

Which action blocks the route?

Layer 3 Technologies Infrastructure Security and Services
Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+.

Which action produces the desired configuration?

Architecture Infrastructure Security and Services