Cisco (300-410-ENARSI) Exam Questions And Answers page 18
What does the passive-interface command do when implement with RIP? (Choose two.)
Prevents an interface from sending routing update traffic
Prevents an interface from sending any normal data traffic
Allows an interface to receive normal data traffic
Disables a router interface
Places a router interface in standby mode
Layer 3 Technologies
Infrastructure Security and Services
What does the PE router convert the IPv4 prefix to within an MPLS VPN?
eBGP path association between the PE and CE sessions
prefix that combines the ASN, PE router-id, and IP prefix
48-bit route combining the IP and PE router-id
VPN-IPv4 prefix combined with the 64-bit route distinguisher
Layer 3 Technologies
VPN Technologies
What is an advantage of using BFD?
It detects local link failure at layer 1 and updates routing table.
It detects local link failure at layer 3 and updates routing protocols.
It has sub-second failure detection for layer 1 and layer 3 problems.
It has sub-second failure detection for layer 1 and layer 2 problems.
Layer 3 Technologies
VPN Technologies
What is a prerequisite for configuring BFD?
Jumbo frame support must be configured on the router that is using BFD.
All routers in the path between two BFD endpoints must have BFD enabled.
Cisco Express Forwarding must be enabled on all participating BFD endpoints.
To use BFD with BGP, the timers 3 9 command must first be configured in the BGP routing process.
Layer 3 Technologies
What is a use case for the HSRP configuration provided?
Single Choice
What would be a use case for the HSRP configuration below?
used to switch the active role to the other router in the HSRP group during a maintenance window
used to prevent this router from ever relinquishing the active role
used to prevent this router from ever performing the active role
used to allow preemption over multiple peers
Layer 3 Technologies
Infrastructure Security and Services
When configuring a DMVPN solution, which of the following technologies makes it possible for the spoke routers to use dynamic IP addressing?
IPsec
mGRE
NHRP
Dynamic routing protocols
Layer 3 Technologies
VPN Technologies
When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device.
Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?
Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective?
Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction.
Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction.
Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction.
Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction.
Layer 3 Technologies
Infrastructure Security and Services
When provisioning a device in Cisco DNA Center, the engineer sees the error message Cannot select the device. Not compatible with template .
What is the reason for the error?
What is the reason for the error?
The template has an incorrect configuration.
The software version of the template is different from the software version of the device.
The changes to the template were not committed.
The tag that was used to filter the templates does not match the device tag.
Architecture
Infrastructure Services
When the auth keyword is used in the snmp-server host command, which of the flowing must be configured with an authentication mechanism?
the interface
the host
the user
the group
Layer 3 Technologies
Infrastructure Security and Services
Which attribute eliminates LFAs that belong to protected paths in situations where links in a network are connected through a common fiber?
shared risk link group-disjoint
linecard-disjoint
lowest-repair-path-metric
interface-disjoint
Layer 3 Technologies
Infrastructure Security and Services
Comments